Updated - INFO 310 FINAL Flashcards
(215 cards)
Protection of Assets, Prevention Detection, and Recovery
Goal of Cybersecurity
confidentiality, Integrity, Availability.
CIA
the concealment of information or resources
Confidentiality (CIA)
the trustworthiness of data or resources
Integrity (CIA)
the ability to use information or resources
Availability (CIA)
Deception, Disruption, Disclosure, Usurpation
Categories of Threats
The acceptance of false data
Deception (Category of threat)
the interruption or prevention of correct operation
Disruption (Category of threat)
The unauthorized access to information
Disclosure (Category of threat)
the unauthorized control of some part of a system
Usurpation (Category of threat)
the unauthorized interception of information, is a form of disclosure
Snooping or eavesdropping (Type of threat)
an unauthorized change of information is a form of usurpation, deception, and disclosure.
Modification or alteration (Type of threat)
an impersonation of one entity by another, is a form of both deception and usurpation.
Masquerading or spoofing (Type of threat)
a false denial that an entity sent (or created) something, is a form of deception.
Repudiation of origin
a false denial that an entity received some information or mes- sage, is a form of deception
Denial of receipt
a temporary inhibition of a service, is a form of usurpation, al- though it can play a supporting role in deception.
Delay
a long-term inhibition of service, is a form of usurpation often also used as a mechanism of deception.
Denial of service
Asset, Threat, Vulnerability, Risk
The Core of Cybersecurity
People, property, and information of value
Asset
Anything that can exploit a vulnerability, intentionally or acciden- tally, and obtain, damage, or destroy an asset.
Threat
Weaknesses or gaps in a security program that can be exploited by threats to gain unauthorized access to an asset.
Vulnerability
The potential for loss, damage or destruction of an asset as a result of a threat exploiting a vulnerability.
Risk
Asset + Threat + Vulnerability = Risk.
Formula for calculating risk
Any cipher based on substitution, using multiple substitution alphabets.
Polyalphabetic Ciphers