Prelim Flashcards
(83 cards)
What is E-commerce?
Any transaction online, including online banking, software services, remote service providers, or online course platforms.
What are the key specifications of Real-world Security?
- Specifications/policy : What is the system supposed to do
- Implementation mechanism : How does it do it?
- Correctness/assurance : Does it really work?
- Human Nature : Can the system survive “clever users”?
What you might want in a software?
*Privacy
*Protection against phishing, vishing
*Integrity
*Authentication
*Authorization
*Confidentiality
*Non-repudiation
*Availability
It is the protection against unauthorized modification or destruction of information.
Integrity
Ensures that information is not disclosed to unauthorized persons.
Confidentiality
The process of verifying the identity of a user, message, or originator.
Authentication
Provides proof of data delivery and sender identity, so that neither party can later deny having processed the information.
Non-repudiation
It is the guarantee of timely, reliable access to data and information services for authorized users.
Availability
What does Availability refer to in information security?
Timely, reliable access to data and information services for authorized users.
Define Integrity in the context of information security.
Protection against unauthorized modification or destruction of information.
What is Confidentiality in information security?
Assurance that information is not disclosed to unauthorized persons.
What is Authentication?
Security measures to establish the validity of a transmission, message, or originator.
What does Non-repudiation mean?
Assurance that the sender has proof of data delivery and the recipient has proof of the sender’s identity.
What are the types of assets in information security?
- Physical assets: Devices, computers, people
- Logical assets: Information, data, intellectual property
- System Assets: Software, hardware, data, personnel resources
What is an attack in the context of information security?
An attempt to gain access, cause damage to, or otherwise compromise information and/or systems.
What is a Passive attack?
An attack in which the attacker observes interaction with the system but does not directly interact with the system.
Define an Active attack.
An attack in which the attacker directly interacts with the system.
What is an Unintentional attack?
An attack where there is no deliberate goal of misuse.
What is Exposure in information security?
An instance when the system is vulnerable to attack.
Characteristics of information to be useful
Accurate
Timely
Complete
Verifiable
Consistent
Available
Aspects of Information Needing protection
Availability
Confidentiality
Authentication
Non-repudiation
is the resource being protected
Assets
Physical assets
devices, computers, people
Logical assets
information, data (in transmission, storage, or processing), and intellectual property