1/20
Flashcards covering key concepts in cyber security, including definitions, security goals, attack types, and security services.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Cyber Security
A process designed to protect networks and devices from external threats; the protection of Internet-connected systems from cyber-attacks.
Need of Cyber Security (for businesses)
To protect confidential information, maintain employee productivity, and enhance customer confidence in products and services.
Layers of Cyber Security
Mission Critical Assets, Data Security, Application Security, Endpoint Security, Network Security, Perimeter Security, The Human Layer
Confidentiality
Preventing the disclosure of data to unauthorized parties.
Integrity
Protecting information from being modified by unauthorized parties.
Availability
Making sure that authorized parties are able to access the information when needed.
Snooping
Unauthorized access to or interception of data.
Traffic Analysis
Obtaining information by monitoring online traffic (e.g., email addresses).
Modification (Attack on Integrity)
Modifying information after intercepting or accessing it.
Masquerading
When the attacker impersonates somebody else.
Replaying
To replay the message sent to a network by an attacker which an authorized user earlier sent.
Repudiation
The sender or receiver denies having sent or received a message.
Denial of Service (DoS)
Slows down or totally interrupts the service of a system.
Passive Attack
The attacker’s goal is just to obtain information without modifying data or harming the system.
Active Attack
An attack that may change the data or harm the system.
Security Services
Authentication, Access Control, Data Confidentiality, Data Integrity, Non-repudiation.
Authentication
Verifying the identity of a user, process, or device.
Access Control
The prevention of unauthorized use of a resource.
Data Confidentiality
The protection of data from unauthorized disclosure.
Data Integrity
Assures that messages are received as sent with no duplication, insertion, modification, reordering, or replays.
Nonrepudiation
Prevents either sender or receiver from denying a transmitted message.