Module 24 - Security

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/18

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

19 Terms

1
New cards

difference between security and protection

security is a policy, protection is a mechanism

2
New cards

economy of mechanism

try to keep it simple and small

3
New cards

fail safe default

default to lack of access

4
New cards

complete mediation

security is as strong as the weakest link

5
New cards

open design

don’t rely on “security through obscurity”

6
New cards

separation of priviledges

provide mechanisms that separate the privileges used for one purpose form those used for another

7
New cards

least privilege

give bare minimum access rights required to complete a task

8
New cards

psychological acceptability

mechanism must be simple to use

9
New cards

physical security

involves preventing threats that require access to the equipment itself

10
New cards

educate the humans

computer security easily subverted by bad human practices

11
New cards

authentication

required to assure tags are validpas

12
New cards

passwords

a fundamental authentication mechanism

13
New cards

trojan horse

code segment that misuses its environment

14
New cards

trap door/back door

specific user identifier or password that circumvents normal security procedures

15
New cards

logic bomb

program that initiates a security incident under certain circumstances

16
New cards

stack and buffer overflow

exploits a bug in a program

17
New cards

types rootkits

applicatyion, library, kernel, hypervisor, firmware

18
New cards

internet worm

self replicating program that exploits errors

19
New cards

steganography

storing information in photographs