Computer Security Fundamentals
40 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary focus of computer security?

  • Protecting computer hardware
  • Developing new software
  • Protecting the assets of a computer or computer system (correct)
  • Improving computer performance
  • What is the term used to describe the ability to access computer-related assets only by authorized parties?

  • Availability
  • Security
  • Integrity
  • Confidentiality (correct)
  • What is meant by the modification of assets in the context of computer security?

  • Denying access to the assets
  • Only accessing the assets at inappropriate times
  • Only reading or viewing the assets
  • Writing, changing, changing status, deleting, or creating the assets (correct)
  • What is the term used to describe the prevention of access to computer-related assets?

    <p>Denial of Service</p> Signup and view all the answers

    What is the term used to describe the combination of confidentiality, integrity, and availability?

    <p>C-I-A Triad</p> Signup and view all the answers

    What determines the value of an asset in computer security?

    <p>Factors such as personal, time dependent, replicable or not, cost of loss</p> Signup and view all the answers

    What is the primary goal of computer security in relation to assets?

    <p>To protect the assets from unauthorized access</p> Signup and view all the answers

    What is the term used to describe the ability to access computer-related assets at appropriate times?

    <p>Availability</p> Signup and view all the answers

    What is a vulnerability in a security system?

    <p>A weakness in the security system, for example, in procedures, design, or implementation.</p> Signup and view all the answers

    What is a threat to a computing system?

    <p>A set of circumstances that has the potential to cause loss or harm.</p> Signup and view all the answers

    What is an attacker?

    <p>A human who exploits a vulnerability.</p> Signup and view all the answers

    What is a control in a security system?

    <p>An action, device, procedure, or technique that removes or reduces a vulnerability.</p> Signup and view all the answers

    What is an example of a nonhuman threat?

    <p>Natural disasters like fires or floods.</p> Signup and view all the answers

    What is an example of a nonmalicious harm?

    <p>Someone's accidentally spilling a soft drink on a laptop.</p> Signup and view all the answers

    What is an example of a malicious attack?

    <p>A malicious code posted on a website.</p> Signup and view all the answers

    What is an example of a random attack?

    <p>A malicious code posted on a website that could be visited by anybody.</p> Signup and view all the answers

    What is the reason why a malicious attacker performs an attack?

    <p>For fun and challenge</p> Signup and view all the answers

    What is one way to exploit a hardware vulnerability?

    <p>By adding devices to a system</p> Signup and view all the answers

    What is an example of a software alteration vulnerability?

    <p>The truncation of fractional interest on an account</p> Signup and view all the answers

    Why is hardware security usually the concern of a small staff?

    <p>Because they are professionals in a computing center</p> Signup and view all the answers

    What is an example of machinicide?

    <p>Physically harming computer hardware</p> Signup and view all the answers

    What is a method used by an attacker to succeed?

    <p>Having skills and knowledge</p> Signup and view all the answers

    What can enhance the security of hardware components?

    <p>Using simple physical measures</p> Signup and view all the answers

    What is an example of software deletion?

    <p>Accidentally erasing a file</p> Signup and view all the answers

    What kind of harm could a company experience from electronic espionage?

    <p>All of the above</p> Signup and view all the answers

    What is the main concern in preserving confidentiality, integrity, and availability of data?

    <p>Protection against interruption, interception, modification, and fabrication</p> Signup and view all the answers

    What is a key aspect of a program with high quality?

    <p>Security features to prevent unauthorized access</p> Signup and view all the answers

    Who might want to attack a program that displays the current time and temperature of a city?

    <p>All of the above</p> Signup and view all the answers

    What type of harm might an attacker want to cause to a program that allows consumers to order products from the web?

    <p>All of the above</p> Signup and view all the answers

    What is a potential vulnerability in a program that accepts and tabulates votes in an election?

    <p>All of the above</p> Signup and view all the answers

    Who might want to attack a program that allows a surgeon to assist in an operation remotely?

    <p>All of the above</p> Signup and view all the answers

    What type of control could be instituted to limit the vulnerability of a program that secretly leaks a list of employees' salaries?

    <p>All of the above</p> Signup and view all the answers

    What is the primary reason for controlling access to software?

    <p>To prevent software from being deleted or destroyed accidentally</p> Signup and view all the answers

    What is a type of software modification that causes it to fail or perform an unintended task?

    <p>Logic bomb</p> Signup and view all the answers

    What is a program that overtly does one thing while covertly doing another?

    <p>Trojan horse</p> Signup and view all the answers

    What is a specific type of Trojan horse that can spread its infection from one computer to another?

    <p>Virus</p> Signup and view all the answers

    What is a program that has a secret entry point?

    <p>Trapdoor</p> Signup and view all the answers

    What is an unauthorized copying of software?

    <p>Software theft</p> Signup and view all the answers

    Who is responsible for software security?

    <p>Programmers and analysts</p> Signup and view all the answers

    What is a code that makes information accessible to unauthorized people or programs?

    <p>Information leak</p> Signup and view all the answers

    Study Notes

    Computer Security

    • Computer security is the protection of computer-related assets, including hardware, software, data, people, processes, or combinations of these.
    • Assets can be valued based on factors such as personal, time-dependent, replicable, or cost of loss.

    Computer Security Goals

    • The three important aspects of computer security are confidentiality, integrity, and availability.
    • Confidentiality ensures that assets are accessed only by authorized parties.
    • Integrity means that assets can be modified only by authorized parties or only in authorized ways.
    • Availability means that assets are accessible to authorized parties at appropriate times.

    Vulnerabilities, Threats, Attacks, and Controls

    • A vulnerability is a weakness in the security system that might be exploited to cause loss or harm.
    • A threat is a set of circumstances that has the potential to cause loss or harm.
    • An attacker is a human who exploits a vulnerability to perpetrate an attack on the system.
    • A control is an action, device, procedure, or technique that removes or reduces a vulnerability.
    • Harm is the negative consequence of an actualized threat.

    Types of Threats

    • Nonhuman threats include natural disasters, loss of electrical power, component failure, or attack by a wild boar.
    • Human threats can be nonmalicious (accidental) or malicious (intentional).
    • Malicious attacks can be random or directed.

    Attacker Requirements

    • A malicious attacker must have three things to succeed: method (skills, knowledge, tools), opportunity (time and access), and motive (reason to want to perform the attack).

    Vulnerabilities of Computing Systems

    Hardware Vulnerabilities

    • Visible attack: adding, changing, removing, intercepting, or flooding devices with traffic.
    • Physical attack: drenching with water, burning, freezing, gassing, or electrocuting with power surges.
    • Machinicide: intentionally harming computer hardware or software.
    • Simple physical measures like locks and guards can enhance hardware security.

    Software Vulnerabilities

    • Software alteration: exploiting software vulnerability, such as truncating fractional interest on an account.
    • Software deletion: accidentally erasing a file or replacing a good copy of a program with a bad one.
    • Software modification: causing software to fail or perform an unintended task, including logic bombs, Trojan horses, viruses, trapdoors, and information leaks.

    Harm from Electronic Espionage or Unauthorized Viewing of Confidential Materials

    • Examples of harm include theft of trade secrets, loss of competitive advantage, and legal liabilities.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    cs-lecture1-basic concept.docx

    Description

    Learn about the protection of computer-related assets and the three important aspects of computer security: confidentiality, integrity, and availability.

    More Like This

    Computer Security Quiz
    10 questions

    Computer Security Quiz

    ThumbsUpFantasy avatar
    ThumbsUpFantasy
    Computer Security Introduction
    69 questions
    Computer Study Notes: Cybersecurity
    10 questions
    Computer Security Fundamentals
    5 questions
    Use Quizgecko on...
    Browser
    Browser