Untitled Quiz
0 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Study Notes

Security in Computing - Chapter 1

  • Objectives: Define computer security and basic security terms, introduce the C-I-A triad, introduce access control terminology, explain basic threats, vulnerabilities, and attacks, show how controls map to threats.
  • Information Security: Protects sensitive information from unauthorized activities (inspection, modification, recording, disruption, or destruction). The goal is to ensure the safety and privacy of critical data (customer accounts, financial data, intellectual property).
  • Computer Security: Protection of computer system assets: hardware, software, and data.
  • Assets:
  • Hardware: Computer, devices (disk drives, memory, printer), network gear.
  • Software: Operating system, utilities (antivirus), commercial applications (word processing, photo editing), individual applications.
  • Data: Documents, photos, music, videos, email, class projects.
  • Values of Assets:
  • Hardware: Off the shelf, easily replaceable.
  • Software: Off the shelf, easily replaceable.
  • Data: Unique, irreplaceable.
  • Basic Terms: Vulnerability, threat, attack, countermeasure (control).
  • Vulnerability: A weakness in a security system (procedures, design, or implementation) that can be exploited.
  • Threat: A set of circumstances with the potential to cause loss or harm (violation of security).
  • Attack: A human (criminal) exploiting a vulnerability.
  • Control (Countermeasure): An action, device, procedure, or technique to remove or reduce a vulnerability.
  • Threat and Vulnerability Relationship: A threat is blocked by a control of a vulnerability. Understanding threats is key to creating effective controls.
  • C-I-A Triad: Confidentiality, integrity, availability.
  • Confidentiality: Ensuring that computer-related assets are accessed only by authorized parties (secrecy, privacy).
  • Integrity: Ensuring that assets can be modified only by authorized parties or only in authorized ways (writing, changing, deleting, creating).
  • Availability: Ensuring that assets are accessible to authorized parties at appropriate times (often known by its opposite - denial of service).
  • Access Control: Policy of who, what, and how. Subject (who) + Mode of access (how) + Object (what) = Yes/No.
  • Types of Threats: Natural causes (fire, power failure), human causes (benign intent - human error, malicious intent - random/directed attacks (malicious code, impersonation)).
  • Types of Attackers: Hacker, individual, terrorist, organized crime member, criminal-for-hire, loosely connected group.
  • Types of Harm: Interception (unauthorized access), interruption (inaccessibility), modification (tampering), fabrication (creating counterfeit objects).
  • Method-Opportunity-Motive (MOM): The three things required for a malicious attacker: Method(how), opportunity (when), motive (why).
  • Controls/Countermeasures: Physical, procedural, and technical.
  • Types of Malware: Virus, worm, Trojan horse, bots, rootkit, remote-access trojan (RAT), spyware.
  • Security Goals: Prevention, detection, recovery.

Security in Computing - Additional Chapters (from overview)

  • Chapter 2: Toolbox: Authentication, Access Control, and Cryptography
  • Chapter Additional Content: Describing identification versus authentication, several means of authentication (something you know, something you are, something you have - and factors related to location and behavior), concepts of cryptography (the study of encryption and decryption).
  • Chapter 3: Program Security (various types of attacks), stack overflow, incomplete mediation, and more
  • Chapter 4: Access Control Policies & Administration, access matrix, access control directory, privilege lists.
  • Chapter 5: Multilevel Databases, sensitive attributes and associated security issues, and proposals to address these situations.
  • Additional Topics Covered: Malware activation, virus effects, virus detection, code testing, good and bad design principles, various methods, example of different types of controls.
  • Summary: Vulnerabilities, threats, attacks, and security controls for computers and computing systems.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Infosec Combined PDF PDF

More Like This

Untitled Quiz
37 questions

Untitled Quiz

WellReceivedSquirrel7948 avatar
WellReceivedSquirrel7948
Untitled Quiz
55 questions

Untitled Quiz

StatuesquePrimrose avatar
StatuesquePrimrose
Untitled Quiz
18 questions

Untitled Quiz

RighteousIguana avatar
RighteousIguana
Untitled Quiz
50 questions

Untitled Quiz

JoyousSulfur avatar
JoyousSulfur
Use Quizgecko on...
Browser
Browser