Podcast
Questions and Answers
Which of the following best describes the primary goal of computer security?
Which of the following best describes the primary goal of computer security?
- Ensuring uninterrupted access to social media platforms.
- Developing new software applications and hardware technologies.
- Protecting a company's assets by ensuring safe, uninterrupted operation of computer systems and safeguarding data. (correct)
- Maximizing the speed of data processing and network communication.
What three key principles are ensured by the measures and controls within computer security?
What three key principles are ensured by the measures and controls within computer security?
- Confidentiality, Integrity, Availability (correct)
- Innovation, Development, Marketing
- Accessibility, Usability, Functionality
- Speed, Efficiency, Reliability
What is the key difference between cybersecurity and information security?
What is the key difference between cybersecurity and information security?
- Cybersecurity focuses on the physical security of computer hardware, while information security deals with digital threats.
- Cybersecurity covers all forms of data protection, including physical security, while information security deals specifically with digital threats.
- There is no difference; the terms are interchangeable.
- Cybersecurity deals specifically with digital threats, while information security covers all forms of data protection, including physical security. (correct)
Which of the following is NOT typically considered a threat that necessitates computer security?
Which of the following is NOT typically considered a threat that necessitates computer security?
In the context of computer security, what does 'availability' ensure?
In the context of computer security, what does 'availability' ensure?
What is the primary goal of 'authentication' in computer security?
What is the primary goal of 'authentication' in computer security?
Which security principle ensures that neither the sender nor the receiver of a message can deny its transmission or receipt?
Which security principle ensures that neither the sender nor the receiver of a message can deny its transmission or receipt?
In security terms, what is a 'vulnerability'?
In security terms, what is a 'vulnerability'?
What type of security threat involves an unauthorized party gaining access to an asset?
What type of security threat involves an unauthorized party gaining access to an asset?
Which security threat category involves an unauthorized party tampering with an asset?
Which security threat category involves an unauthorized party tampering with an asset?
What is the definition of 'interruption' as a security threat?
What is the definition of 'interruption' as a security threat?
An attacker adds spurious records to a file. Which type of security threat does this represent?
An attacker adds spurious records to a file. Which type of security threat does this represent?
What is the relationship between a threat, a vulnerability, and a control in computer security?
What is the relationship between a threat, a vulnerability, and a control in computer security?
In the context of the 'MOM' acronym, what does 'Opportunity' refer to?
In the context of the 'MOM' acronym, what does 'Opportunity' refer to?
Which of the following is an example of a hardware vulnerability?
Which of the following is an example of a hardware vulnerability?
Which of the following is considered a software vulnerability?
Which of the following is considered a software vulnerability?
What is an example of a data vulnerability?
What is an example of a data vulnerability?
What is the purpose of security controls?
What is the purpose of security controls?
Which of the following is a method of defense that involves blocking an attack or closing the vulnerability?
Which of the following is a method of defense that involves blocking an attack or closing the vulnerability?
Which of the following aspects enhances the effectiveness of security controls?
Which of the following aspects enhances the effectiveness of security controls?
Which type of security control involves putting locks on doors?
Which type of security control involves putting locks on doors?
An organization implements a policy requiring all employees to use strong, unique passwords and change them every 90 days. What type of security controls does this represent?
An organization implements a policy requiring all employees to use strong, unique passwords and change them every 90 days. What type of security controls does this represent?
Why is security needed in areas like banking, healthcare and government?
Why is security needed in areas like banking, healthcare and government?
An intrusion detection system (IDS) is put in place to monitor network traffic for suspicious activity. This aligns to which method of defense?
An intrusion detection system (IDS) is put in place to monitor network traffic for suspicious activity. This aligns to which method of defense?
An organization decides to move its servers to a cloud provider that offers better physical security and redundancy. Under which defense method does this fall?
An organization decides to move its servers to a cloud provider that offers better physical security and redundancy. Under which defense method does this fall?
After a successful ransomware attack, a company restores its systems from a recent backup. This action exemplifies which method of defense?
After a successful ransomware attack, a company restores its systems from a recent backup. This action exemplifies which method of defense?
Implementing multi-factor authentication can be regarded as which type of security?
Implementing multi-factor authentication can be regarded as which type of security?
Which of the following would be an example of physical security?
Which of the following would be an example of physical security?
Which of the following would be an example of procedural security?
Which of the following would be an example of procedural security?
Which of the following activities best exemplifies 'integrity' in the context of computer security?
Which of the following activities best exemplifies 'integrity' in the context of computer security?
A disgruntled employee modifies critical data in a company database, leading to incorrect financial reports. Which principle has been violated?
A disgruntled employee modifies critical data in a company database, leading to incorrect financial reports. Which principle has been violated?
A hospital's computer network is infected with ransomware, preventing doctors from accessing patient records. Which security principle has been MOST directly compromised?
A hospital's computer network is infected with ransomware, preventing doctors from accessing patient records. Which security principle has been MOST directly compromised?
An attacker intercepts network communications and copies sensitive data being transmitted between two servers. This is an example of a violation of:
An attacker intercepts network communications and copies sensitive data being transmitted between two servers. This is an example of a violation of:
What is the main intention behind access control?
What is the main intention behind access control?
Why is it important to consider ethical restrictions on computer-based crime?
Why is it important to consider ethical restrictions on computer-based crime?
What do the letters of the acronym CIA stand for?
What do the letters of the acronym CIA stand for?
Which type of individual normally attempts to observe a weakness in a security system, to access cash or other valuables?
Which type of individual normally attempts to observe a weakness in a security system, to access cash or other valuables?
Flashcards
Computer Security
Computer Security
Ensuring the safe, uninterrupted operation of computer systems and safeguarding computer programs and files.
Cybersecurity
Cybersecurity
The practice of protecting computer systems, networks, and digital data from cyber threats.
Information Security
Information Security
Protecting data, both digital and physical, from unauthorized access, modification, or destruction.
Confidentiality
Confidentiality
Signup and view all the flashcards
Integrity
Integrity
Signup and view all the flashcards
Availability
Availability
Signup and view all the flashcards
Authentication
Authentication
Signup and view all the flashcards
Access Control
Access Control
Signup and view all the flashcards
Non-Repudiation
Non-Repudiation
Signup and view all the flashcards
Threat
Threat
Signup and view all the flashcards
Vulnerability
Vulnerability
Signup and view all the flashcards
Control
Control
Signup and view all the flashcards
Interruption
Interruption
Signup and view all the flashcards
Interception
Interception
Signup and view all the flashcards
Modification
Modification
Signup and view all the flashcards
Fabrication
Fabrication
Signup and view all the flashcards
Method (in MOM)
Method (in MOM)
Signup and view all the flashcards
Opportunity
Opportunity
Signup and view all the flashcards
Motive
Motive
Signup and view all the flashcards
Security Control
Security Control
Signup and view all the flashcards
Prevent
Prevent
Signup and view all the flashcards
Deter
Deter
Signup and view all the flashcards
Deflect
Deflect
Signup and view all the flashcards
Detect
Detect
Signup and view all the flashcards
Recover
Recover
Signup and view all the flashcards
Study Notes
Objectives of Computer Security
- Aims to examine risks, understand security goals, study threats, and identify controls.
Defining Computer Security
- Involves protecting valuable assets like houses, cars, offices, money in the bank, and confidential data such as emails.
- Definition: Protecting a company's assets by ensuring safe, uninterrupted system operation and safeguarding computers, programs, and data files
- Protects information and physical assets, ensuring confidentiality, integrity, and availability
- Achieved through policies, procedures, hardware, and software tools which secure processed, stored, and transmitted information
Cybersecurity vs Information Security
-
Cybersecurity protects systems, networks, and digital data from cyber threats like hacking and malware
-
Information security (InfoSec) focuses on protecting both digital and physical data from unauthorized access and ensuring confidentiality, integrity, and availability
-
Cybersecurity focuses on digital threats, while information security encompasses all forms of data protection, including physical security
The Importance of Security
- The Internet is exposed to numerous threats, including viruses, worms, Trojan Horses, hacking, denial of service attacks, masquerading, spoofing, fraud, data theft and malicious damage.
- Security is needed in banking, education, government, healthcare, retail, and telecommunications.
Types of Security
- Physical: Environmental protection.
- Logical/System/Technical: Authentication and secure communications.
- Procedural/Personnel: Security Policy.
Principles and Concepts
- Involves security requirements, threats/attacks, and security controls.
- Key aspects includes confidentiality, integrity, availability, authentication, access control, and non-repudiation.
Confidentiality
- Protecting data from unauthorized disclosure to third parties
- Offers protection from passive attacks.
- Acts as secrecy or privacy
- Secures all user data, individual messages, or traffic flow by hiding source, destination, and traffic characteristics
Integrity
- Assures that data is not altered or destroyed without authorization
- Applies to message streams, single messages, or selected message fields
- Focuses on detecting rather than preventing active attacks.
Availability
- Continuous operation of computing systems so legitimate users can access data
- Applies to both data and services.
- Ensures assets are accessible at suitable times
- Aims to prevent denial of service.
Authentication
- Positively identifies individuals or systems requesting access to secured information or services
- Assures that communications are authentic.
Access Control
- Limits entry to host systems and applications through communication links
- Requires identification/authentication of entities so that access rights are specific to the individual.
Non-Repudiation
- Guarantees claimed source authenticity.
- Prevents senders or receivers from denying transmitted messages
- Allows message recipients to prove the message was sent by the alleged sender
- Allows senders to prove the message was received by the alleged receiver.
Security Attacks
- Threats can cause harm to computing systems.
- Vulnerabilities are system weaknesses that can be exploited to cause harm.
- Controls provide protective measures.
- A threat can be blocked by controlling a vulnerability.
MOM (Method, Opportunity, Motive)
- Method: Skills, knowledge, and tools needed for an attack.
- Opportunity: Time and access required for an attack.
- Motive: Reason for wanting to attack a system.
Security Threats
- Security threats are categorized into:
- Interruption: An asset becomes unusable.
- Interception: Unauthorized access to an asset.
- Modification: Unauthorized tampering with an asset.
- Fabrication: Inserting counterfeit objects into the system.
Vulnerabilities
- Hardware vulnerabilities include interruption (DoS), modification and interception (theft).
- Software vulnerabilities includes interruptions (deletion), interception, and modification (logic bomb)
- Data vulnerabilities include interceptions, modification, and fabrication.
Hardware Vulnerabilities
- Include adding, changing, or removing devices and intercepting traffic
- Actions, such as flooding devices, or physical damage are considered hardware vulnerabilities.
Software Vulnerabilities
- Malicious actions (replace, change, destroy)
- Accidental actions (modify, delete, misplace)
- Introduce logic bombs, trojans, viruses, or information leaks.
- Unauthorized copying of software (pirated).
Data Vulnerabilities
- Wiretapping, planting bugs, filtering through trash, electromagnetic radiation monitoring
- Involves stealing, buying, finding or hearing data
- Modifying data.
Security Control
- Achieved through legal/ethical restrictions, preserving confidentiality, integrity, and availability
- Achieved through physical controls, encryption, software/hardware controls, and policies/procedures.
Computer Criminals (People Involved)
- Amateurs exploits weaknesses for financial gain.
- Crackers/hackers attempts to access unauthorized computer facilities.
- Career criminals understands the targets of computer crime.
Methods of Defense
- Prevent by blocking attacks
- Deter by making attacks harder
- Deflect by making other targets more attractive
- Detect as it is happening
- Recover from its effects.
Controls
- Physical, Encryption, Software, Hardware, and Policies/Procedures
Effectiveness of Controls
- Enhanced by awareness, likelihood of use, using overlapping controls, and periodic review.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.