Topic 1 Reset Flashcards

(61 cards)

1
Q

Any transaction online, including online banking, software services, remote service providers, or online course platforms.

A

E-commerce

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is E-commerce?

A

Any transaction online, including online banking, software services, remote service providers, or online course platforms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Characteristics of information to be useful

A
  1. Accurate
  2. Timely
  3. Complete
  4. Verifiable
  5. Consistent
  6. Available
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Characteristics of information to be useful

You might want:

A
  1. Privacy
  2. Protection against phishing, vishing
  3. Integrity
  4. Authentication
  5. Authorization
  6. Confidentiality
  7. Non-repudiation
  8. Availability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Aspects of Information Needing protection

Availability

A

timely, reliable access to data and information services for authorized users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Aspects of Information Needing protection

Integrity

A

you can only see the data but you cannot change it, protection against unauthorized modification or destruction of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Aspects of Information Needing protection

Confidentiality

A

assurance that information is not disclosed to unauthorized parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Aspects of Information Needing protection

Authentication

A

to identify and verify user’s identity , security measures to establish the validity of a transmission, message or originator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Aspects of Information Needing protection

Non-repudiation

A

you cannot deny the authenticity/validity of an act you committed, sender given proof of data delivery and recipient given proof of sender’s identity so that neither can deny processed data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Aspects of Information Needing protection

A
  1. Availability
  2. Confidentiality
  3. Authentication
  4. Non-repudiation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

is the resource being protected

A

Assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Assets

Physical assets

A

devices, computers, people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Assets

Logical assets

A

information, data (in transmission, storage, or processing), and intellectual property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Assets

System assets

A

any software, hardware, data, administrative, physical, communications, or personnel resource within an information system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Attacks

Passive attack

A

an attack in which the attacker observes interaction with the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Active attack

A

an attack in which the attacker directly interacts with the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Unintentional attack

A

an attack where there is not a deliberate goal of misuse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Exposure

A

is an instance when the system is vulnerable to attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Compromise

A

is a situation in which the attacker has succeeded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

is a recognized, action specific, generalized or theoretical that an adversary (threat actor) might be expected to take in preparation for an attack

A

Indicator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Consequence

A

is the outcome of the attack, may cause the information system to lose effectiveness and may have other costs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Consequence

Disruption

A

targets availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Consequence

Corruption

A

targets integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Consequence

Exploitation

A

targets confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
is a type of consequence, involving accidental exposure of information to an agent not authorized access.
Inadvertent disclosure
26
Taxonomy of attacks with relation to security goals
1. Threat to Confidentiality 2. Threat to integrity 3. Threat to availability
27
# Taxonomy of attacks with relation to security goals Threat to Confidentiality
1. Snooping 2. Traffic analysis
28
# Taxonomy of attacks with relation to security goals Threat to integrity
1. Modification 2. Masquerading 3. Replaying 4. Repudiation
29
# Taxonomy of attacks with relation to security goals Threat to availability
Denial of service
30
# Security Attack Confidentiality
information needs to be hidden from unauthorized access
31
# Security Attack Integrity
protected from unauthorized change
32
Availability
Available to an authorized entity when it is needed
33
1. Accurate 2. Timely 3. Complete 4. Verifiable 5. Consistent 6. Available
Characteristics of information to be useful
34
timely, reliable access to data and information services for authorized users
# Aspects of Information Needing protection Availability
35
you can only see the data but you cannot change it, protection against unauthorized modification or destruction of information
# Aspects of Information Needing protection Integrity
36
assurance that information is not disclosed to unauthorized parties
# Aspects of Information Needing protection Confidentiality
37
to identify and verify user’s identity , security measures to establish the validity of a transmission, message or originator
# Aspects of Information Needing protection Authentication
38
you cannot deny the authenticity/validity of an act you committed, sender given proof of data delivery and recipient given proof of sender’s identity so that neither can deny processed data
# Aspects of Information Needing protection Non-repudiation
39
1. Availability 2. Confidentiality 3. Authentication 4. Non-repudiation
Aspects of Information Needing protection
40
Assets
is the resource being protected
41
devices, computers, people
# Assets Physical assets
42
information, data (in transmission, storage, or processing), and intellectual property
# Assets Logical assets
43
any software, hardware, data, administrative, physical, communications, or personnel resource within an information system
# Assets System assets
44
an attack in which the attacker observes interaction with the system
# Attacks Passive attack
45
an attack in which the attacker directly interacts with the system
Active attack
46
an attack where there is not a deliberate goal of misuse
Unintentional attack
47
is an instance when the system is vulnerable to attack
Exposure
48
is a situation in which the attacker has succeeded
Compromise
49
Indicator
is a recognized, action specific, generalized or theoretical that an adversary (threat actor) might be expected to take in preparation for an attack
50
is the outcome of the attack, may cause the information system to lose effectiveness and may have other costs
Consequence
51
targets availability
# Consequence Disruption
52
targets integrity
# Consequence Corruption
53
targets confidentiality
# Consequence Exploitation
54
Inadvertent disclosure
is a type of consequence, involving accidental exposure of information to an agent not authorized access.
55
1. Threat to Confidentiality 2. Threat to integrity 3. Threat to availability
Taxonomy of attacks with relation to security goals
56
1. Snooping 2. Traffic analysis
# Taxonomy of attacks with relation to security goals Threat to Confidentiality
57
1. Modification 2. Masquerading 3. Replaying 4. Repudiation
# Taxonomy of attacks with relation to security goals Threat to integrity
58
Denial of service
# Taxonomy of attacks with relation to security goals Threat to availability
59
information needs to be hidden from unauthorized access
# Security Attack Confidentiality
60
protected from unauthorized change
# Security Attack Integrity
61
Available to an authorized entity when it is needed
Availability