Computer Security Introduction

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What does computer security primarily protect?

  • User privacy only
  • Network speed and performance
  • Software applications alone
  • The assets of a computer system (correct)

Which of the following best defines a vulnerability in computer security?

  • An attack method employed by hackers
  • A collection of user credentials
  • A specific type of software
  • A weakness in the security system (correct)

In the context of computer security, which term describes a potential violation of security?

  • Attack
  • Control
  • Countermeasure
  • Threat (correct)

What is a countermeasure in computer security?

<p>A protective measure against threats (B)</p> Signup and view all the answers

Which of the following is NOT an asset in computer security?

<p>Malware (B)</p> Signup and view all the answers

What does the C-I-A Triad represent in computer security?

<p>Confidentiality, Integrity, Availability (B)</p> Signup and view all the answers

Which statement best describes an attack in the context of computer security?

<p>The act of exploiting a vulnerability (A)</p> Signup and view all the answers

Which of the following could be considered a unique and irreplaceable asset?

<p>Class projects (A)</p> Signup and view all the answers

What do the three components Method, Opportunity, and Motive collectively refer to in the context of a malicious attack?

<p>Factors that enable a malicious attack. (B)</p> Signup and view all the answers

Which type of threat involves an unauthorized party not only accessing but also tampering with an asset?

<p>Modification (B)</p> Signup and view all the answers

What does confidentiality in computer security primarily ensure?

<p>Assets are accessed only by authorized parties. (D)</p> Signup and view all the answers

In the context of asset security, what does an interruption signify?

<p>An asset is lost, unavailable, or unusable. (B)</p> Signup and view all the answers

What is the role of 'motive' in the MOM framework for malicious attacks?

<p>The reasoning behind performing the attack. (B)</p> Signup and view all the answers

Which of the following is NOT one of the three security goals addressed in computer security?

<p>Authenticity (C)</p> Signup and view all the answers

Which of the following is a necessary condition for a successful malicious attack according to the MOM framework?

<p>Availability of method, opportunity, and motive. (B)</p> Signup and view all the answers

What type of security control aims to address the integrity of systems?

<p>Technical controls (D)</p> Signup and view all the answers

What are the three basic security primitives mentioned?

<p>Confidentiality, integrity, and availability (B)</p> Signup and view all the answers

Which of the following is NOT considered a physical control?

<p>Intrusion detection systems (B)</p> Signup and view all the answers

What role do policies and procedures play in security controls?

<p>They enhance security by fostering user cooperation. (C)</p> Signup and view all the answers

How do vulnerabilities and threats interact in a security context?

<p>Vulnerabilities create opportunities for threats to exploit. (A)</p> Signup and view all the answers

What must be understood for effective cooperation with security requirements?

<p>The necessity of security in specific situations (D)</p> Signup and view all the answers

Which of the following describes VirusTotal's main function?

<p>It inspects items using over 70 antivirus scanners. (C)</p> Signup and view all the answers

Which of the following best captures the relationship between different attackers and their capabilities?

<p>Attackers vary in capabilities and motivations, leading to different threats. (A)</p> Signup and view all the answers

Which security control is most beneficial for mitigating the risk of physical theft?

<p>Locks and cables (A)</p> Signup and view all the answers

What is the primary purpose of a control in the context of threats and vulnerabilities?

<p>To remove or reduce a vulnerability (C)</p> Signup and view all the answers

Which of the following correctly describes the relationship among threats, controls, and vulnerabilities?

<p>Without understanding threats, controls cannot be devised. (A)</p> Signup and view all the answers

What does the term nonrepudiation refer to?

<p>Proving the authenticity of a document or communication. (C)</p> Signup and view all the answers

Which of the following factors defines the 'Access Control Policy'?

<p>Who + What + How = Yes/No (D)</p> Signup and view all the answers

What type of threats are classified as having benign intent?

<p>Unintentional actions like human error (A)</p> Signup and view all the answers

Which of the following best describes an Advanced Persistent Threat (APT)?

<p>A well-organized and directed threat with patience and funding (D)</p> Signup and view all the answers

Which type of harm involves unauthorized access to an asset?

<p>Interception (C)</p> Signup and view all the answers

In the context of types of attackers, which description fits a 'criminal-for-hire'?

<p>A hacker performing attacks for monetary gain (D)</p> Signup and view all the answers

What does integrity in security refer to?

<p>Modification of assets only by authorized parties (B)</p> Signup and view all the answers

Which of the following describes the goal of recovery in security?

<p>Stopping the attack and repairing the damage (D)</p> Signup and view all the answers

Which of the following represents the relationship between confidentiality, integrity, and availability?

<p>They can overlap and be mutually exclusive. (B)</p> Signup and view all the answers

What is an example of a deterrence control?

<p>Legal consequences for unauthorized access (C)</p> Signup and view all the answers

What role do trust and assumptions play in security?

<p>They underlie all aspects of security. (D)</p> Signup and view all the answers

What is a characteristic of deflection controls?

<p>Redirecting threats to less critical parts of the system (D)</p> Signup and view all the answers

Which option best defines availability in a security context?

<p>Making sure assets can be accessed at appropriate times (C)</p> Signup and view all the answers

What is the primary focus of preventive measures in security?

<p>Stopping attacks before they occur (D)</p> Signup and view all the answers

What term refers to data in their normal, unscrambled state?

<p>Cleartext (D)</p> Signup and view all the answers

What is one potential disadvantage of weak encryption?

<p>It can degrade the performance of the entire system. (B)</p> Signup and view all the answers

Which type of control includes parts of the program that enforce security restrictions?

<p>Internal program controls (D)</p> Signup and view all the answers

Which method ensures that user access is restricted from one another in a network?

<p>Operating system controls (C)</p> Signup and view all the answers

What is an example of an independent control program?

<p>Antivirus software (B)</p> Signup and view all the answers

What aspect does encryption primarily address?

<p>Confidentiality of data (D)</p> Signup and view all the answers

Which statement is true regarding the use of encryption?

<p>It should be complemented by other security tools. (D)</p> Signup and view all the answers

What is a potential result of not using encryption properly?

<p>It may create vulnerabilities in the system. (A)</p> Signup and view all the answers

Flashcards

Computer Security

Protecting computer system assets (hardware, software, data).

Assets

The valuable parts of a computer system: hardware, software, and data.

Vulnerability

A weakness in a system that can be exploited.

Threat

A potential danger to a computer system.

Signup and view all the flashcards

Attack

An attempt to exploit a vulnerability.

Signup and view all the flashcards

Control/Countermeasure

A protective measure against threats.

Signup and view all the flashcards

C-I-A Triad

Confidentiality, Integrity, and Availability - core security principles.

Signup and view all the flashcards

Control

An action, device, procedure, or technique that removes or reduces a vulnerability.

Signup and view all the flashcards

Threat-Vulnerability Relationship

A threat is blocked by a control of a vulnerability. Knowing possible threats is key to creating good controls.

Signup and view all the flashcards

C-I-A Triad

Confidentiality, Integrity, Availability. A key security concept.

Signup and view all the flashcards

Authentication

Proving something is genuine. A security process.

Signup and view all the flashcards

Nonrepudiation

Assurance that someone can't deny something. A security property.

Signup and view all the flashcards

Access Control

Policy of who, what, and how to determine access (yes or no).

Signup and view all the flashcards

Types of Threats

Natural causes, human causes (benign or malicious and random or directed).

Signup and view all the flashcards

APT (Advanced Persistent Threat)

Organized, directed, well-financed, patient, silent threats.

Signup and view all the flashcards

Types of Attackers

Terrorist, criminal, hacker, individual, loosely connected group, or organized crime.

Signup and view all the flashcards

Types of Harm

Interception, interruption, modification, fabrication.

Signup and view all the flashcards

Threat Interception

Unauthorized party gains access to an asset.

Signup and view all the flashcards

Encryption

Transforming data into an unreadable format (ciphertext) to protect confidentiality and integrity.

Signup and view all the flashcards

Plaintext

Original, readable data.

Signup and view all the flashcards

Ciphertext

Encrypted data.

Signup and view all the flashcards

Software Controls

Security features within programs for access restrictions.

Signup and view all the flashcards

Internal Program Control

Security components within a program, limiting access.

Signup and view all the flashcards

Operating System Controls

Security restrictions enforced by the operating system.

Signup and view all the flashcards

Hardware Controls

Security implemented through special hardware.

Signup and view all the flashcards

Independent Control Programs

Applications like password checkers and virus scans.

Signup and view all the flashcards

Interruption Threat

An asset of the system is lost, unavailable, or unusable.

Signup and view all the flashcards

Modification Threat

Unauthorized access and tampering (forging) of an asset.

Signup and view all the flashcards

Fabrication Threat

Creating counterfeit objects on a system (fake data).

Signup and view all the flashcards

Method (MOM)

Skills, knowledge, tools, and other means needed for an attack.

Signup and view all the flashcards

Opportunity (MOM)

Time and access required to execute an attack.

Signup and view all the flashcards

Motive (MOM)

Reason for an attacker to target a system.

Signup and view all the flashcards

Confidentiality

Ensuring only authorized users access computer assets.

Signup and view all the flashcards

Integrity

Ensuring computer data is accurate and unaltered.

Signup and view all the flashcards

Availability

Ensuring computer systems and data are accessible when needed.

Signup and view all the flashcards

CIA Triad

The three core goals of computer security: Confidentiality, Integrity, and Availability.

Signup and view all the flashcards

Security Controls

Measures used to protect a system from threats and vulnerabilities.

Signup and view all the flashcards

Hardware Controls

Security measures implemented using physical components, e.g., encryption hardware.

Signup and view all the flashcards

Software Controls

Security measures using computer programs, such as firewalls and intrusion detection systems.

Signup and view all the flashcards

Policy and Procedure Controls

Security measures based on agreed-upon rules and guidelines, not hardware/software, e.g., password changes.

Signup and view all the flashcards

Physical Controls

Security measures implemented physically, like locks or security guards.

Signup and view all the flashcards

C-I-A Triad

Confidentiality, Integrity, and Availability; core principles of security.

Signup and view all the flashcards

Vulnerabilities

Weaknesses in a system that can be exploited by threats.

Signup and view all the flashcards

Threats

Potential dangers that could exploit vulnerabilities.

Signup and view all the flashcards

User Awareness

Understanding the need for security measures among users; crucial for cooperation.

Signup and view all the flashcards

Confidentiality

Ensuring that assets are accessible only to authorized parties.

Signup and view all the flashcards

Integrity

Guaranteeing that assets can be modified only by authorized parties or in authorized ways.

Signup and view all the flashcards

Availability

Ensuring that assets are accessible to authorized parties at the correct times.

Signup and view all the flashcards

Security Goals

Prevention, Detection, and Recovery of security breaches.

Signup and view all the flashcards

Security Prevention

Techniques to stop security breaches before they happen.

Signup and view all the flashcards

Security Detection

Techniques to discover security breaches after they start.

Signup and view all the flashcards

Security Recovery

Techniques to restore systems and data after a security breach.

Signup and view all the flashcards

Security Trust

The foundation of all security.

Signup and view all the flashcards

Security Policies

Define and describe the security rules and requirements of a system.

Signup and view all the flashcards

Security Mechanisms

Implement the security policies.

Signup and view all the flashcards

Deterrence Control

Discouraging attacks by making them less attractive.

Signup and view all the flashcards

Deflection Control

Redirecting attacks to less important systems.

Signup and view all the flashcards

Response Control

Actions taken after an attack to minimize damage and restore systems.

Signup and view all the flashcards

Study Notes

Computer Security Introduction

  • Computer security protects a computer system's assets: hardware, software, and data.
  • Chapter 1 objectives include defining computer security and basic terms, introducing the C-I-A Triad, access control terminology, basic threats, vulnerabilities, and attacks, and control mapping to threats.
  • Assets include hardware (computers, devices, disk drives, memory, printers, network gear), software (operating system, utilities like antivirus, commercial applications, word processing, photo editing, individual applications), and data (documents, photos, music, videos, email, class projects).
  • Hardware assets are easily replaceable; data assets are unique and irreplaceable.
  • Basic terms include vulnerability (a weakness in the security system), threat (circumstances potentially causing loss or harm), attack (a human exploiting a vulnerability), and controls/countermeasures (actions, devices, procedures, techniques to reduce a vulnerability).
  • Threats are blocked by controls on vulnerabilities. Knowledge of threats is key to control design.
  • The C-I-A Triad includes confidentiality (ensuring access only by authorized parties), integrity (assets only changed by authorized parties), and availability (assets accessible to authorized parties).
  • Access control defines who (subject) has what (object) access and how (mode).
  • Types of threats include natural causes (fire, power failure), human causes (benign/malicious intent, human error, random/directed attacks, impersonation).
  • Advanced Persistent Threats (APTs) are organized, directed, well-financed, patient, and silent.
  • Types of attackers include hackers, individuals, terrorists, criminal-for-hire, loosely connected groups, and organized crime members.
  • Types of harm include interception, interruption, modification, and fabrication.
  • Interception is unauthorized access to an asset.
  • Interruption is an asset becoming unavailable or lost.
  • Modification is unauthorized tampering with an asset.
  • Fabrication is creating counterfeit objects in a system.
  • Method-Opportunity-Motive (MOM) describes attacker characteristics needed to conduct an attack.

Security Goals

  • Prevention aims to stop attackers from violating security policies.
  • Detection aims to identify attackers violating security policies.
  • Recovery aims to stop attacks, evaluate damage, repair it, and ensure continued correct functioning.

Trust and Assumptions

  • Trust underlies security policies, mechanisms, and procedures.
  • Policies must unambiguously define system states and capture security requirements.
  • Mechanisms must be assumed to enforce policies and work correctly.

Different Types of Controls

  • Deterrence discourages attacks by increasing costs.
  • Deflection redirects threats to less critical components.
  • Response involves reacting after a detected attack to minimize damage, restore services, and analyze the attack.
  • Prevention aims to stop attacks before they occur (e.g., firewalls, antivirus).

Controls Available

  • Encryption renders data unreadable to unauthorized parties while maintaining integrity.
  • Weak encryption can be detrimental.
  • Software/program controls include security restrictions within programs, access limitations, operating system controls, and independent control programs.
  • Hardware controls include encryption devices, locks, security verification devices, firewalls, and intrusion detection systems.
  • Physical controls include locks, entry point guards, backups, and disaster preparedness planning.

Effectiveness of Controls

  • Awareness of problems is necessary; people must understand why security is required.

Summary

  • Vulnerabilities are weaknesses; threats exploit vulnerabilities, and controls help prevent such exploitation.
  • Confidentiality, integrity, availability are core security principles.
  • Attacker types depend on their capabilities and motivations.
  • Controls vary, have different functions, and can exist at different levels/points within the system.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Info Sec: CIA Triad and Threats
8 questions

Info Sec: CIA Triad and Threats

SustainableSmokyQuartz avatar
SustainableSmokyQuartz
Introduction to Computer Security
29 questions
Computer Security Chapter 1: Introduction
47 questions
Use Quizgecko on...
Browser
Browser