Ethical Issues in Security Systems

LegendaryElectricOrgan avatar
LegendaryElectricOrgan
·
·
Download

Start Quiz

Study Flashcards

18 Questions

What is the primary principle of security involved when A wants to ensure that no one except B gets the envelope?

Confidentiality

When implementing a security policy, why is it essential to provide for exceptions?

To accommodate unusual circumstances that may not be covered by the standard policy.

What is the principle of security involved when A and B want to ensure that no one can tamper with the contents of the check?

Integrity

Why is it crucial to use simple language in all communications when explaining a security policy?

To ensure that all stakeholders understand their responsibilities and the policy.

What is the purpose of establishing accountability in a security policy?

To identify who is responsible for implementing and enforcing the policy.

Why is it necessary to review a security policy periodically?

To ensure the policy remains relevant and effective in a changing environment.

What is the primary focus of the transport layer security protocol?

To provide end-to-end encryption and authentication between applications

What is the main objective of the secure electronic transaction (SET) protocol?

To ensure secure transactions between cardholders and merchants

What is the primary purpose of the Kerberos authentication system?

To provide secure authentication and authorization for network services

What is the main purpose of the IEEE 802.11 security protocol?

To provide wireless network security and prevent unauthorized access

What is the primary goal of the security handshake mechanism in authentication?

To securely establish a connection and prevent man-in-the-middle attacks

What is the main objective of the single sign-on (SSO) approach in authentication?

To allow users to access multiple applications with a single set of credentials

What is the primary concern of the 'Privacy' category in security systems?

The right of an individual to control personal information.

What is the main issue addressed by the 'Accessibility' category in security systems?

What information does an organization have the right to collect?

What is the hierarchy of regulatory bodies that govern the legality of information security?

International, Federal, State, and Organization

What is the main difference between individual privacy and legal regulations?

Individual privacy is subjective and may or may not be supported by local regulations or laws.

How can attacks be classified according to the text?

According to the common person's view and a technologist's view.

What are some examples of Federal regulations that govern information security?

FERPA, GLB, HIPAA, DMCA, Teach Act, Patriot Act, Sarbanes-Oxley Act, etc.

Study Notes

Internet Security Protocols

  • The chapter covers various internet security protocols, including SSL, TLS, SHTTP, SET, and others.
  • It also discusses email security, wireless application protocol (WAP) security, and security in GSM, 3G, and IEEE 802.11.

User-Authentication Mechanisms

  • The chapter introduces user-authentication mechanisms, including authentication basics, passwords, authentication tokens, certificate-based authentication, biometric authentication, and Kerberos.
  • It also discusses key distribution center (KDC), security handshake pitfalls, single sign-on (SSO) approaches, and attacks on authentication schemes.

Practical Implementations of Cryptography/Security

  • The chapter covers practical implementations of cryptography and security, including cryptographic solutions using Java and Microsoft.NET Framework, cryptographic toolkits, web services security, and cloud security.

Security Policy

  • A security policy should complement the people's expectations, working style, and culture.
  • The policy should be explained to all concerned, outlining everybody's responsibilities and using simple language.
  • Accountability should be established, and provisions should be made for exceptions and periodic reviews.

Principles of Security

  • The principles of security include confidentiality, integrity, and others.
  • Confidentiality ensures that no one except the intended recipient gets the information.
  • Integrity ensures that the information is not tampered with during transmission.

Ethical Issues in Security Systems

  • The ethical issues in security systems are classified into four categories: privacy, accuracy, property, and accessibility.
  • Privacy deals with the right of an individual to control personal information.
  • Accuracy talks about the responsibility for the authenticity, fidelity, and accuracy of information.
  • Property deals with the owner of the information and who controls access.
  • Accessibility deals with the issue of what information an organization has the right to collect.

Types of Attacks

  • Attacks can be classified into two views: the common person's view and a technologist's view.
  • No specific types of attacks are mentioned in the text, but the chapter aims to introduce the concept of attacks in the context of internet security.

This quiz will assess your understanding of the four main ethical issues in security systems: privacy, accuracy, property, and accessibility. Test your knowledge of these fundamental concepts in information security.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Use Quizgecko on...
Browser
Browser