Podcast
Questions and Answers
Flashcards
Computer Security
Computer Security
The protection of computer system assets (hardware, software, and data) from unauthorized activities.
Information Security
Information Security
Protecting sensitive information from unauthorized access, use, disclosure, disruption, modification, or destruction.
Vulnerability
Vulnerability
A weakness in a security system that can be exploited to cause harm.
Threat
Threat
Signup and view all the flashcards
Attack
Attack
Signup and view all the flashcards
Control/Countermeasure
Control/Countermeasure
Signup and view all the flashcards
Assets (Computer Systems)
Assets (Computer Systems)
Signup and view all the flashcards
Asset Values
Asset Values
Signup and view all the flashcards
Study Notes
Security in Computing - Chapter 1
- Objectives: Define computer security and basic security terms, introduce the C-I-A triad, introduce access control terminology, explain basic threats, vulnerabilities, and attacks, show how controls map to threats.
- Information Security: Protects sensitive information from unauthorized activities (inspection, modification, recording, disruption, or destruction). The goal is to ensure the safety and privacy of critical data (customer accounts, financial data, intellectual property).
- Computer Security: Protection of computer system assets: hardware, software, and data.
- Assets:
- Hardware: Computer, devices (disk drives, memory, printer), network gear.
- Software: Operating system, utilities (antivirus), commercial applications (word processing, photo editing), individual applications.
- Data: Documents, photos, music, videos, email, class projects.
- Values of Assets:
- Hardware: Off the shelf, easily replaceable.
- Software: Off the shelf, easily replaceable.
- Data: Unique, irreplaceable.
- Basic Terms: Vulnerability, threat, attack, countermeasure (control).
- Vulnerability: A weakness in a security system (procedures, design, or implementation) that can be exploited.
- Threat: A set of circumstances with the potential to cause loss or harm (violation of security).
- Attack: A human (criminal) exploiting a vulnerability.
- Control (Countermeasure): An action, device, procedure, or technique to remove or reduce a vulnerability.
- Threat and Vulnerability Relationship: A threat is blocked by a control of a vulnerability. Understanding threats is key to creating effective controls.
- C-I-A Triad: Confidentiality, integrity, availability.
- Confidentiality: Ensuring that computer-related assets are accessed only by authorized parties (secrecy, privacy).
- Integrity: Ensuring that assets can be modified only by authorized parties or only in authorized ways (writing, changing, deleting, creating).
- Availability: Ensuring that assets are accessible to authorized parties at appropriate times (often known by its opposite - denial of service).
- Access Control: Policy of who, what, and how. Subject (who) + Mode of access (how) + Object (what) = Yes/No.
- Types of Threats: Natural causes (fire, power failure), human causes (benign intent - human error, malicious intent - random/directed attacks (malicious code, impersonation)).
- Types of Attackers: Hacker, individual, terrorist, organized crime member, criminal-for-hire, loosely connected group.
- Types of Harm: Interception (unauthorized access), interruption (inaccessibility), modification (tampering), fabrication (creating counterfeit objects).
- Method-Opportunity-Motive (MOM): The three things required for a malicious attacker: Method(how), opportunity (when), motive (why).
- Controls/Countermeasures: Physical, procedural, and technical.
- Types of Malware: Virus, worm, Trojan horse, bots, rootkit, remote-access trojan (RAT), spyware.
- Security Goals: Prevention, detection, recovery.
Security in Computing - Additional Chapters (from overview)
- Chapter 2: Toolbox: Authentication, Access Control, and Cryptography
- Chapter Additional Content: Describing identification versus authentication, several means of authentication (something you know, something you are, something you have - and factors related to location and behavior), concepts of cryptography (the study of encryption and decryption).
- Chapter 3: Program Security (various types of attacks), stack overflow, incomplete mediation, and more
- Chapter 4: Access Control Policies & Administration, access matrix, access control directory, privilege lists.
- Chapter 5: Multilevel Databases, sensitive attributes and associated security issues, and proposals to address these situations.
- Additional Topics Covered: Malware activation, virus effects, virus detection, code testing, good and bad design principles, various methods, example of different types of controls.
- Summary: Vulnerabilities, threats, attacks, and security controls for computers and computing systems.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.