Week 1 Flashcards

1
Q

What is Computer Security?

A

Measures and controls that ensure confidentiality, integrity, and availability of information system assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name the 5 Computer Security Requirements (AACIA)

A
1_  Accountability
2_ Availability
3_ Confidentiality
4_ Integrity
5_ Authenticity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

List 3 levels of impact on computer security breach

A

1_ Low
2_ Moderate
3_ High

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe 3 challenges of computer security

A

1_ Computer security is not as simple as it might first appear to the novice.
2_ Attackers only need to find a single weakness, while the designer must find and eliminate all weaknesses to achieve perfect security.
3_ Security requires regular and constant monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is an Adversary?

A

An entity that has the intent to conduct detrimental activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an Attack?

A

Any malicious activity that attempts to destroy information system resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a Countermeasure?

A

A device or techniques that has as its objective the impairment of adversarial activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a Risk?

A

A measure of the extent to which an entity is threatened.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Security Policy?

A

A set of criteria for the provision of security services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a System Resource (Asset)?

A

A logically related group of systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Threat?

A

Any circumstance or event with the potential to adversely impact organisational operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Vulnerability?

A

Weakness in an information system that could be exploited by a threat source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

List the hierarchy of assets of a computer system.

A
  • > Hardware
  • -> Software
  • –> Data (raw facts and figures)
  • —> Communication facilities and networks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the 3 categories of vulnerabilities?

A

1- Corrupted (loss of integrity)
2- Leaky (loss of confidentiality)
3- Very slow (loss of availability)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the 2 types of threats?

A

1- Exploit vulnerabilities

2- Harm to assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the 4 types Attacks?

A

1- Passive (Attempts to make use of info but wont affect the system)
2- Active (Attempts to affect the system)
3- Insider
4- Outsider

17
Q

What are the 4 types of Threat Consequences and list two attacks that may have caused them?

A

1- Unauthorised disclosure (e.g. Exposure, Interception)
2- Deception (e.g. Masquerade, Falsification)
3- Disruption (e.g. Corruption, Obstruction)
4- Usurpation (e.g. Misuse, Misappropriation)

18
Q

List 3 Countermeasures

A

1_ Incident response
2_ Access Control
3_ Audit and accountability

19
Q

List 3 Security design principles

A
  • Encapsulation
  • Separation of privileges
  • Layering
20
Q

What is an attack surface?

A

A reachable and exploitable vulnerability in a system

21
Q

List the 3 Attack Surface types

A
  • Network Attack surfaces
  • Software Attack surfaces
  • Human Attack surfaces
22
Q

What is an attack tree?

A

A hierarchical data structure that represents a set of

techniques for exploiting security vulnerabilities.

23
Q

What are the 4 Computer Security strategies?

A

1) Security policy
2) Security implementation
3) Assurance
4) Evaluation

24
Q

What is Malware?

A

A program that is inserted into a system with the intent of compromising the confidentiality, integrity, or availability of the victim’s data

25
Q

What are the 2 categories malware is split into?

A

1- How it spreads to desired targets (propagation)

2- How it performs once a target is reached (payload)

26
Q

What is an Attack Kit?

A

The deployment and development of malware by skilled software authors. E.g. Angler, Zeus

27
Q

Name 3 Attack Sources

A
  • Politics
  • Criminals
  • Government agencies
28
Q

What is an Advanced Persistent Threat (APT)? Give two examples of APTs

A

Well-resourced, persistent application of malware to selected targets. E.g. Social engineering, spear phishing emails

29
Q

What is a Virus?

A

A piece of software that infects programs

30
Q

What are the Virus components?

A
  • Infection mechanism
  • Trigger
  • Payload
31
Q

What are the phases of a Virus?

A

1 Dormant phase
2 Triggering phase
3 Propagation phase
4 Execution phase

32
Q

What is a Macro virus?

A

A virus that attaches itself to documents and uses the macro programming capabilities of the document’s application to execute and propagate.

33
Q

List 3 virus target categories

A
  • Boot sector infector
  • File infector
  • Macro virus
34
Q

List 3 virus concealment strategies

A
  • Encrypted virus
  • Polymorphic virus
  • Stealth virus