Podcast
Questions and Answers
In the early 2000s, some computing professionals and managers did recognize the value of the resources they used or controlled.
In the early 2000s, some computing professionals and managers did recognize the value of the resources they used or controlled.
False (B)
In the event of a computing crime, companies always investigate and prosecute.
In the event of a computing crime, companies always investigate and prosecute.
False (B)
A computing system includes hardware, software, data, and people.
A computing system includes hardware, software, data, and people.
True (A)
Every part of the computing system could be the target of a computing crime.
Every part of the computing system could be the target of a computing crime.
Signup and view all the answers
The strongest point in a computing system is the most serious vulnerability.
The strongest point in a computing system is the most serious vulnerability.
Signup and view all the answers
A logic bomb is a type of software vulnerability.
A logic bomb is a type of software vulnerability.
Signup and view all the answers
Storage media is a protected asset.
Storage media is a protected asset.
Signup and view all the answers
Origin Integrity provides Authentication.
Origin Integrity provides Authentication.
Signup and view all the answers
Data Integrity means that assets are modified only by unauthorized parties.
Data Integrity means that assets are modified only by unauthorized parties.
Signup and view all the answers
Availability refers to assets being accessible to unauthorized parties.
Availability refers to assets being accessible to unauthorized parties.
Signup and view all the answers
Frequent changes of passwords is an example of a simple but effective mechanism to maintain security.
Frequent changes of passwords is an example of a simple but effective mechanism to maintain security.
Signup and view all the answers
If policies align, discrepancies may create security vulnerabilities.
If policies align, discrepancies may create security vulnerabilities.
Signup and view all the answers
Specification is the requirements analysis and the statement of desired functionality.
Specification is the requirements analysis and the statement of desired functionality.
Signup and view all the answers
The design stage includes programs that carry out the design.
The design stage includes programs that carry out the design.
Signup and view all the answers
Recovery involves stopping the attack and repairing damage.
Recovery involves stopping the attack and repairing damage.
Signup and view all the answers
Intellectual Property refers to the ownership of ideas.
Intellectual Property refers to the ownership of ideas.
Signup and view all the answers
Using intellectual property does not require giving proper credit.
Using intellectual property does not require giving proper credit.
Signup and view all the answers
Amateurs are known for identifying the easiest points of entry into computer systems.
Amateurs are known for identifying the easiest points of entry into computer systems.
Signup and view all the answers
A 'vulnerability' refers to a safeguard implemented to minimize potential harm.
A 'vulnerability' refers to a safeguard implemented to minimize potential harm.
Signup and view all the answers
Human attacks, natural disasters, and the power grid are examples of threats to computer systems.
Human attacks, natural disasters, and the power grid are examples of threats to computer systems.
Signup and view all the answers
Disclosure, deception, disruption, and usurpation represent different categories of security breaches.
Disclosure, deception, disruption, and usurpation represent different categories of security breaches.
Signup and view all the answers
Accepting false data is an example of 'disclosure'.
Accepting false data is an example of 'disclosure'.
Signup and view all the answers
Preventing the correct operation of a system exemplifies 'disruption'.
Preventing the correct operation of a system exemplifies 'disruption'.
Signup and view all the answers
Encryption ensures complete availability of resources, regardless of protocol.
Encryption ensures complete availability of resources, regardless of protocol.
Signup and view all the answers
Software controls are typically the last aspect considered in computer security implementation.
Software controls are typically the last aspect considered in computer security implementation.
Signup and view all the answers
Site security is determined based on what an organization's guiding policies permit and prohibit.
Site security is determined based on what an organization's guiding policies permit and prohibit.
Signup and view all the answers
A 'trap door' denies access to a system, even with special privileges.
A 'trap door' denies access to a system, even with special privileges.
Signup and view all the answers
Shoulder surfing is a technique used in espionage or for gathering intelligence.
Shoulder surfing is a technique used in espionage or for gathering intelligence.
Signup and view all the answers
'Polymorphism' maintains a consistent and easily identifiable signature over time.
'Polymorphism' maintains a consistent and easily identifiable signature over time.
Signup and view all the answers
A 'script kiddie' is an expert who develops sophisticated software scripts for exploiting system vulnerabilities.
A 'script kiddie' is an expert who develops sophisticated software scripts for exploiting system vulnerabilities.
Signup and view all the answers
Using outdated security technology can lead to vulnerabilities.
Using outdated security technology can lead to vulnerabilities.
Signup and view all the answers
Risk analysis involves determining the need to protect trade secrets.
Risk analysis involves determining the need to protect trade secrets.
Signup and view all the answers
Copyrights determine the financial benefits of power and responsibility in organizations.
Copyrights determine the financial benefits of power and responsibility in organizations.
Signup and view all the answers
Software piracy is the most common type of breach.
Software piracy is the most common type of breach.
Signup and view all the answers
Malicious code is not a threat to information security.
Malicious code is not a threat to information security.
Signup and view all the answers
A denial-of-service attack can cause a business to be hacked out of existence.
A denial-of-service attack can cause a business to be hacked out of existence.
Signup and view all the answers
Worms require user initiation to replicate.
Worms require user initiation to replicate.
Signup and view all the answers
Espionage involves unauthorized access and data collection.
Espionage involves unauthorized access and data collection.
Signup and view all the answers
Blackmail is a form of information extortion.
Blackmail is a form of information extortion.
Signup and view all the answers
Acts of human error have no impact on information security.
Acts of human error have no impact on information security.
Signup and view all the answers
Natural disasters like floods and earthquakes can pose threats to information security.
Natural disasters like floods and earthquakes can pose threats to information security.
Signup and view all the answers
Flashcards
Deliberate acts of theft
Deliberate acts of theft
Illegal confiscation of equipment or information with intent.
Polymorphism
Polymorphism
Changes its shape over time to avoid detection.
Sabotage
Sabotage
Deliberate destruction of systems or information.
Espionage
Espionage
Signup and view all the flashcards
Technical obsolescence
Technical obsolescence
Signup and view all the flashcards
Vulnerability
Vulnerability
Signup and view all the flashcards
Crackers
Crackers
Signup and view all the flashcards
Exposure
Exposure
Signup and view all the flashcards
Encryption
Encryption
Signup and view all the flashcards
Software Controls
Software Controls
Signup and view all the flashcards
Disruption
Disruption
Signup and view all the flashcards
Confidentiality
Confidentiality
Signup and view all the flashcards
Usurpation
Usurpation
Signup and view all the flashcards
Policies
Policies
Signup and view all the flashcards
Software Vulnerabilities
Software Vulnerabilities
Signup and view all the flashcards
Trojan Horse
Trojan Horse
Signup and view all the flashcards
Virus
Virus
Signup and view all the flashcards
Logic Bomb
Logic Bomb
Signup and view all the flashcards
Trapdoor
Trapdoor
Signup and view all the flashcards
Data Security
Data Security
Signup and view all the flashcards
Weakest Point Vulnerability
Weakest Point Vulnerability
Signup and view all the flashcards
Risk Analysis
Risk Analysis
Signup and view all the flashcards
Trade Secrets
Trade Secrets
Signup and view all the flashcards
Copyrights
Copyrights
Signup and view all the flashcards
Trademarks
Trademarks
Signup and view all the flashcards
Patents
Patents
Signup and view all the flashcards
Software Piracy
Software Piracy
Signup and view all the flashcards
Malware
Malware
Signup and view all the flashcards
Denial-of-Service Attack
Denial-of-Service Attack
Signup and view all the flashcards
Worms
Worms
Signup and view all the flashcards
Data Integrity
Data Integrity
Signup and view all the flashcards
Origin Integrity
Origin Integrity
Signup and view all the flashcards
Availability
Availability
Signup and view all the flashcards
Security Goals
Security Goals
Signup and view all the flashcards
Hardware Vulnerabilities
Hardware Vulnerabilities
Signup and view all the flashcards
Legal Controls
Legal Controls
Signup and view all the flashcards
Cost-Benefit Analysis
Cost-Benefit Analysis
Signup and view all the flashcards
Intellectual Property
Intellectual Property
Signup and view all the flashcards
Security Mechanisms
Security Mechanisms
Signup and view all the flashcards
Study Notes
Computer Networks and Security
- Computer security is a concern for all computing professionals and managers.
- Intrusion can happen at any point in the computing system (hardware, software, data, people).
- The weakest part of a system is the most vulnerable.
- Security breaches include exposure (potential loss), vulnerability (system weakness), attack (human or natural), threats (human, natural, error), control (protective measure), and assets (hardware/software/data).
Types of Security Breaches
- Disclosure: unauthorized access to information (snooping)
- Deception: acceptance of false data (modification, spoofing, repudiation of origin, denial of receipt)
- Disruption: prevention of correct operation (modification, man-in-the-middle attack)
- Usurpation: unauthorized control of a system part.
Security Components
- Confidentiality: restricted access to assets
- Integrity: assets modified only by authorized parties.
- Availability: authorized parties can access assets
- Enables access to data and resources.
Security Vulnerabilities
- Hardware vulnerabilities
- Software vulnerabilities
- Data vulnerabilities
People Involved in Computer Crimes
- Amateurs
- Crackers
- Career criminals
Security Methods
- Encryption: protecting data confidentiality. Using encryption doesn't solve all security issues.
- Software controls (internal programs and development).
- Hardware controls (OS).
- Policies and mechanisms (define permitted/forbidden actions, enforce via mechanisms/simple but effective e.g., password changes).
Security Goals
- Prevention: stop attacks.
- Detection: find attacks.
- Recovery: stop attack, assess, and fix damage. Continue normal operations successfully even in attacks.
Threats to Information Security
- Intellectual property: piracy, software attacks.
- Software attacks: viruses, worms, malicious code, denial-of-service attacks
- Deviations in quality of service: ISP, power, WAN service problems
- Espionage or trespass: unauthorized access or data collection, hackers
- Forces of nature: fire, floods, earthquakes, lightning
- Acts of human error or failure: accidents, employee mistakes
Deliberate Acts
- Information extortion: blackmail, demanding compensation.
- Sabotage or vandalism: deliberate damage to a system or organization.
- Theft (physical, electronic, intellectual property).
- Cyber terrorism.
- Social engineering: manipulating users.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Test your knowledge on computer networks and security principles. This quiz covers various types of security breaches and essential components such as confidentiality, integrity, and availability. Assess your understanding of how to protect computing systems against threats and vulnerabilities.