Computer Security Chapter 1
40 Questions
2 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary focus of confidentiality in the context of the CIA Triad?

  • Accessibility of assets at all times
  • Limiting access to assets to authorized parties (correct)
  • Modification of assets by any user
  • Preserving the physical security of assets

Which of the following best describes integrity in the CIA Triad?

  • The ability to access data anytime without delay
  • The assurance that data can be modified by anyone without restrictions
  • The guarantee that data is always available to anyone who requests it
  • The state in which assets can only be modified by authorized parties in authorized ways (correct)

In the context of confidentiality, what does 'access' encompass?

  • Interactions like reading, printing, and knowing the existence of the asset (correct)
  • Only the ability to print or display data
  • Only the ability to read data
  • Preventing unauthorized users from knowing that an asset exists

Which term best describes a person, process, or program with respect to data access in the CIA Triad?

<p>Subject (C)</p> Signup and view all the answers

What does the term 'availability' in the CIA Triad refer to?

<p>Assets are accessible to authorized parties without delay (C)</p> Signup and view all the answers

Which of the following best defines computer security?

<p>The protection of various assets of a computer system. (B)</p> Signup and view all the answers

What classification involves measures that allow recovery from damage to assets?

<p>Reaction (B)</p> Signup and view all the answers

Which scenario is an example of detection in the context of cyber security?

<p>An unauthorized transaction appears on a credit card statement. (B)</p> Signup and view all the answers

What is a common prevention measure in the physical world as described?

<p>Locks on doors and window bars. (C)</p> Signup and view all the answers

What is the principle of Easiest Penetration in the context of security?

<p>Intruders are expected to find and exploit the weakest access point. (C)</p> Signup and view all the answers

What does preserving the integrity of an item imply?

<p>The item remains unmodified. (D)</p> Signup and view all the answers

Which aspect is NOT part of the integrity as recognized by Welke & Mayfield?

<p>Accessibility at all times. (B)</p> Signup and view all the answers

What is meant by the availability of assets?

<p>Assets are accessible at appropriate times to authorized parties. (C)</p> Signup and view all the answers

How is availability sometimes referred to?

<p>Denial of service. (A)</p> Signup and view all the answers

Which definition applies to the concept of availability?

<p>It must be present in usable form. (A)</p> Signup and view all the answers

What does the 'A' in the AAA framework stand for?

<p>Authorization. (A)</p> Signup and view all the answers

What is the primary focus of the AAA system?

<p>Managing user access and policies. (C)</p> Signup and view all the answers

Which of the following describes a legitimate user in the context of authentication?

<p>A user whose identity has been verified. (D)</p> Signup and view all the answers

Which one of the following is NOT an acceptable modification of an item?

<p>Modification by unauthorized processes. (D)</p> Signup and view all the answers

What ensures that errors in data can be identified and corrected?

<p>Error detection and correction processes. (A)</p> Signup and view all the answers

Confidentiality ensures that assets can be modified by any party regardless of authorization.

<p>False (B)</p> Signup and view all the answers

Integrity refers to the ability to create, modify, or delete assets only by authorized parties in authorized ways.

<p>True (A)</p> Signup and view all the answers

Access in the context of confidentiality only includes reading and viewing documents.

<p>False (B)</p> Signup and view all the answers

Availability ensures that authorized parties can access assets whenever they need them without delay.

<p>True (A)</p> Signup and view all the answers

The CIA Triad refers only to the viewpoint of the user regarding data security.

<p>False (B)</p> Signup and view all the answers

Computer security only includes the protection of hardware and software.

<p>False (B)</p> Signup and view all the answers

In the context of computer security, the classification of prevention involves measures like encryption when making online purchases.

<p>True (A)</p> Signup and view all the answers

Detection in cybersecurity refers to recovering assets after they have been damaged.

<p>False (B)</p> Signup and view all the answers

Calling the police after a theft is an example of prevention in the context of physical security.

<p>False (B)</p> Signup and view all the answers

A burglar alarm that activates during a break-in is an example of a detection measure.

<p>True (A)</p> Signup and view all the answers

Integrity can only mean being unmodified and precise.

<p>False (B)</p> Signup and view all the answers

Availability refers to the accessibility of assets to unauthorized parties.

<p>False (B)</p> Signup and view all the answers

The AAA framework is used to manage user access and enforce user policies.

<p>True (A)</p> Signup and view all the answers

Error detection and correction are recognized aspects of integrity by Welke & Mayfield.

<p>True (A)</p> Signup and view all the answers

Denial of service (DoS) is a term associated with availability.

<p>True (A)</p> Signup and view all the answers

An item can be modified in any way and still maintain its integrity.

<p>False (B)</p> Signup and view all the answers

Consistency is not a factor in determining the integrity of an item.

<p>False (B)</p> Signup and view all the answers

Authorized actions are essential for maintaining integrity as defined by Welke & Mayfield.

<p>True (A)</p> Signup and view all the answers

Integrity can be achieved solely through computer systems without real-world implementation.

<p>False (B)</p> Signup and view all the answers

The definition of availability includes being present in a non-usable form.

<p>False (B)</p> Signup and view all the answers

Flashcards

Prevention in Security

Measures taken to stop damage to an asset before it happens. Like installing locks or using encryption.

Detection in Security

The process of identifying when, how, and by whom an asset was damaged or compromised. Including things like detecting unauthorized transactions or system changes.

Reaction in Security

Steps taken after a security breach or damage to an asset to recover or minimize the damage. Could involve replacing data, changing passwords, or reporting a crime.

Principle of Easiest Penetration

An intruder will likely use any available method and exploit the easiest security vulnerabilities to gain unauthorized access to a system or data.

Signup and view all the flashcards

Assets in Computer Systems

Valuable components of a computer system, including hardware, software, data, processes, storage media, and people.

Signup and view all the flashcards

Confidentiality

Ensures that computer-related assets are accessed only by authorized parties. This means that only those who have the right to access information can do so. It's about preventing unauthorized access, including reading, viewing, printing, or even knowing that the information exists.

Signup and view all the flashcards

Integrity

Focuses on ensuring that information is accurate and complete, and that it is not tampered with. This prevents unauthorized changes to data, preventing any modification except by authorized parties. It also includes ensuring the authenticity or truthfulness of the data.

Signup and view all the flashcards

Availability

Makes sure that authorized users can access information and resources when they need them, without any delay. This means ensuring the resources are available, reliable, and functioning properly.

Signup and view all the flashcards

CIA Triad

The combination of confidentiality, integrity, and availability. It's a crucial aspect of information security, ensuring that data is protected against unauthorized access, modifications, and disruptions.

Signup and view all the flashcards

Subject

A person, process, or program that attempts to access information or resources. This could be a user, a software program, or even a system process.

Signup and view all the flashcards

Data Integrity

Preserving the original state of an item, ensuring it's unchanged or modified in acceptable ways.

Signup and view all the flashcards

Authentication

Verifying the user's identity, ensuring they are who they claim to be.

Signup and view all the flashcards

Authorization

Defining what actions a user is allowed to perform based on their identity and role.

Signup and view all the flashcards

Authorized Actions

The principle that modifications to an item are restricted to authorized individuals or processes.

Signup and view all the flashcards

Separation and Protection of Resources

The separation and protection of data and resources to prevent unauthorized access.

Signup and view all the flashcards

Error Detection and Correction

Mechanisms to detect and correct errors that may occur during data processing.

Signup and view all the flashcards

AAA System

A security framework that focuses on three processes: authentication, authorization, and accounting.

Signup and view all the flashcards

Denial of Service (DoS)

A situation where an attacker intentionally prevents legitimate users from accessing a service or resource.

Signup and view all the flashcards

Easiest Penetration Principle

The principle that any available means will be used by an intruder to access a system, assuming they will go for the easiest route.

Signup and view all the flashcards

What are computer system assets?

Anything of value within a computer system, including hardware, software, data, processes, storage media, and people.

Signup and view all the flashcards

What is prevention in security?

Methods to prevent damage to a computer system asset before it occurs, like using locks or encryption.

Signup and view all the flashcards

What is detection in security?

Methods to detect when an asset has been damaged or compromised, including alarms, logs, and monitoring.

Signup and view all the flashcards

What is reaction in security?

Steps to take after a security breach has occurred to recover or minimize the damage, such as restoring backups or reporting the incident.

Signup and view all the flashcards

Separation & Protection of Resources

Protecting resources like data and systems from unauthorized access, ensuring they are separated and kept secure.

Signup and view all the flashcards

Error Detection & Correction

Mechanisms that detect and correct errors that may occur during data processing.

Signup and view all the flashcards

Study Notes

Chapter 1: Basic Security Concepts

  • Computer security is the protection of computer system assets (items that have value).
  • Asset types include hardware, software, data, processes, storage media, and people.
  • The principle of easiest penetration means intruders will exploit the easiest available means.

Introduction

  • Computer systems (hardware, software, and data) have value and need protection.
  • Security protection is categorized into three areas:
    • Prevention: measures that stop damage
    • Detection: measures to identify when and how an asset is damaged.
    • Reaction: measures for recovering assets or damage.
  • Physical world examples of these: prevention (locks), detection (alarms, cameras), reaction (repair, contacting police).
  • Cyber world example of these: prevention (encryption), detection (unauthorized transactions), reaction (new card, recovering losses).

Security Goals - CIA Triad

  • Confidentiality: Assets are only accessible to authorized parties (secrecy, privacy).
  • Integrity: Assets can only be modified by authorized parties in authorized ways (accuracy, precision, unmodified, consistent, internally consistent, meaningful).
  • Availability: Assets are accessible to authorized parties when needed without any delay (capacity, performance, usability).
  • Security is achieved through a combination of these three areas, from the asset's point of view, not the user's.

Confidentiality

  • Ensures that computer-related assets are accessed only by authorized parties.
  • Also involves viewing, printing, and knowing that the asset exists, not just reading.
  • A general pattern is that a person, process, or program is authorized to access a data item in a specific way. Subjects are the person/process/program; Objects are the data item; access modes are operations (read, write, execute); policies are the authorizations.

Integrity

  • Assets can be modified only by authorized parties in authorized ways.
  • Modification includes writing, changing status, deleting, and creating.
  • Integrity means different things in various contexts (accurate, precise, unmodified).
  • Specifically, authorized actions, separation and protection of resources, and error detection and correction are components of integrity. Welke & Mayfield recognize these three particular aspects.

Availability

  • Assets are accessible to authorized parties at appropriate times.
  • Access to particular sets of objects should not be prevented from person/system who has legitimate access.
  • Availability is also characterized by its opposite, denial-of-service (DoS).
  • Availability applies both to data and services and depends on capacity to meet needs. Availability is sometimes known by its opposite - denial of service (DoS). Definition of availability depends on these points: having enough capacity to meet service needs, being accessible to authorized parties at appropriate times, and not being prevented from people/systems with legitimate access to particular objects.

Other Protection Requirements

  • The AAA (Authentication, Authorization, Accounting) system is from the user's perspective, not the asset's.
  • It manages user access, enforces policies and privileges, and measures network resource consumption. Authentication determines who the user is, Authorization defines what the user can do, and Accounting tracks user activities and events.

Vulnerabilities and Threats

  • A vulnerability is a weakness in a system's design, implementation, or procedures that can be exploited.
  • Threats to a computing system are circumstances that have the potential to cause loss or harm.
  • Security threats include interception, interruption, modification, and fabrication.

Computer Network Vulnerabilities

  • Various vulnerabilities are listed relating to hardware, software, communication, and access controls. Specific vulnerabilities are identified in the context of hardware, software, communication lines and access controls.

Security Threats

  • The CIA triad can be viewed from a different perspective, focusing on different types of harm caused to assets.
  • Harm types are interception, interruption, modification, and fabrication. Detailed examples are provided in the notes and are linked back to the threats.

Examples of Security

  • Examples are provided to illustrate interception, interruption, modification, and fabrication. The notes describe how these threats manifest in practical terms and involve examples such as destroying a hard disk, wiretapping, altering data files, adding records to a file, and inserting spurious messages in a network.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Basic Security Concepts PDF

Description

Explore the fundamental concepts of computer security in this quiz based on Chapter 1. Learn about the importance of protecting computer system assets and the security goals defined by the CIA triad: Confidentiality, Integrity, and Availability. Test your understanding of prevention, detection, and reaction measures in both physical and cyber domains.

More Like This

Computer Network Security Unit 1: CIA Triad
9 questions
Introduction to Computer Security
29 questions
Introduction to Computer Security
40 questions
Use Quizgecko on...
Browser
Browser