Module 1.2 Flashcards
(56 cards)
What is an asset again?
- > anything valuable to organization
- > system resource
- > 6 examples -> program/application, shared systems, critical systems or support systems, plants, personnel, equipment, data/info
- database is example
Cyber security review? where is assets in the def?
-> preventing damage to, protecting and restoring
components of computers (ASSETS)
to meet goals of objectives such as confidentiality, integrity, availability, authenticity and non-repudiation
Examples of assets in cyber security definition 4? 3 main?
computer
electronic communication systems/services
wire/electronic communication
information contained within those above
systems
information
services
what are 4 classes of assets we need to protect?
hardware
software
communication
data
what are hardware assets (3 examples?)
hardware components in systems
eg. data processing systems
storage systems
data communication devices
name three software assets
operating systems, system utilities, applications
what are communication assets? 4 examples?
what else can these be categorized as??
->communication components that build our communication network
eg. LAN WAN communication links/devices
switches
bridges
routers
-routers can also be categorized as hardware
3 examples of data assets?
- files
- databases
- security related data such as password files
What is a threat?
threat to?
- event/circumstance that has potential for adverse effects
- through information systems - unauthorized access, destruction, disclosure, modifying data, denying access
- effects operations, individuals, organization, nation, assets
- threat to security objectives
What is an attack -what is a realization of?
- a malicious activity that aims to collect damage or destroy information system or system resources
- realization of a threat
what is the threat of unauthorized disclosure?
threat to?
even when a unauthorized person gains access to the data
->threat to confidentiality
What are the 4 realizations/attacks of unauthorized disclosure?
-exposure, interception, inference, intrusion
what is exposure?
sensitive data released to unauthorized person
what is interception?
unauthorized user directly accesses sensitive data that is travelling between authorized source/destination
what is inference?
unauthorized user indirectly gets access to sensitive info by reasoning from characteristics or by products of communication
->learning through inferring what info is about
what is intrusion?
unauthorized user gains access to sensitive data by bypassing system’s security (breaking in)
What is the threat of deception?
threat to?
event that may result in authorized entity receiving false data/believing it
->threat to system integrity (correct operation) and data integrity (trustworthiness of data)
What are the three attacks of deception?
Masquerade, Falsification, Repudiation
What is Masquerade?
unauthorized entity gains access to system and pretends to be an authorized entity to perform malicious acts
What is Falsification?
ex?
false data inserted to deceive authorized person
->eg into communication so they take a corrective action which can cause asset damage
What is Repudiation?
entity deceives another by saying it’s not them
-you do unauthorized actions in the system but don’t take accountability
What is disruption? threat to?
events that interrupts/prevent correct operation system’s services
->Threat to system integrity and availability
What are the three realizations of disruption?
incapacitation, corruption, obstruction
What is incapacitation?
interrupts/prevents system operation by disabling a system component