Topic 1 Flashcards
(61 cards)
Any transaction online, including online banking, software services, remote service providers, or online course platforms.
E-commerce
What is E-commerce?
Any transaction online, including online banking, software services, remote service providers, or online course platforms.
Characteristics of information to be useful
- Accurate
- Timely
- Complete
- Verifiable
- Consistent
- Available
Characteristics of information to be useful
You might want:
- Privacy
- Protection against phishing, vishing
- Integrity
- Authentication
- Authorization
- Confidentiality
- Non-repudiation
- Availability
Aspects of Information Needing protection
Availability
timely, reliable access to data and information services for authorized users
Aspects of Information Needing protection
Integrity
you can only see the data but you cannot change it, protection against unauthorized modification or destruction of information
Aspects of Information Needing protection
Confidentiality
assurance that information is not disclosed to unauthorized parties
Aspects of Information Needing protection
Authentication
to identify and verify user’s identity , security measures to establish the validity of a transmission, message or originator
Aspects of Information Needing protection
Non-repudiation
you cannot deny the authenticity/validity of an act you committed, sender given proof of data delivery and recipient given proof of sender’s identity so that neither can deny processed data
Aspects of Information Needing protection
- Availability
- Confidentiality
- Authentication
- Non-repudiation
is the resource being protected
Assets
Assets
Physical assets
devices, computers, people
Assets
Logical assets
information, data (in transmission, storage, or processing), and intellectual property
Assets
System assets
any software, hardware, data, administrative, physical, communications, or personnel resource within an information system
Attacks
Passive attack
an attack in which the attacker observes interaction with the system
Active attack
an attack in which the attacker directly interacts with the system
Unintentional attack
an attack where there is not a deliberate goal of misuse
Exposure
is an instance when the system is vulnerable to attack
Compromise
is a situation in which the attacker has succeeded
is a recognized, action specific, generalized or theoretical that an adversary (threat actor) might be expected to take in preparation for an attack
Indicator
Consequence
is the outcome of the attack, may cause the information system to lose effectiveness and may have other costs
Consequence
Disruption
targets availability
Consequence
Corruption
targets integrity
Consequence
Exploitation
targets confidentiality