Security and Protection Flashcards

1
Q

Difference between protection and security

A

Security measures deal with threats to resources that come from outside a computer system.
Protection measures deal with internal threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

Computer Security Triad

A

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Interception

A

Interception refers to the unauthorized access or capture of data during its transmission or communication across a network or system.

Example: intercepting unencrypted communication to obtain confidential data or passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Interruption

A

Interruption involves attacks or actions that disrupt or deny access to legitimate users or resources within the system.

Example: Denial-of-service (DoS) attacks that flood a system with traffic to overload and disrupt its services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Modification

A

Modification refers to unauthorized changes made to data, programs, or system configurations by an attacker.

Example: altering the content of files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Fabrication

A

Fabrication involves the creation or insertion of false or unauthorized data or activities within the system.

For example, creating forged user identities or generating false log entries to deceive system administrators.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Authentication

A

Authentication verifies the identity of users or entities attempting to access a system, ensuring they are who they claim to be. It confirms the validity of credentials, such as usernames, passwords, biometric data, or digital certificates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Authorization

A

Authorization defines and enforces what actions or resources a user or process is permitted to access or perform within the system after successful authentication.

Example: File-level authorization specifies permissions (read, write, execute) for different user groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Security Violation Categories

A

Breach of confidentiality
Breach of integrity
Breach of availability
Theft of service
Denial of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the two steps in authentication?

A

Identification
Verification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly