Podcast
Questions and Answers
Which of the following best describes the 'Principle of Easiest Penetration' in computer security?
Which of the following best describes the 'Principle of Easiest Penetration' in computer security?
- Intruders prefer complex methods of penetration to avoid detection.
- Security specialists should only focus on known vulnerabilities.
- Intruders always target the most heavily defended parts of a system.
- Intruders will exploit any available means of entry, often the weakest point. (correct)
Which of the following is an example of 'prevention' as a classification of security protection?
Which of the following is an example of 'prevention' as a classification of security protection?
- Installing CCTV cameras to record intruders.
- Using encryption when placing an order online. (correct)
- Calling the police after a burglary.
- Detecting unauthorized transactions on credit card statements.
In the CIA triad, what does 'Integrity' primarily ensure?
In the CIA triad, what does 'Integrity' primarily ensure?
- Assets are available only to authorized parties.
- Assets are accessible to authorized parties without delay.
- Assets remain hidden from unauthorized users.
- Assets can only be modified by authorized parties in authorized ways. (correct)
Which of the following best illustrates the concept of 'Availability' in the context of the CIA triad?
Which of the following best illustrates the concept of 'Availability' in the context of the CIA triad?
In security terms, if a person attempts to access a data item, which of the following is that person referred to as?
In security terms, if a person attempts to access a data item, which of the following is that person referred to as?
According to [Welke & Mayfield], which of the following is considered a particular aspect of integrity?
According to [Welke & Mayfield], which of the following is considered a particular aspect of integrity?
A denial-of-service (DoS) attack is most directly an attack on which aspect of the CIA triad?
A denial-of-service (DoS) attack is most directly an attack on which aspect of the CIA triad?
Which of the following is the primary focus of the AAA system in computer security?
Which of the following is the primary focus of the AAA system in computer security?
In the context of computer security, what is the difference between a 'threat' and a 'vulnerability'?
In the context of computer security, what is the difference between a 'threat' and a 'vulnerability'?
Which of the following best describes 'interception' as a security threat?
Which of the following best describes 'interception' as a security threat?
Which security threat is exemplified by a 'man-in-the-middle' attack?
Which security threat is exemplified by a 'man-in-the-middle' attack?
Which of the following is an example of 'fabrication' as a security threat?
Which of the following is an example of 'fabrication' as a security threat?
In security terminology, what is the term for the potential that a threat will exploit a vulnerability?
In security terminology, what is the term for the potential that a threat will exploit a vulnerability?
Which of the following is an example of a 'nonhuman' threat?
Which of the following is an example of a 'nonhuman' threat?
Which of the following would be classified as a hardware vulnerability?
Which of the following would be classified as a hardware vulnerability?
What is the primary purpose of 'encryption' as a method of defense in computer security?
What is the primary purpose of 'encryption' as a method of defense in computer security?
Which type of attacker is characterized by deep knowledge of operating systems but no intention to intentionally break any system?
Which type of attacker is characterized by deep knowledge of operating systems but no intention to intentionally break any system?
According to the Method-Opportunity-Motive framework, what three elements must an attacker have to ensure their success?
According to the Method-Opportunity-Motive framework, what three elements must an attacker have to ensure their success?
Ensuring that unauthorized users cannot access a system relates to which of the following?
Ensuring that unauthorized users cannot access a system relates to which of the following?
Which of the following is NOT a strong characteristic of a good password?
Which of the following is NOT a strong characteristic of a good password?
Computer security focuses on protecting assets, where an asset only includes hardware components.
Computer security focuses on protecting assets, where an asset only includes hardware components.
The principle of easiest penetration suggests that an intruder seeks the most complex and protected entry points.
The principle of easiest penetration suggests that an intruder seeks the most complex and protected entry points.
Prevention involves using mechanisms to detect how an asset has been damaged.
Prevention involves using mechanisms to detect how an asset has been damaged.
In the context of credit card fraud, using encryption when placing an order is an example of detection.
In the context of credit card fraud, using encryption when placing an order is an example of detection.
The CIA triad focuses on assets from the end user's perspective.
The CIA triad focuses on assets from the end user's perspective.
Confidentiality ensures assets of computing systems are available only to authorized third parties; this is also known as obscurity.
Confidentiality ensures assets of computing systems are available only to authorized third parties; this is also known as obscurity.
In the context of security, 'access' only refers to reading data, and not to viewing or printing it.
In the context of security, 'access' only refers to reading data, and not to viewing or printing it.
In the context of computer security, 'object' refers to person, process, or program.
In the context of computer security, 'object' refers to person, process, or program.
Data integrity means ensuring data is stored in such a way that allows modification by any user.
Data integrity means ensuring data is stored in such a way that allows modification by any user.
Availability refers to preventing legitimate users from accessing particular system resources or data.
Availability refers to preventing legitimate users from accessing particular system resources or data.
Denial of service is the condition opposite to availability.
Denial of service is the condition opposite to availability.
The AAA system (Authentication, Authorization, and Accounting) focuses on the system's assets point of view.
The AAA system (Authentication, Authorization, and Accounting) focuses on the system's assets point of view.
Authentication verifies what a user can access; authorization confirms the user's identity.
Authentication verifies what a user can access; authorization confirms the user's identity.
A vulnerability in a computing system is a circumstance that has the potential to cause loss or harm.
A vulnerability in a computing system is a circumstance that has the potential to cause loss or harm.
A threat is blocked by exercising control on a vulnerability.
A threat is blocked by exercising control on a vulnerability.
In the context of security threats, 'interruption' refers to an unauthorized party gaining access to an asset.
In the context of security threats, 'interruption' refers to an unauthorized party gaining access to an asset.
In the context of security threats, 'fabrication' refers to an unauthorized party tampering or modifying an asset.
In the context of security threats, 'fabrication' refers to an unauthorized party tampering or modifying an asset.
A 'threat agent' is the potential for harm in a system, whereas a 'vulnerability' is the individual or group attempting to exploit a weakness.
A 'threat agent' is the potential for harm in a system, whereas a 'vulnerability' is the individual or group attempting to exploit a weakness.
If the attacker intends to target any computer or user, it is a directed attack.
If the attacker intends to target any computer or user, it is a directed attack.
Using a mix of upper- and lower-case letters is a good way to defend a password from certain attacks.
Using a mix of upper- and lower-case letters is a good way to defend a password from certain attacks.
Flashcards
What is computer Security?
What is computer Security?
Protecting computer assets (hardware, software, data) that have value.
Types of computer assets
Types of computer assets
Hardware, software, data, processes, storage media, and people.
Principle of Easiest Penetration
Principle of Easiest Penetration
Attackers use the weakest point to breach security.
Prevention
Prevention
Signup and view all the flashcards
Detection
Detection
Signup and view all the flashcards
Reaction
Reaction
Signup and view all the flashcards
Confidentiality
Confidentiality
Signup and view all the flashcards
Integrity
Integrity
Signup and view all the flashcards
Availability
Availability
Signup and view all the flashcards
What does AAA stand for?
What does AAA stand for?
Signup and view all the flashcards
Authentication
Authentication
Signup and view all the flashcards
Authorization
Authorization
Signup and view all the flashcards
Accounting
Accounting
Signup and view all the flashcards
Vulnerability
Vulnerability
Signup and view all the flashcards
Threat
Threat
Signup and view all the flashcards
Interruption
Interruption
Signup and view all the flashcards
Interception
Interception
Signup and view all the flashcards
Modification
Modification
Signup and view all the flashcards
Fabrication
Fabrication
Signup and view all the flashcards
Control
Control
Signup and view all the flashcards
Security Penetration
Security Penetration
Signup and view all the flashcards
Confidentiality in security
Confidentiality in security
Signup and view all the flashcards
CIA Triad Perspective
CIA Triad Perspective
Signup and view all the flashcards
Security Subject
Security Subject
Signup and view all the flashcards
Security Object
Security Object
Signup and view all the flashcards
Access mode
Access mode
Signup and view all the flashcards
Policy in Security
Policy in Security
Signup and view all the flashcards
Data integrity
Data integrity
Signup and view all the flashcards
Denial of Service (DoS)
Denial of Service (DoS)
Signup and view all the flashcards
Computer Vulnerabilities
Computer Vulnerabilities
Signup and view all the flashcards
Exploitation
Exploitation
Signup and view all the flashcards
Security Threats
Security Threats
Signup and view all the flashcards
Security Risk
Security Risk
Signup and view all the flashcards
Amateur Attacker
Amateur Attacker
Signup and view all the flashcards
Denying the Attacker
Denying the Attacker
Signup and view all the flashcards
Data Access Control
Data Access Control
Signup and view all the flashcards
Password protection
Password protection
Signup and view all the flashcards
Study Notes
Security Goals - CIA Triad
- It is important to note that security is achieved through a combination of confidentiality, integrity, and availability.
Other Protection Requirements - AAA
- AAA system is from the user's point of view.
Vulnerabilities and Threats
- Vulnerability is a weakness in a system like procedures, design, or implementation, that can be exploited to cause loss or harm.
- A threat is a set of circumstances for computing systems that has the potential to cause loss or harm.
- A threat is controlled "blocked," by controlling the vulnerability.
Computer Network Vulnerabilities
- Vulnerabilities listed include radiation, taps, crosstalk, files, hardware, operator, systems programmer, maintenance man, software user, and remote consoles.
System Access Control - Continued
- To increase protection of passwords it is better that:
- Set passwords that are compulsory, and are not the default setting.
- The system can help improve password security by:
- Password checkers and password generation
- Password ageing
- Limit login attempts
- Inform users
Data Access Control
- Access rights are in the Bell-LaPadula model
- Uses an access control matrix
Effectiveness of Controls
- Continued: Ongoing task in judging the effectiveness of a control.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.