{ "@context": "https://schema.org", "@type": "Organization", "name": "Brainscape", "url": "https://www.brainscape.com/", "logo": "https://www.brainscape.com/pks/images/cms/public-views/shared/Brainscape-logo-c4e172b280b4616f7fda.svg", "sameAs": [ "https://www.facebook.com/Brainscape", "https://x.com/brainscape", "https://www.linkedin.com/company/brainscape", "https://www.instagram.com/brainscape/", "https://www.tiktok.com/@brainscapeu", "https://www.pinterest.com/brainscape/", "https://www.youtube.com/@BrainscapeNY" ], "contactPoint": { "@type": "ContactPoint", "telephone": "(929) 334-4005", "contactType": "customer service", "availableLanguage": ["English"] }, "founder": { "@type": "Person", "name": "Andrew Cohen" }, "description": "Brainscape’s spaced repetition system is proven to DOUBLE learning results! Find, make, and study flashcards online or in our mobile app. Serious learners only.", "address": { "@type": "PostalAddress", "streetAddress": "159 W 25th St, Ste 517", "addressLocality": "New York", "addressRegion": "NY", "postalCode": "10001", "addressCountry": "USA" } }

Security Flashcards

(32 cards)

1
Q

Why is security systems matter?

A
  • Systems must be trustworthy as we depend on them
  • Security breaches are very costly
  • Complex systems will inevitably have design flaws that can be manipulated
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why does robotic security matter?

A
  • Hacked robots can harass users
  • Can cause accidents and damage
  • Low security can cause distrust in robotics
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the CIA (Confidentiality, Integrity, Availability) triad?

A

a foundational model for understanding security requirements, and minimise threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What its confidentiality?

A

Resources/data that should only be accessible for authorised users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are practical methods of protecting confidential data?

A

Encryption, access control, authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is meant by integrity?

A

Resources/data should only be modified or removes by authorised users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are practical methods for keeping integrity?

A
  • Checksums
  • Hashing
  • Digital signatures
  • Version control
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is meant by availability?

A

Resources is accessible whenever needed by authorised users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What can help availability?

A
  • Fast performance
  • Backup servers
  • Reliable systems that don’t fail
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the Security Design Principles?

A
  • Economy of Mechanism
  • Fail-safe defaults
  • Complete Meditation
  • Open design
  • Separation of privilege
  • Least privilege
  • Least common mechanism
  • Psychological acceptability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is economy of mechanism?

A

Keep designs as simple, reducing the chance of errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why is economy of mechanism useful?

A

Less code means less bugs and simpler verification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is fail-safe defaults

A

Deny by default; only grant access if explicitly allowed.
Mistakes revert the system to secure state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is complete mediation?

A

Authorisation is re-validated on every request

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is complete mediation useful for?

A

Prevent attackers from having indefinite access after entering system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is open design?

A

The security mechanisms are transparent and public

17
Q

Why is open design useful?

A

Designs are peer-reviewed and under public criticism

18
Q

What is separation of privilege?

A

Divide power so no single entity can control the entire system

19
Q

Why is separation of privilege useful?

A

Reduces threats and accidental misuse

20
Q

How can separation of privilege be used in banking?

A

transactions require approval from multiple roles

21
Q

What is defence in depth?

A

Several layers of security protect assets; If one layer fails, the rest still protect the assets

22
Q

What is least privilege?

A

A subject only has privileges necessary for its task

23
Q

How can least privilege be used in robotics?

A

Robots can read given data, but cannot alter databases or write system logs

24
Q

What is least common mechanism?

A

Minimises shared resources

25
What is psychological acceptability?
Security must be user-friendly to be adopted; good usability
26
Why is psychological acceptability important?
Users may avoid security measures due to complexity
27
What principles are being applied for secure firmware updates for robotics?
Fail-safe defaults: if an error occurs during an update, the robot defaults to secure state Complete mediation: Every firmware update and access to the system is checked rigorously
28
What principles are applied for separating safety-critical code in automated cars
Separation of privilege: Software is divided into distinct parts. Safety-critial parts are isolated from rest of software Least privilege: Only necessary permissions are granted to the system
29
What principles are applied for ensuring training data for AI models are reliable?
Integrity: training data remains untampered Complete mediation: Every interaction with the data and AI model is verified
30
What principles are applied to create easy-to-use password managers?
Psychological acceptability
31
What are the immutable laws of security?
A set of core principles that guide security practices, including technical and human factors
32
What is important to consider for the future of security?
Technology and methods of infiltrating security constantly evolve. Security needs to keep up with evolving tech to stay robust and resilient