Computer Security Chapter 1
39 Questions
3 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which classification of protection involves taking measures to identify when and how an asset has been compromised?

  • Mitigation
  • Reaction
  • Prevention
  • Detection (correct)

In the context of computer security, what is primarily meant by the term 'asset'?

  • Physical components of a computer alone
  • Licenses that software has
  • Any item that holds value within a system (correct)
  • Technological innovations created

Which of the following scenarios best represents the 'prevention' classification of protection?

  • Reporting fraud to the police after it's discovered
  • Using a burglar alarm after a break-in
  • Identifying the thief through CCTV footage
  • Enforcing encryption when making an online purchase (correct)

What is an example of a 'reaction' in cyber security when faced with credit card fraud?

<p>Requesting a new credit card number after discovering fraud (A)</p> Signup and view all the answers

How does the 'principle of easiest penetration' relate to security measures?

<p>It indicates that intruders will exploit the path of least resistance. (A)</p> Signup and view all the answers

Which statement best captures the essence of confidentiality in computing systems?

<p>Only authorized parties can access information related to the existence of assets. (B)</p> Signup and view all the answers

What does integrity refer to in the context of computer assets?

<p>Assets can only be modified by authorized parties in authorized ways. (C)</p> Signup and view all the answers

In discussing the CIA triad, what does the term 'availability' imply?

<p>Assets must be accessible to authorized parties without unnecessary delays. (A)</p> Signup and view all the answers

Which term is not directly related to the concept of confidentiality?

<p>Data modification (C)</p> Signup and view all the answers

What best describes a 'subject' in the context of access control?

<p>A person, process, or program authorized to interact with data. (D)</p> Signup and view all the answers

What does the term 'integrity' imply when referring to an item?

<p>The item is precise and accurate. (A)</p> Signup and view all the answers

Which of the following is not a recognized aspect of integrity according to Welke & Mayfield?

<p>Accessibility of all users (B)</p> Signup and view all the answers

Which phrase best describes availability in the context provided?

<p>Assets should be present in a usable form for authorized users. (C)</p> Signup and view all the answers

In the context of availability, what does 'denial of service (DoS)' refer to?

<p>Legitimate access to services is restricted. (C)</p> Signup and view all the answers

What does authentication primarily determine in the AAA framework?

<p>The identity of the user attempting access. (A)</p> Signup and view all the answers

Which of the following statements best illustrates the concept of separation and protection of resources?

<p>Critical assets are isolated from general access to prevent breaches. (B)</p> Signup and view all the answers

Which feature is critical for detecting and correcting errors as mentioned?

<p>Implementing mechanisms that identify and rectify mistakes. (A)</p> Signup and view all the answers

How is the definition of availability appears to depend on the presented context?

<p>It is contingent upon having sufficient capacity to meet demand. (D)</p> Signup and view all the answers

What is the relationship between authorization and availability?

<p>Authorization limits user access to data and services. (A)</p> Signup and view all the answers

Computer security includes the protection of assets that have no value.

<p>False (B)</p> Signup and view all the answers

The principle of easiest penetration states that intruders will often use the most complex methods available to breach security.

<p>False (B)</p> Signup and view all the answers

In the context of computer security, 'prevention' includes taking measures that allow assets to be damaged.

<p>False (B)</p> Signup and view all the answers

Detection measures in computer security aim to identify unauthorized transactions after they occur.

<p>True (A)</p> Signup and view all the answers

The 'reaction' classification of protection does not include financial recovery from damages.

<p>False (B)</p> Signup and view all the answers

Confidentiality ensures assets are accessible to all parties without restriction.

<p>False (B)</p> Signup and view all the answers

Integrity can be defined uniformly across all contexts in computing.

<p>False (B)</p> Signup and view all the answers

Access modes include actions such as viewing, printing, and executing assets.

<p>True (A)</p> Signup and view all the answers

Availability describes the ability to modify assets at any time by any user.

<p>False (B)</p> Signup and view all the answers

The CIA triad only considers the perspective of the user rather than the assets.

<p>False (B)</p> Signup and view all the answers

Integrity can be defined as allowing modifications by anyone without restrictions.

<p>False (B)</p> Signup and view all the answers

Separation and protection of resources is one of the aspects recognized by Welke & Mayfield regarding integrity.

<p>True (A)</p> Signup and view all the answers

In computing, availability means that assets are accessible to unauthorized parties at all times.

<p>False (B)</p> Signup and view all the answers

Error detection and correction is considered a vital component of the integrity framework.

<p>True (A)</p> Signup and view all the answers

The AAA framework primarily focuses on data retention when managing user access.

<p>False (B)</p> Signup and view all the answers

Availability is sometimes referred to as denial of access, particularly in the context of DoS attacks.

<p>False (B)</p> Signup and view all the answers

The definition of availability includes being present in a non-usable form.

<p>False (B)</p> Signup and view all the answers

Authorship of actions is a proposed aspect of integrity related to authorized processes.

<p>True (A)</p> Signup and view all the answers

The concept of integrity can involve multiple properties being satisfied at the same time.

<p>True (A)</p> Signup and view all the answers

The AAA system is primarily concerned with physical security rather than user access.

<p>False (B)</p> Signup and view all the answers

Flashcards

Computer Security

The protection of valuable computer assets, including hardware, software, data, processes, storage media, and people.

Principle of Easiest Penetration

A principle that assumes an attacker will use any available means to exploit vulnerabilities and gain unauthorized access.

Prevention (Security)

Measures taken to prevent unauthorized access or damage to computer assets.

Detection (Security)

Measures taken to detect when an asset has been compromised, including the method and perpetrator.

Signup and view all the flashcards

Reaction (Security)

Measures taken to recover from a security breach and restore assets to their original state.

Signup and view all the flashcards

Confidentiality

Ensuring access to computer resources is restricted to authorized individuals or entities.

Signup and view all the flashcards

Integrity

Protecting the accuracy and reliability of data, ensuring it is modified only by authorized parties in authorized ways.

Signup and view all the flashcards

Availability

Ensuring authorized users can access resources without delay or interruption.

Signup and view all the flashcards

CIA Triad

The combination of Confidentiality, Integrity, and Availability, forming a foundational framework for securing information resources.

Signup and view all the flashcards

Subject (Security)

The person, process, or program that attempts to access a computer resource.

Signup and view all the flashcards

Data Integrity

A state where data is complete, accurate, and consistent, ensuring its reliability and trustworthiness.

Signup and view all the flashcards

Authorized Modifications

Modifying data in ways that are permitted and controlled, ensuring that changes are authorized and tracked.

Signup and view all the flashcards

Separation and Protection of Resources

Safeguarding resources, such as data and systems, to prevent unauthorized access or manipulation.

Signup and view all the flashcards

Error Detection and Correction

Mechanisms for identifying and correcting errors in data, maintaining its accuracy and reliability.

Signup and view all the flashcards

Denial of Service (DoS)

Preventing unauthorized access to data and resources, ensuring that only authorized users can interact with them.

Signup and view all the flashcards

Authentication

The process of verifying a user's identity, confirming that they are who they claim to be.

Signup and view all the flashcards

Authorization

Determining what actions a user is allowed to perform based on their identity and assigned permissions.

Signup and view all the flashcards

AAA (Authentication, Authorization, Accounting)

A framework comprising Authentication, Authorization, and Accounting, aiming to manage user access, enforce policies, and monitor resource consumption.

Signup and view all the flashcards

CIA (Confidentiality, Integrity, Availability)

The principles that underpin secure information systems, focusing on Confidentiality, Integrity, and Availability.

Signup and view all the flashcards

Study Notes

Chapter 1: Basic Security Concepts

  • Computer security protects computer system assets (items with value).
  • Assets include hardware, software, data, processes, storage media, and people.
  • The principle of easiest penetration states that intruders will likely use readily available means.

Introduction

  • Computer systems (hardware, software, and data) require security protection due to their value.
  • Three classifications of protection are:
    • Prevention: measures to prevent damage.
    • Detection: measures to identify when and how assets are damaged.
    • Reaction: measures to recover from damage.

Example from Physical world

  • Prevention: locks, walls, etc.
  • Detection: burglar alarms, CCTV cameras.
  • Reaction: contacting the police, replacing lost items.

Example from Cyber World: Credit Card Fraud

  • Prevention: encryption, merchant verification before accepting credit cards; avoiding use of credit cards online.
  • Detection: unauthorized transactions appearing on statements.
  • Reaction: requesting new card numbers, recovering losses from fraudsters or issuers.

Security Goals - CIA Triad

  • Confidentiality: assets are accessible only to authorized parties.
  • Integrity: assets can only be modified by authorized parties in authorized ways.
  • Availability: assets are accessible to authorized parties when needed.
  • Security is achieved through a combination of these aspects, from the asset's perspective, not the user's.

Confidentiality

  • Computer-related assets are accessed only by authorized parties.
  • Access includes not only reading but also viewing, printing, and knowing the asset exists.
  • A subject, object, access mode, and policy describe access to data items.

Integrity

  • Assets can be modified only by authorized parties in authorized ways.
  • Modification includes writing, changing status, deleting, and creating.
  • Integrity means different things in different contexts.
  • Examples of integrity include accuracy, precision, being unmodified, and being modified only by authorized entities and processes. Integrity should be internally consistent.

Integrity (continued)

  • Integrity can mean two or more properties.
  • Welke & Mayfield recognize three aspects:
    • Authorized actions
    • Separation and protection of resources.
    • Error detection and correction.

Availability

  • Assets are accessible to authorized parties at appropriate times.
  • Access should not be prevented from legitimate users.
  • Availability is sometimes known as the opposite: denial of service (DoS).
  • Availability applies to data and services.
  • Definition of availability depends on capacity to meet service's needs.

Other Protection Requirements

  • The AAA system manages user access while enforcing policies and privileges and measuring network resource use.
    • Authentication: verifying user identity
    • Authorization: determining user access permissions.
    • Accounting: tracking user activities and events.

Vulnerabilities and Threats

  • A vulnerability is a weakness in a system's design or implementation that might be exploited to cause loss or harm.
    • Examples: unauthorized data manipulation due to a lack of user verification; hardware failures; inappropriate software protections
  • A threat is a set of circumstances with the potential to cause loss or harm.
    • Understanding the difference between vulnerability (weakness) and threat (potential harm).
    • Example: rising water levels causing harm.

Computer Network Vulnerabilities

  • Various network components are potential vulnerabilities, like hardware failures, unauthorized access, inadequate software protection, improper connections, cross-coupling, and misconfigured protective features.

Security Threats

  • The CIA triad viewed from a different perspective, focusing on the nature and type of harm caused to assets, categorized into four acts:
    • Interruption: assets are unusable or destroyed (e.g., hard disk destruction, communication line cut).
    • Interception: unauthorized access to assets (e.g., wiretapping, illicit copying).
    • Modification: unauthorized tampering with assets (e.g., changing data file values, altering programs).
    • Fabrication: inserting counterfeit assets, damaging integrity (e.g., adding records to a file, inserting spurious messages).

Examples of Security

  • Interruption (hard disk destruction, communication line cutting, disabling file management system).
  • Interception (wiretapping, illicit copying of files or programs).
  • Modification (changing data values, altering programs, modifying files).
  • Fabrication (adding records to a file, inserting spurious network messages).

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Basic Security Concepts PDF

Description

Explore the foundational concepts of computer security in this quiz. Learn about asset protection, the principle of easiest penetration, and the three classifications of security measures: prevention, detection, and reaction. Test your understanding of these vital topics to safeguard computer systems.

More Like This

Computer Security Basics
15 questions
Computer Security Chapter 14 Quiz
46 questions
Introduction to Computer Security
40 questions
Use Quizgecko on...
Browser
Browser