Podcast
Questions and Answers
What is the primary focus of computer security?
What is the primary focus of computer security?
- To enhance user experience in software applications.
- To protect the assets of a computer or computer system. (correct)
- To maximize profits from computer systems.
- To increase the speed of computer operations.
Which classification does not belong among the measures to protect computer assets?
Which classification does not belong among the measures to protect computer assets?
- Detection
- Obsolescence (correct)
- Prevention
- Reaction
What is an example of a preventive measure in the physical world?
What is an example of a preventive measure in the physical world?
- Noticing that an item is missing.
- Installing a surveillance camera.
- Using locks on doors and window bars. (correct)
- Calling the police after a theft.
In the case of credit card fraud, what is a detection measure?
In the case of credit card fraud, what is a detection measure?
Which of the following statements about reaction measures in cyber security is true?
Which of the following statements about reaction measures in cyber security is true?
What is a vulnerability in a computing system?
What is a vulnerability in a computing system?
Which statement best describes a threat to a computing system?
Which statement best describes a threat to a computing system?
How can the risk associated with a vulnerability be controlled?
How can the risk associated with a vulnerability be controlled?
In the example of the man and the rising water, what does the water represent?
In the example of the man and the rising water, what does the water represent?
What is the relationship between a vulnerability and a threat?
What is the relationship between a vulnerability and a threat?
What is the primary focus of Confidentiality in the CIA Triad?
What is the primary focus of Confidentiality in the CIA Triad?
What encompasses the authorization in the context of asset access?
What encompasses the authorization in the context of asset access?
In the CIA Triad, what does Integrity refer to?
In the CIA Triad, what does Integrity refer to?
Which of the following is an example of access modes defined under Confidentiality?
Which of the following is an example of access modes defined under Confidentiality?
What role do subjects play in the context of the CIA Triad?
What role do subjects play in the context of the CIA Triad?
What does Availability ensure in the context of the CIA Triad?
What does Availability ensure in the context of the CIA Triad?
Which statement best encapsulates the concept of Integrity?
Which statement best encapsulates the concept of Integrity?
What does preserving the integrity of an item imply?
What does preserving the integrity of an item imply?
Which aspect of integrity involves managing changes to resources?
Which aspect of integrity involves managing changes to resources?
What does availability refer to in the context of assets?
What does availability refer to in the context of assets?
In what context is the term 'denial of service' used?
In what context is the term 'denial of service' used?
Which of the following is NOT a component of the AAA framework?
Which of the following is NOT a component of the AAA framework?
What is the primary purpose of authentication within the AAA framework?
What is the primary purpose of authentication within the AAA framework?
What should happen to resources in order to ensure proper protection?
What should happen to resources in order to ensure proper protection?
Which property does NOT directly relate to the concept of integrity?
Which property does NOT directly relate to the concept of integrity?
Which of the following statements about error detection is accurate?
Which of the following statements about error detection is accurate?
What defines the usability of assets in terms of availability?
What defines the usability of assets in terms of availability?
Computer security is the protection of assets of a computer system.
Computer security is the protection of assets of a computer system.
There are five classifications of protection in computer security.
There are five classifications of protection in computer security.
Detection measures can help identify when an asset has been damaged.
Detection measures can help identify when an asset has been damaged.
In the case of credit card fraud, reaction measures do not include asking for a new credit card number.
In the case of credit card fraud, reaction measures do not include asking for a new credit card number.
Prevention measures in computer security can include using encryption.
Prevention measures in computer security can include using encryption.
Confidentiality ensures that assets are accessible to any party.
Confidentiality ensures that assets are accessible to any party.
Integrity allows assets to be modified by any party without restrictions.
Integrity allows assets to be modified by any party without restrictions.
Availability guarantees that assets are accessible to authorized parties when needed.
Availability guarantees that assets are accessible to authorized parties when needed.
The CIA Triad consists of Confidentiality, Integrity, and Authenticity.
The CIA Triad consists of Confidentiality, Integrity, and Authenticity.
In the context of asset access, an access mode can include read, write, or execute.
In the context of asset access, an access mode can include read, write, or execute.
Modification of assets under Integrity includes actions like deleting and creating.
Modification of assets under Integrity includes actions like deleting and creating.
Access to assets can be granted to anyone based on personal preference.
Access to assets can be granted to anyone based on personal preference.
A vulnerability in a system is a strength that prevents exploitation.
A vulnerability in a system is a strength that prevents exploitation.
A threat to a computing system is a set of circumstances that has the potential to cause loss or harm.
A threat to a computing system is a set of circumstances that has the potential to cause loss or harm.
Manipulating user identities can help secure a system against threats.
Manipulating user identities can help secure a system against threats.
The water in the example represents security threats.
The water in the example represents security threats.
Controlling a vulnerability helps block a threat.
Controlling a vulnerability helps block a threat.
Integrity means the item is unmodified.
Integrity means the item is unmodified.
Availability refers to unauthorized access to assets.
Availability refers to unauthorized access to assets.
Error detection and correction are important aspects of integrity.
Error detection and correction are important aspects of integrity.
Denial of service (DoS) is an aspect of integrity.
Denial of service (DoS) is an aspect of integrity.
The AAA framework includes authentication, authorization, and assurance.
The AAA framework includes authentication, authorization, and assurance.
Integrity can involve modification only by authorized people.
Integrity can involve modification only by authorized people.
Availability requires that data is present in an unusable form.
Availability requires that data is present in an unusable form.
The integrity of an item can be characterized by its meaningfulness.
The integrity of an item can be characterized by its meaningfulness.
Separation and protection of resources are part of the integrity aspects.
Separation and protection of resources are part of the integrity aspects.
Assets must be inaccessible to authorized parties during a denial of service.
Assets must be inaccessible to authorized parties during a denial of service.
Flashcards
What is computer security?
What is computer security?
The act of protecting assets, which include hardware, software, data, processes, storage media, and people, from unauthorized access, use, disclosure, disruption, modification, or destruction.
Principle of Easiest Penetration
Principle of Easiest Penetration
A principle that assumes an intruder will exploit any available weakness or vulnerability to gain access to a system.
Prevention (Security)
Prevention (Security)
Measures taken to stop an attack or security breach from happening in the first place.
Detection (Security)
Detection (Security)
Signup and view all the flashcards
Reaction (Security)
Reaction (Security)
Signup and view all the flashcards
Confidentiality
Confidentiality
Signup and view all the flashcards
Integrity
Integrity
Signup and view all the flashcards
Availability
Availability
Signup and view all the flashcards
CIA Triad
CIA Triad
Signup and view all the flashcards
Subject
Subject
Signup and view all the flashcards
Object
Object
Signup and view all the flashcards
Access Mode
Access Mode
Signup and view all the flashcards
Vulnerability
Vulnerability
Signup and view all the flashcards
Threat
Threat
Signup and view all the flashcards
Risk
Risk
Signup and view all the flashcards
Security Controls
Security Controls
Signup and view all the flashcards
Data Integrity
Data Integrity
Signup and view all the flashcards
Data Availability
Data Availability
Signup and view all the flashcards
Data Authorization
Data Authorization
Signup and view all the flashcards
Data Separation and Protection
Data Separation and Protection
Signup and view all the flashcards
Error Detection and Correction
Error Detection and Correction
Signup and view all the flashcards
Authentication
Authentication
Signup and view all the flashcards
Authorization
Authorization
Signup and view all the flashcards
AAA System
AAA System
Signup and view all the flashcards
Denial of Service (DoS)
Denial of Service (DoS)
Signup and view all the flashcards
Computer Security
Computer Security
Signup and view all the flashcards
Prevention
Prevention
Signup and view all the flashcards
Detection
Detection
Signup and view all the flashcards
Reaction
Reaction
Signup and view all the flashcards
Integrity (Data Security)
Integrity (Data Security)
Signup and view all the flashcards
Availability (Data Security)
Availability (Data Security)
Signup and view all the flashcards
Study Notes
Chapter 1: Basic Security Concepts
- Computer security protects computer system assets.
- Assets include hardware, software, data, processes, storage media, and people.
- The "Principle of Easiest Penetration" suggests intruders will use readily available methods.
- Security protection has three classifications:
- Prevention: measures to stop damage.
- Detection: identifying when and how assets are harmed.
- Reaction: measures to recover from damage.
Example from the Physical World
- Prevention: Locks, walls prevent access to property.
- Detection: Noticing something missing triggers an alarm (CCTV, burglar alarm).
- Reaction: Calling the police or replacing stolen items.
Example from the Cyber World: Credit Card Fraud
- Prevention: Encryption and merchant checks before processing credit card orders or not using credit card numbers online.
- Detection: Unauthorized transactions appearing on statements.
- Reaction: Requesting new cards, recovering costs from the fraudster.
Security Goals - CIA Triad
- Confidentiality: Assets accessible only to authorized parties.
- Integrity: Assets modified only by authorized parties.
- Availability: Authorized parties access needed assets without delay.
- Security is achieved through combining the CIA principles from an asset perspective, not a user perspective.
Confidentiality
- Computer assets are accessible only to authorized parties.
- Access includes viewing, printing, and knowing the existence of the asset.
- A subject is a person/process/program.
- An object is a data item.
- An access mode is the type of access (read, write, execute).
- A policy describes how access is controlled.
Integrity
- Assets can only be modified by authorized parties.
- Modification includes writing, changing status, deleting, creating.
- Integrity can mean various things in different contexts:
- Accurate
- Precise
- Unmodified
- Modified only in acceptable ways
- Modified only by authorized people
- Modified only by authorized processes
- Consistent
- Internally consistent
- Meaningful and usable
- Specific aspects of integrity: authorized actions, separation, protection of resources, and error detection/correction.
Availability
- Assets are accessible to authorized parties at appropriate times.
- Denial of service (DoS), preventing access from authorized users, is an availability threat.
- Availability concerns both data and services.
- Factors affecting availability include capacity and service needs.
Other Protection Requirements (AAA)
- A three-process framework manages user access, enforces policies, and monitors network resource consumption.
- Authentication: Verifying user identity.
- Authorization: Determining user access permissions.
- Accounting: Tracking user activities and resource consumption.
Vulnerabilities and Threats
- A vulnerability is a weakness in a system's design or implementation.
- A threat is a circumstance that has the potential to cause harm or loss.
Computer Network Vulnerabilities
- Various hardware, software, and network vulnerabilities contribute to potential security threats. Examples include radiation, taps, cross-talk, communication lines, improper connections, and unauthorized access.
Security Threats (Interception, Interruption, Modification, Fabrication)
- Interruption: System unavailable or unusable.
- Interception: Unauthorized access to an asset.
- Modification: Tampering with an asset.
- Fabrication: Introducing counterfeit objects into a system.
Examples of Security Threats (Interruption, Interception, Modification, Fabrication)
- Interruption: Destroying hardware components such as a hard drive, cutting communication lines, and disabling file management systems.
- Interception: Wiretapping, illegally copying files.
- Modification: Altering data files, changing program behavior, modifying files.
- Fabrication: Adding records to files, inserting spurious messages into networks.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.