Basic Computer Security Concepts

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Listen to an AI-generated conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which of the following best describes the 'Principle of Easiest Penetration' in computer security?

  • Intruders prefer complex methods of penetration to avoid detection.
  • Security specialists should only focus on known vulnerabilities.
  • Intruders always target the most heavily defended parts of a system.
  • Intruders will exploit any available means of entry, often the weakest point. (correct)

Which of the following is an example of 'prevention' as a classification of security protection?

  • Installing CCTV cameras to record intruders.
  • Using encryption when placing an order online. (correct)
  • Calling the police after a burglary.
  • Detecting unauthorized transactions on credit card statements.

In the CIA triad, what does 'Integrity' primarily ensure?

  • Assets are available only to authorized parties.
  • Assets are accessible to authorized parties without delay.
  • Assets remain hidden from unauthorized users.
  • Assets can only be modified by authorized parties in authorized ways. (correct)

Which of the following best illustrates the concept of 'Availability' in the context of the CIA triad?

<p>Making sure that system resources are accessible to authorized users when needed. (B)</p>
Signup and view all the answers

In security terms, if a person attempts to access a data item, which of the following is that person referred to as?

<p>Subject (C)</p>
Signup and view all the answers

According to [Welke & Mayfield], which of the following is considered a particular aspect of integrity?

<p>Authorized actions, separation and protection of resources, error detection and correction (D)</p>
Signup and view all the answers

A denial-of-service (DoS) attack is most directly an attack on which aspect of the CIA triad?

<p>Availability (C)</p>
Signup and view all the answers

Which of the following is the primary focus of the AAA system in computer security?

<p>Managing user access and privileges. (A)</p>
Signup and view all the answers

In the context of computer security, what is the difference between a 'threat' and a 'vulnerability'?

<p>A threat is a set of circumstances with potential to cause harm; a vulnerability is a weakness that can be exploited. (B)</p>
Signup and view all the answers

Which of the following best describes 'interception' as a security threat?

<p>An unauthorized party gains access to an asset. (A)</p>
Signup and view all the answers

Which security threat is exemplified by a 'man-in-the-middle' attack?

<p>Interception (C)</p>
Signup and view all the answers

Which of the following is an example of 'fabrication' as a security threat?

<p>Inserting false records into a database. (C)</p>
Signup and view all the answers

In security terminology, what is the term for the potential that a threat will exploit a vulnerability?

<p>Risk (C)</p>
Signup and view all the answers

Which of the following is an example of a 'nonhuman' threat?

<p>A natural disaster causing a power outage. (C)</p>
Signup and view all the answers

Which of the following would be classified as a hardware vulnerability?

<p>Inadequate physical protection of servers. (D)</p>
Signup and view all the answers

What is the primary purpose of 'encryption' as a method of defense in computer security?

<p>To guarantee confidentiality. (D)</p>
Signup and view all the answers

Which type of attacker is characterized by deep knowledge of operating systems but no intention to intentionally break any system?

<p>Hackers (D)</p>
Signup and view all the answers

According to the Method-Opportunity-Motive framework, what three elements must an attacker have to ensure their success?

<p>Method, opportunity, and motive. (D)</p>
Signup and view all the answers

Ensuring that unauthorized users cannot access a system relates to which of the following?

<p>System Access Control (B)</p>
Signup and view all the answers

Which of the following is NOT a strong characteristic of a good password?

<p>Using actual names or words (D)</p>
Signup and view all the answers

Computer security focuses on protecting assets, where an asset only includes hardware components.

<p>False (B)</p>
Signup and view all the answers

The principle of easiest penetration suggests that an intruder seeks the most complex and protected entry points.

<p>False (B)</p>
Signup and view all the answers

Prevention involves using mechanisms to detect how an asset has been damaged.

<p>False (B)</p>
Signup and view all the answers

In the context of credit card fraud, using encryption when placing an order is an example of detection.

<p>False (B)</p>
Signup and view all the answers

The CIA triad focuses on assets from the end user's perspective.

<p>False (B)</p>
Signup and view all the answers

Confidentiality ensures assets of computing systems are available only to authorized third parties; this is also known as obscurity.

<p>False (B)</p>
Signup and view all the answers

In the context of security, 'access' only refers to reading data, and not to viewing or printing it.

<p>False (B)</p>
Signup and view all the answers

In the context of computer security, 'object' refers to person, process, or program.

<p>False (B)</p>
Signup and view all the answers

Data integrity means ensuring data is stored in such a way that allows modification by any user.

<p>False (B)</p>
Signup and view all the answers

Availability refers to preventing legitimate users from accessing particular system resources or data.

<p>False (B)</p>
Signup and view all the answers

Denial of service is the condition opposite to availability.

<p>True (A)</p>
Signup and view all the answers

The AAA system (Authentication, Authorization, and Accounting) focuses on the system's assets point of view.

<p>False (B)</p>
Signup and view all the answers

Authentication verifies what a user can access; authorization confirms the user's identity.

<p>False (B)</p>
Signup and view all the answers

A vulnerability in a computing system is a circumstance that has the potential to cause loss or harm.

<p>False (B)</p>
Signup and view all the answers

A threat is blocked by exercising control on a vulnerability.

<p>True (A)</p>
Signup and view all the answers

In the context of security threats, 'interruption' refers to an unauthorized party gaining access to an asset.

<p>False (B)</p>
Signup and view all the answers

In the context of security threats, 'fabrication' refers to an unauthorized party tampering or modifying an asset.

<p>False (B)</p>
Signup and view all the answers

A 'threat agent' is the potential for harm in a system, whereas a 'vulnerability' is the individual or group attempting to exploit a weakness.

<p>False (B)</p>
Signup and view all the answers

If the attacker intends to target any computer or user, it is a directed attack.

<p>False (B)</p>
Signup and view all the answers

Using a mix of upper- and lower-case letters is a good way to defend a password from certain attacks.

<p>True (A)</p>
Signup and view all the answers

Flashcards

What is computer Security?

Protecting computer assets (hardware, software, data) that have value.

Types of computer assets

Hardware, software, data, processes, storage media, and people.

Principle of Easiest Penetration

Attackers use the weakest point to breach security.

Prevention

Take measures to stop assets from being damaged in the first place.

Signup and view all the flashcards

Detection

Detect when, how, and by whom an asset has been damaged.

Signup and view all the flashcards

Reaction

Take measures to recover your assets or recover from the damage.

Signup and view all the flashcards

Confidentiality

Assets are available only to authorized parties.

Signup and view all the flashcards

Integrity

Assets can be modified only by authorized parties or ways.

Signup and view all the flashcards

Availability

Assets are accessible to authorized parties when needed without delay.

Signup and view all the flashcards

What does AAA stand for?

Authentication, Authorization, and Accounting

Signup and view all the flashcards

Authentication

Verifying the user's identity.

Signup and view all the flashcards

Authorization

Defining user's permitted actions.

Signup and view all the flashcards

Accounting

Tracking user activities and events.

Signup and view all the flashcards

Vulnerability

A weakness in the system that can be exploited for harm.

Signup and view all the flashcards

Threat

A set of circumstances with the potential to cause loss or harm.

Signup and view all the flashcards

Interruption

Asset of the system is destroyed or unusable.

Signup and view all the flashcards

Interception

Unauthorized access to an asset.

Signup and view all the flashcards

Modification

Unauthorized party tampers with an asset.

Signup and view all the flashcards

Fabrication

Unauthorized party inserts counterfeit items into the system.

Signup and view all the flashcards

Control

Something to counter threats.

Signup and view all the flashcards

Security Penetration

Computer security specialists must consider all possible means of penetration to protect assets.

Signup and view all the flashcards

Confidentiality in security

Assets of computing systems are available only to authorized parties.

Signup and view all the flashcards

CIA Triad Perspective

The CIA triad focuses protection from the asset's point of view, not the user's.

Signup and view all the flashcards

Security Subject

A person, process, or program that accesses data.

Signup and view all the flashcards

Security Object

Data item accessed by a 'subject'.

Signup and view all the flashcards

Access mode

How a subject can access data

Signup and view all the flashcards

Policy in Security

A policy dictates authorization

Signup and view all the flashcards

Data integrity

Assures that assets are precise, accurate and unmodified

Signup and view all the flashcards

Denial of Service (DoS)

Availability can be known as its apposite

Signup and view all the flashcards

Computer Vulnerabilities

Weakness that causes unauthorized access.

Signup and view all the flashcards

Exploitation

Using a vulnerability for harm.

Signup and view all the flashcards

Security Threats

The nature of the harm caused to assets.

Signup and view all the flashcards

Security Risk

The chance of harm occurring.

Signup and view all the flashcards

Amateur Attacker

Someone observes a flaw in security and exploits it.

Signup and view all the flashcards

Denying the Attacker

Deny the attacker of method, opportunity, or motive.

Signup and view all the flashcards

Data Access Control

Monitoring who can access what data.

Signup and view all the flashcards

Password protection

Setting and changing strong passwords.

Signup and view all the flashcards

Study Notes

Security Goals - CIA Triad

  • It is important to note that security is achieved through a combination of confidentiality, integrity, and availability.

Other Protection Requirements - AAA

  • AAA system is from the user's point of view.

Vulnerabilities and Threats

  • Vulnerability is a weakness in a system like procedures, design, or implementation, that can be exploited to cause loss or harm.
  • A threat is a set of circumstances for computing systems that has the potential to cause loss or harm.
  • A threat is controlled "blocked," by controlling the vulnerability.

Computer Network Vulnerabilities

  • Vulnerabilities listed include radiation, taps, crosstalk, files, hardware, operator, systems programmer, maintenance man, software user, and remote consoles.

System Access Control - Continued

  • To increase protection of passwords it is better that:
    • Set passwords that are compulsory, and are not the default setting.
  • The system can help improve password security by:
    • Password checkers and password generation
    • Password ageing
    • Limit login attempts
    • Inform users

Data Access Control

  • Access rights are in the Bell-LaPadula model
  • Uses an access control matrix

Effectiveness of Controls

  • Continued: Ongoing task in judging the effectiveness of a control.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Use Quizgecko on...
Browser
Browser