Security Functions/Countermeasures Flashcards

(23 cards)

1
Q

What is security in the context of information protection?

A

Security is the means to protect information in storage and transit, ensuring integrity, reliability, availability, and authorization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What do integrity and reliability mean for data security?

A

Integrity ensures data is received in the same state it was sent. Reliability means you can trust the data’s integrity, regardless of transmission method or medium.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are availability and authorization in data security?

A

Availability ensures data is reliably accessible when needed. Authorization ensures data is protected from unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What constitutes an attack on information security?

A

An attack violates security, integrity, or availability of data. It can be caused by hackers, poorly trained users making errors, or equipment failure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a denial of access attack?

A

A type of attack that makes data unavailable to authorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an information asset?

A

An information asset is a valuable data resource, such as a database record or file server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which security functions are open to attacks?

A

Identification and authentication, access control, accountability, and object reuse.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the role of identification and authentication in security?

A

These functions identify a user or group on a system to verify their legitimacy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does access control do in a security system?

A

Access control defines and controls a user’s access rights to objects, ensuring only authorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is accountability in security systems?

A

Accountability tracks security-relevant actions to monitor and record user activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is object reuse, and what risks does it pose?

A

Object reuse allows an OS to efficiently reuse resources like memory or storage. Risks include malicious users scavenging data from un-cleared space (disk, memory, registers), leading to data leakage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is magnetic remanence, and why is it a security threat?

A

Magnetic remanence is the threat of restoring previously recorded data from magnetic media, potentially exposing sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are accuracy and element accuracy in security?

A

Accuracy ensures information assets remain secure from tampering. Element accuracy ensures only correct values are written into database tables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is reliability of service in the context of information security?

A

Information is available on demand, with software (e.g., DBMS) running for long periods without failure, ensuring reliable data access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the avoidance countermeasure, and how is it applied?

A

Avoidance uses security measures like firewalls to completely avoid threats to assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the transfer countermeasure, and how does it work?

A

Transfer applies measures like goat (sacrificial) files to divert threats away from critical assets.

17
Q

How does the reduction of threat countermeasure function?

A

Applies measures like a UPS to reduce the threat itself, allowing graceful shutdown of systems like file servers.

18
Q

What is the reduction of vulnerability countermeasure?

A

Applies measures like system patches, temporary workarounds, or server redundancy to reduce an asset’s vulnerability to threats.

19
Q

What is real-time detection, and how is it implemented?

A

Uses measures like memory-resident antivirus software to detect and interdict threats (e.g., viruses) as they occur.

20
Q

What is non-real-time detection in security?

A

Uses measures like virus scanning software to detect threats (e.g., infected executables) after they have occurred.

21
Q

How does the reduction of impact countermeasure work?

A

Applies measures like periodical autosave to minimize the impact of a successful threat on an asset.

22
Q

What is real-time recovery, and how is it applied?

A

Uses measures like RAID (mirrored) or duplexed drives to recover assets as a threat is realized.

23
Q

What is non-real-time recovery in security?

A

Uses measures like backups to recover assets at a later time after a threat has occurred.