Computer Security Chapter 1: Introduction

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What characterizes a passive attack in a security context?

  • It targets system vulnerabilities directly.
  • It learns or makes use of information without affecting system resources. (correct)
  • It involves modifying system data to create chaos.
  • It actively disrupts system operations.

Which of the following best defines a countermeasure?

  • A metric for evaluating security effectiveness.
  • A set of guidelines for user behavior.
  • A method to increase the system's speed.
  • An action, device, or procedure to reduce threats or vulnerabilities. (correct)

What is a vulnerability in the context of system security?

  • A flaw or weakness that can be exploited to violate security policy. (correct)
  • An extreme threat that compromises data integrity.
  • A robust defense against potential threats.
  • An authorization mechanism for user access.

Which aspect does a security policy specifically address?

<p>The rules and practices for protecting sensitive resources. (D)</p>
Signup and view all the answers

Which determination is NOT typically made by security administrators?

<p>How much budget is allocated for security. (D)</p>
Signup and view all the answers

What is the primary purpose of a system as defined in the content?

<p>To interrelate elements for a common purpose or goal (A)</p>
Signup and view all the answers

Which of the following is NOT a type of system mentioned?

<p>Virtual systems (A)</p>
Signup and view all the answers

What three main aspects does security ensure according to NIST?

<p>Confidentiality, Integrity, and Availability (C)</p>
Signup and view all the answers

Which of the following best describes a physical system?

<p>An arrangement of existing entities (C)</p>
Signup and view all the answers

What is a characteristic of abstract systems as described in the content?

<p>They are composed of interdependent ideas or constructs (C)</p>
Signup and view all the answers

Why is it important to understand security goals in computing?

<p>To safeguard information system assets from risks (D)</p>
Signup and view all the answers

Which option describes the relationship between elements in a system?

<p>Elements interact to achieve a collective goal (B)</p>
Signup and view all the answers

What role do controls play in the context of security?

<p>They are measures that help achieve security principles like integrity (A)</p>
Signup and view all the answers

What is considered a potential security threat in computing?

<p>Exploitation of a vulnerability (B)</p>
Signup and view all the answers

What does risk entail concerning computing assets?

<p>Potential damage without consent (C)</p>
Signup and view all the answers

How is trust defined in the context of risk?

<p>Likelihood of people acting as expected (C)</p>
Signup and view all the answers

What is the primary focus of Information Security?

<p>Maintaining confidentiality, integrity, and availability of data (C)</p>
Signup and view all the answers

Which term is primarily concerned with management and assurance of risks related to information?

<p>Information Assurance (C)</p>
Signup and view all the answers

What could be a serious problem resulting from a security threat?

<p>Expectation of loss (D)</p>
Signup and view all the answers

How do Computer Security and Information Security differ?

<p>Information Security is concerned with data irrespective of its form. (A)</p>
Signup and view all the answers

What is the main challenge of trusting internet servers?

<p>Potential exposure to vulnerabilities (D)</p>
Signup and view all the answers

What does trust between two individuals indicate?

<p>Familiarity with each other’s actions (A)</p>
Signup and view all the answers

Which of the following areas is included within Computer Security?

<p>Network Security (D)</p>
Signup and view all the answers

What can the lack of trust in a computer system lead to?

<p>Skepticism about its expected performance (C)</p>
Signup and view all the answers

Which statement accurately describes CyberSecurity?

<p>It encompasses measures to protect networks and information systems from cyber threats. (A)</p>
Signup and view all the answers

What aspect does the term 'acceptable risk' refer to in information security?

<p>The level of risk that an organization is willing to accept. (D)</p>
Signup and view all the answers

Which of the following best describes the level of confidence in a computer system?

<p>Confidence in expected behavior (D)</p>
Signup and view all the answers

Which of the following correctly distinguishes between Computer Security and Information Security?

<p>Information Security encompasses risks while Computer Security does not. (D)</p>
Signup and view all the answers

Which of the following is NOT considered a part of information system assets?

<p>Personnel management (A)</p>
Signup and view all the answers

What type of servers are considered the most trusted according to the content?

<p>Internal servers (B)</p>
Signup and view all the answers

Which type of users is categorized as less trusted due to the potential for abuse?

<p>Internal users (A)</p>
Signup and view all the answers

Why are Internet servers classified as the least trusted?

<p>They are often accessed by unverifiable users. (C)</p>
Signup and view all the answers

Which of the following is a characteristic of hackers as described in the content?

<p>They often report vulnerabilities in software. (D)</p>
Signup and view all the answers

What is a primary difference between hackers and crackers?

<p>Hackers do not engage in malicious activities. (D)</p>
Signup and view all the answers

Which type of malware replicates itself through email and network facilities?

<p>Virus (B)</p>
Signup and view all the answers

What term is used for individuals who use pre-written scripts to exploit systems, often lacking advanced skills?

<p>Script kiddie (C)</p>
Signup and view all the answers

What distinguishes a Trojan horse from other types of malware?

<p>It disguises itself as useful software without replicating. (A)</p>
Signup and view all the answers

What is the primary reason that internal servers are considered the most trusted?

<p>They are under known management and control. (C)</p>
Signup and view all the answers

What typically characterizes less trusted users within a network?

<p>They may exploit privileges for malicious purposes. (D)</p>
Signup and view all the answers

Which category does the Internet servers fall into regarding trust levels?

<p>Least trusted (D)</p>
Signup and view all the answers

What does the term 'risk' refer to in the context of computing assets?

<p>Any cause that may damage computing assets unexpectedly. (B)</p>
Signup and view all the answers

What is the purpose of the Secure Sockets Layer (SSL)?

<p>To encrypt data transmitted over a network. (C)</p>
Signup and view all the answers

How is 'trust' described in the context of network security?

<p>The degree of faith in user behavior. (D)</p>
Signup and view all the answers

What is a significant concern regarding remote, unauthenticated users?

<p>They do not have established identities or credentials. (B)</p>
Signup and view all the answers

What is likely to be a consequence of a vulnerability being exploited?

<p>Loss of data integrity and potential security breaches. (B)</p>
Signup and view all the answers

Flashcards

What is a system?

A set of interconnected parts that work together to achieve a specific goal. Systems can be abstract, like a set of ideas, or physical, like a computer.

What is security?

Measures taken to safeguard information systems and their assets, ensuring confidentiality, integrity, and availability.

Confidentiality

The assurance that only authorized individuals can access sensitive information.

Integrity

Ensuring that data remains accurate and unaltered, preventing unauthorized modifications.

Signup and view all the flashcards

Availability

Guaranteeing that systems and data are accessible to authorized users when needed.

Signup and view all the flashcards

Contradictory Security Goals

Confidentiality, integrity, and availability are essential for information security. But they can sometimes conflict with each other, needing careful balancing.

Signup and view all the flashcards

Information Security

Measures taken to guarantee the confidentiality, integrity, and availability of information system assets.

Signup and view all the flashcards

Computer Security

Focuses on the correct operation and availability of a computer system, without specific concern for data.

Signup and view all the flashcards

Information Security

Ensuring the confidentiality, integrity, and availability of data in all forms, including electronic, print, and physical.

Signup and view all the flashcards

Information Assurance

The assurance of information and management of risks associated with information use, processing, storage, and transmission.

Signup and view all the flashcards

Cybersecurity

A broad term encompassing cybersecurity, network security, and information security, focusing on protecting computer systems and networks.

Signup and view all the flashcards

Data Security

Protecting data and systems from unauthorized access, use, disclosure, disruption, modification, or destruction.

Signup and view all the flashcards

Network Security

Measures taken to prevent unauthorized access, use, disclosure, disruption, modification, or destruction of network data.

Signup and view all the flashcards

Application Security

Measures taken to prevent unauthorized access, use, disclosure, disruption, modification, or destruction of software applications.

Signup and view all the flashcards

Trust in Computing Security

The likelihood that individuals will act in a predictable and expected manner, often based on a prior relationship or understanding.

Signup and view all the flashcards

Computing Security Risk

Anything that could potentially damage your computer system or sensitive data without your knowledge or consent.

Signup and view all the flashcards

Security Threat

An attack that exploits a weakness or vulnerability in a system to gain unauthorized access or cause harm.

Signup and view all the flashcards

Vulnerability

A flaw or weakness in a system that could be exploited by a security threat.

Signup and view all the flashcards

Trust in Computer Systems

The level of confidence we have that a computer system or its components will operate as intended.

Signup and view all the flashcards

Security Risk Impact

The potential negative consequences or damage that could result from a security risk being realized.

Signup and view all the flashcards

Security Risk Probability

The likelihood that a specific security risk will actually occur.

Signup and view all the flashcards

Expectation of Loss

The anticipation or expectation of loss or damage that may result from a security risk.

Signup and view all the flashcards

What is Trust in Computing?

Trust is the belief that someone or something will act in a predictable and reliable manner. In computing, it refers to the level of confidence we have that systems or components will behave as expected.

Signup and view all the flashcards

What is Risk in Computing?

Risk in computing refers to any event or circumstance that could potentially jeopardize the security or integrity of your computer systems and data.

Signup and view all the flashcards

Why are internal servers considered the Most Trusted?

Internal servers, domain controllers, and storage devices are considered the most trusted components within a network because they are typically under strict control and security measures.

Signup and view all the flashcards

Why are internal users considered Less Trusted?

Internal users and remote, authenticated users are considered less trusted than internal servers because there is a higher possibility for human error or misuse of privileges.

Signup and view all the flashcards

Why are internet servers considered the Least Trusted?

Internet servers and remote, unauthenticated users are considered the least trusted because they pose the highest security risk due to the lack of control and verification.

Signup and view all the flashcards

What is SSL and TLS?

Secure Sockets Layer (SSL) and Transport Layer Security (TLS) are protocols that use certificates to establish encrypted connections between a client and a server, ensuring secure communication.

Signup and view all the flashcards

What is a computer virus?

A type of malicious software that spreads by copying itself to other programs or files, often via email or network shares.

Signup and view all the flashcards

What is a worm?

A type of malware that replicates itself and spreads to other computers without human interaction.

Signup and view all the flashcards

What is a Trojan horse?

A type of malware disguised as a benign program to gain access to a user's computer and steal data.

Signup and view all the flashcards

What is spyware?

A type of malware that secretly collects information about a user's activities and sends it to a third-party without their knowledge.

Signup and view all the flashcards

What is a hacker?

A person who is skilled in computer systems and uses their knowledge to gain unauthorized access to information.

Signup and view all the flashcards

What is a cracker?

A person who uses their computer skills for malicious purposes, like stealing data or disrupting systems.

Signup and view all the flashcards

What is a script kiddie?

A person with limited skills who uses pre-made tools to exploit vulnerabilities in systems.

Signup and view all the flashcards

What is a system vulnerability?

Any weakness or flaw in a system that could be exploited by attackers to gain unauthorized access or disrupt operations.

Signup and view all the flashcards

Countermeasure

An action, device, procedure, or technique that helps reduce the risk of a threat exploiting a vulnerability.

Signup and view all the flashcards

Risk

The probability of a particular threat exploiting a vulnerability, leading to a specific harmful outcome.

Signup and view all the flashcards

Security Policy

A set of rules and practices that describe how a system or organization protects sensitive data and resources.

Signup and view all the flashcards

System Resource

Any computing infrastructure or assets that require protection.

Signup and view all the flashcards

Threat

A potential threat to the security of a system.

Signup and view all the flashcards

Study Notes

Chapter 1: Introduction

  • Introduction to the study of computer security.
  • Topics covered include: what secure means, risks in computing, security goals (confidentiality, integrity, availability), and contradictory goals.

System Definition

  • A system is a conceptual framework used to interrelate elements.
  • Defined as a set of interconnected elements that collectively work towards a shared purpose or goal.
  • Systems can be abstract (interrelated ideas) or physical (tangible entities, like computing systems).

Security Definition (NIST)

  • Security is defined as measures and controls that ensure confidentiality, integrity, and availability of information system assets.
  • 'Is the protection as well as maintenance of the level of acceptable risk'.
  • Related Terminologies include: Computer Security, Information Security, Information Assurance, and Cybersecurity. These are viewed as somewhat distinct but also overlapping.

Computing System Security

  • Computer Security: focuses on the availability and correct operation of a computer system, regardless of the specific data stored.
  • Network Security: is part of computer security and involves the security of the components and connections in a computer network.
  • Examples are: hubs, switches, routers, modems and gateways
  • Data Security: addresses the security of data (where it is stored, who uses it, how it is protected)
  • This also discusses the concept of data as being stored, processed, and disseminated.

Additional Security Aspects

  • Application Security: protecting software and applications from vulnerabilities and attacks.
  • Endpoint Security: focuses on security for individual devices.
  • Security Incident Response: procedures for handling security incidents.
  • Security Awareness and Training: educating users about security threats.

Risk Concept

  • Risk is anything that can damage computing assets without consent or knowledge.
  • This includes potential security threats and vulnerabilities.
  • Causes for it include a lack or failure of trust.

Trust

  • Trust is the likelihood that people will act as expected.
  • Trust can exist between individuals, but not between a user and an unknown server, therefore trust should not be assumed.
  • The level of confidence in a computer system or its components to behave as expected.
  • Trust is critical; but can be difficult to establish between users and unknown entities.

Types of Trust (and less Trust)

  • Most trusted: internal servers, domain controllers, and storage devices attached to the network.
  • Less trusted: internal users and remote, authenticated users (because of the minority who misuse their access).
  • Least trusted: Internet servers and remote, unauthenticated users (as they are often unknown/outside the system and can’t be fully trusted).

Systems Weaknesses

  • External Weaknesses include: malware, spyware, hackers (individuals skilled in gaining access without explicit authorization), crackers (individuals seeking to exploit security vulnerabilities), and script kiddies (those who use tools/scripts without extensive skill/technical expertise).
  • Internal Weaknesses include: authenticated users, unauthorized programs, and unpatched software.

Common Security Mistake

  • Incorrectly assuming that attacks only originate from outside the organization.

Security Objectives (Goals)

  • Confidentiality: ensuring no data is disclosed accidentally or intentionally.
  • Integrity: preventing unauthorized modifications to the data.
  • Availability: guaranteeing that systems and services are accessible to authorized users when needed.

CIA triad

  • Acronym for the security goals of Confidentiality, Integrity, and Availability. - These concepts are often mentioned together in computer security discussions.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Information and Computer Security Basics
17 questions
Understanding Computer Security
37 questions
Use Quizgecko on...
Browser
Browser