Computer Security: Concepts and Objectives

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Before the common use of data processing equipment, how was the security of information primarily maintained by organizations?

  • By physical and administrative controls. (correct)
  • Through advanced encryption algorithms.
  • Using sophisticated software applications.
  • Via complex network protocols.

What led to the need for automated tools to protect files and information stored on computers?

  • The increase in physical theft of computer hardware.
  • The development of advanced hacking techniques.
  • New government regulations mandating data protection.
  • The introduction of the computer. (correct)

Which development significantly influenced security by enabling data exchange between terminal users and computers?

  • The creation of the World Wide Web.
  • The standardization of database management systems.
  • The introduction of distributed systems. (correct)
  • The invention of the microprocessor.

What is the generic term that describes a collection of tools designed to protect data and prevent unauthorized access?

<p>Computer security. (A)</p>
Signup and view all the answers

What does Internet security primarily aim to achieve?

<p>To deter, prevent, detect, and correct security violations. (C)</p>
Signup and view all the answers

According to the NIST Computer Security Handbook, what are the three main objectives of computer security?

<p>Integrity, availability, and confidentiality. (C)</p>
Signup and view all the answers

What is the primary goal of data confidentiality?

<p>Preventing unauthorized access or disclosure of information. (A)</p>
Signup and view all the answers

How does privacy, as a computer security objective, relate to personal information?

<p>It gives individuals control over how their information is collected, stored, and disclosed. (B)</p>
Signup and view all the answers

What does data integrity ensure?

<p>Data is changed only in a specified and authorized manner. (A)</p>
Signup and view all the answers

Which aspect of computer security ensures that a system operates without unauthorized manipulation?

<p>System integrity. (A)</p>
Signup and view all the answers

What is the primary goal of availability in computer security?

<p>To ensure systems work promptly and are accessible to authorized users. (C)</p>
Signup and view all the answers

In the context of computer security, what does the term 'authenticity' refer to?

<p>Verifying that users are who they claim to be. (C)</p>
Signup and view all the answers

What security goal requires that actions performed on a system can be traced back to a specific entity?

<p>Accountability. (A)</p>
Signup and view all the answers

Which level of security breach impact could lead to a severe or catastrophic adverse effect on organizational assets?

<p>High. (D)</p>
Signup and view all the answers

Which of the following assets requires a high level of confidentiality?

<p>Student Grades. (D)</p>
Signup and view all the answers

What level of integrity would be assigned to a website that offers a forum for registered users?

<p>Moderate. (B)</p>
Signup and view all the answers

What makes computer security challenging?

<p>The need for constant monitoring. (B)</p>
Signup and view all the answers

What is a Security Attack?

<p>Any action that compromises the security of information owned by an organization (D)</p>
Signup and view all the answers

What is a Security Mechanism?

<p>A process designed to prevent, detect, or recover from a security attack (A)</p>
Signup and view all the answers

What is a Security Service?

<p>A processing or communication service that enhances the security of data processing systems (B)</p>
Signup and view all the answers

According to RFC 4949, what is the definition of a Threat?

<p>A potential violation of security that exists which can breach security and cause harm (A)</p>
Signup and view all the answers

According to RFC 4949, what is the definition of an Attack?

<p>An intelligent act to evade security services and violate the security policy of a system (B)</p>
Signup and view all the answers

What is the primary difference between passive and active security attacks?

<p>Active attacks attempt to alter system resources, while passive attacks do not. (A)</p>
Signup and view all the answers

Which type of passive attack focuses on obtaining information being transmitted?

<p>Traffic analysis. (C)</p>
Signup and view all the answers

What does a masquerade attack involve?

<p>One entity pretending to be another. (D)</p>
Signup and view all the answers

What activity characterizes a replay attack?

<p>Capturing and retransmitting data units for unauthorized effect. (D)</p>
Signup and view all the answers

Which type of active attack involves altering a portion of a legitimate message?

<p>Modification of messages. (B)</p>
Signup and view all the answers

What is the goal of a denial-of-service attack?

<p>To prevent or inhibit the normal use of communication facilities. (D)</p>
Signup and view all the answers

According to X.800, what is a security service defined as?

<p>A protocol layer ensuring system security and data transfer protection. (B)</p>
Signup and view all the answers

Based on the X.800 service categories, what service ensures that a communication is authentic?

<p>Authentication. (C)</p>
Signup and view all the answers

Which security service limits and controls access to host systems through communication links?

<p>Access Control. (B)</p>
Signup and view all the answers

What does data confidentiality primarily protect against?

<p>Passive attacks. (A)</p>
Signup and view all the answers

What does the security service of nonrepudiation prevent?

<p>Denial of a transmitted message by sender or receiver. (C)</p>
Signup and view all the answers

What does the Availability Service protect against?

<p>Denial of Service attacks (C)</p>
Signup and view all the answers

What is the purpose of Traffic Padding as a security mechanism?

<p>To frustrate traffic analysis attempts (A)</p>
Signup and view all the answers

Flashcards

Computer security

The generic name for the collection of tools designed to protect data and to thwart hackers.

Internet security

Measures to deter, prevent, detect, and correct security violations involving information transmission.

Data confidentiality

Ensuring private information is not available or disclosed to unauthorized individuals.

Privacy

Assuring individuals control what information is collected, stored, and by whom.

Signup and view all the flashcards

Data integrity

Assures that information and programs are changed only in a specified and authorized manner.

Signup and view all the flashcards

System integrity

A system performs its intended function in an unimpaired manner, free from unauthorized manipulation.

Signup and view all the flashcards

Availability

Systems work promptly and service is not denied to authorized users.

Signup and view all the flashcards

Authenticity

Verifying that users are who they say they are and that input comes from a trusted source.

Signup and view all the flashcards

Accountability

The security goal that actions of an entity can be traced uniquely to that entity.

Signup and view all the flashcards

Security attack

Any action that compromises the security of information owned by an organization.

Signup and view all the flashcards

Security mechanism

A process to detect, prevent, or recover from a security attack.

Signup and view all the flashcards

Security service

Service that enhances the security of data processing systems and information transfers.

Signup and view all the flashcards

Threats

A potential violation of security due to circumstances, capability, or action.

Signup and view all the flashcards

Attack

An assault on system security from an intelligent threat, evading security services.

Signup and view all the flashcards

Passive attack

Attempt to learn or use information without affecting system resources.

Signup and view all the flashcards

Active attack

Attempt to alter system resources or affect their operation.

Signup and view all the flashcards

Masquerade

One entity pretends to be a different entity.

Signup and view all the flashcards

Replay

Involves the passive capture of a data unit and its subsequent retransmission.

Signup and view all the flashcards

Modification of messages

A portion of a legitimate message is altered, delayed, or reordered.

Signup and view all the flashcards

Denial of service

Prevents or inhibits the normal use or management of communications facilities.

Signup and view all the flashcards

Security service(X.800)

A service that ensures adequate security of systems or data transfers.

Signup and view all the flashcards

Security service (RFC 4949)

A processing or communication service providing protection to system resources.

Signup and view all the flashcards

Authentication

Assuring communication is authentic; recipient knows message source.

Signup and view all the flashcards

Access control

Limit and control access to host systems and applications.

Signup and view all the flashcards

Data Confidentiality

Protecting transmitted data from passive attacks.

Signup and view all the flashcards

Data integrity

Assuring messages are received as sent, without modification.

Signup and view all the flashcards

Nonrepudiation

Preventing sender or receiver from denying a transmitted message.

Signup and view all the flashcards

Availability

Ensuring a system or resource is accessible and usable upon demand.

Signup and view all the flashcards

Encipherment

Mathematical algorithms transforming data into an unintelligible form.

Signup and view all the flashcards

Digital Signature

Data appended to ensure data origin and integrity, preventing forgery.

Signup and view all the flashcards

NIST

U.S. federal agency dealing with measurement science, standards, and tech related to U.S. Gov.

Signup and view all the flashcards

Internet Society

Organization addressing issues for the future of the Internet.

Signup and view all the flashcards

Study Notes

Computer Security Concepts

  • Before the widespread use of data processing equipment, security of information was primarily ensured through physical and administrative methods.
  • With computers, automated tools became necessary to protect files and stored information.
  • The introduction of distributed systems and networks impacted security, requiring data transfer protection between terminal users and computers/computers.
  • Computer security refers to tools protecting data and thwarting hackers.
  • Internet security includes measures to deter, prevent, detect, and correct security violations involving information transmission.
  • The NIST Computer Security Handbook defines computer security as protecting information systems to maintain integrity, availability, and confidentiality of resources.

Computer Security Objectives

  • Confidentiality ensures that private information is not available or disclosed to unauthorized entities.
  • Privacy allows individuals to control what information is collected, stored, and disclosed about them.
  • Data integrity ensures that information and programs are changed only in a specified and authorized way.
  • System integrity ensures a system performs unimpaired and is free from unauthorized manipulation.
  • Availability ensures system works promptly and is not denied to authorized users.

Additional Security Concepts

  • Authenticity confirms users are who they claim to be, and that each system input comes from a trusted source.
  • Accountability ensures actions of an entity can be traced to it.

Breach of Security Levels of Impact

  • High-level breaches have severe or catastrophic adverse effects on organizational operations, assets, or individuals.
  • Moderate-level breaches have a serious adverse effect on organizational operations, assets, or individuals.
  • Low-level breaches have a limited adverse effect on organizational operations, assets, or individuals.

Examples of Security Requirements

  • Confidentiality example: Student grade information must be highly confidential.
  • Integrity example: Patient information in a database must be accurate.
  • Availability example: Critical services require higher availability levels.
  • Online polls are an example of low-integrity requirements.
  • Public websites are an example of moderate availability requirements.
  • Online telephone apps are an example of low availability requirements.

Computer Security Challenges

  • Security is not simple and requires considering potential attacks.
  • Procedures for providing security are often counter-intuitive.
  • Deciding where to use various security mechanisms is necessary.
  • Requires constant monitoring.
  • Often treated as an afterthought.
  • Security mechanisms involve more than algorithms or protocols.
  • Security is a battle of wits between perpetrators and designers.
  • Security investment benefits are not always perceived until failure.
  • Strong security is often seen as hindering efficiency and user-friendliness.

OSI Security Architecture

  • Security attack: Any action compromising an organization’s information security.
  • Security mechanism: Process/device to detect, prevent, or recover from a security attack.
  • Security service: Enhances data processing/information transfer security, counters attacks, and uses security mechanisms.

Threats and Attacks (RFC 4949)

  • Threat: A potential security violation due to circumstances, capability, actions, or events.
  • Attack: An intelligent assault on system security, attempting to evade security services and violate policy.

Security Attacks

  • Security attacks are classified as passive and active.
  • Passive attack: Attempts to learn information from the system without affecting resources.
  • Active attack: Attempts to alter system resources or operations.

Passive Attacks

  • Passive attacks involve eavesdropping or monitoring transmissions.
  • The goal is to obtain transmitted information.
  • Two types: release of message contents and traffic analysis.

Active Attacks and Types

  • Active attacks involve modifying data streams or creating false ones.
  • Active attacks are hard to prevent due to vulnerabilities.
  • Detection is the goal.
  • Masquerade: When an entity pretends to be a different one.
  • Replay: Passively captures and retransmits a data unit to produce an unauthorized effect.
  • Modification of Messages: Alters, delays, or reorders messages to produce unauthorized effects.
  • Denial of Service: Prevents or inhibits normal communications facilities.

Security Services

  • Defined by X.800: A protocol layer service ensuring adequate security for systems or data transfers.
  • Defined by RFC 4949: A processing/communication service providing specific protection to system resources.

X.800 Security Services

  • Authentication
  • Access control
  • Data confidentiality
  • Data integrity
  • Nonrepudiation

X.800 Service Categories

  • Authentication assures communication authenticity.
    • Single message case: guarantees the message's origin.
    • Ongoing interaction: assures entity authenticity and protects against interference.
  • Access control limits host system/application access via communication links.
  • Data confidentiality protects transmitted data from passive attacks.
    • This is achieved by limiting access to users as well as protection traffic flow through messages.
  • Data integrity applies to message streams, individual messages, or selected fields.
    • Ensures no duplications or modifications to the message.
  • Nonrepudiation: Prevents senders or receivers from denying transmitted messages.
    • Ensures messages are authentic.
  • Availability Service ensures system and resources availability upon request.

Specific Security Mechanisms

  • Implemented in protocol layers to provide OSI security services.

Pervasive Security Mechanisms

  • Mechanisms are not exclusive to any OSI security or protocol layer.

NIST Standards

  • NIST, US federal agency, deals with measurement science, standards, and tech related to US government and private sectors..
  • NIST Federal Information Processing Standards (FIPS) impacts worldwide.

ISOC Standards

  • Internet Society, pro membership society.
  • Provides leadership on Internet issues.
  • Oversees groups responsible for Internet infrastructure standards.
  • Internet standards published as Requests for Comments (RFCs).

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Information Security Protection Goals
10 questions
History of information security
40 questions
Intro to Information Security Management Part 1
40 questions
Understanding Computer Security
37 questions
Use Quizgecko on...
Browser
Browser