Computer Security: Principles and Practice (Ch. 1) Overview

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/50

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

51 Terms

1
New cards

Computer security

Measures and controls that ensure confidentiality, integrity, and availability of information system assets including hardware, software, firmware, and information being processed, stored, and communicated.

2
New cards

Data confidentiality

Assures that private or confidential information is not made available or disclosed to unauthorized individuals.

3
New cards

Privacy

Assures that individuals control or influence what information related to them may be collected and stored and by whom and to whom that information may be disclosed.

4
New cards

data integrity

Assures that information and programs are changed only in a specified and authorized manner

5
New cards

System Integrity

Assures that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system

6
New cards

Availability

Assures that systems work promptly and service is not denied to authorized users

7
New cards

Confidentiality

Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information.

8
New cards

Integrity

Guarding against improper information modification or destruction, including ensuring information nonrepudiation and authenticity. A loss of integrity is the unauthorized modification or destruction of information.

9
New cards

Availability

Ensuring timely and reliable access to and use of information

10
New cards

Authenticity

The property of being genuine and being able to be verified and trusted; confidence in the validity of a transmission, a message, or message originator.

11
New cards

Accountability

The security goal that generates the requirement for actions of an entity to be traced uniquely to that entity.

12
New cards

The system can be _______, so it does the wrong thing or gives wrong answers.

Corrupted

13
New cards

Adversary (threat agent)

Individual, group, organization, or government that conducts or has the internet to conduct detrimental activities.

14
New cards

Attack

Any kind of malicious activity that attempts to collect, disrupt, deny, degrade, or destroy information system resources or the information itself.

15
New cards

Countermeasure

A device or techniques that has as its objective the impairment of the operational effectiveness of undesirable or adversarial activity, or the prevention of espionage, sabotage, theft, or unauthorized access to or use of sensitive information or information systems.

16
New cards

Risk

A measure of the extent to which an entity is threatened by a potential circumstance or event, and typically a function of 1) the adverse impacts that would arise if the circumstance or event occurs; and 2) the likelihood of occurrence.

17
New cards

Security policy

A set of criteria for the provision of security services. It defines and constrains the activities of a data processing facility in order to maintain a condition of security for systems and data.

18
New cards

System resource (asset)

A major application, general support system, high impact program, physical plant, mission critical system, personnel, equipment, or a logically related group of systems.

19
New cards

Threat

Any circumstance or event with the potential to adversely impact an information system through unauthorized access, destruction, disclosure, modification of data, and/or denial of service.

20
New cards

Vulnerability

Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source.

21
New cards

Active attack

An attempt to alter system resources or affect their operation

22
New cards

Passive attack

An attempt to learn or make use of information from the system that does not affect system resources

23
New cards

Inside attack

Initiated by an entity inside the security perimeter (an "
insider").
The insider is authorized to access system resources but uses them in a way not
approved by those who granted the authorization.

24
New cards

Outside attack

Initiated from outside the perimeter, by an unauthorized or illegitimate user of the system (an "outsider"). On the Internet, potential outside attackers range from amateur pranksters to organized criminals, international terrorists, and hostile governments.

25
New cards

______ is a threat to confidentiality.

Unauthorized disclosure

26
New cards

Examples of unauthorized disclosure are...

Exposure, interception, inference, & intrusion

27
New cards

_____ is a threat to system integrity or data integrity.

Deception

28
New cards

Examples of deception are...

Masquerade, falsification, and repudiation

29
New cards

_______ is a threat to availability or system integrity.

Disruption

30
New cards

Examples of disruption are...

Incapacitation, corruption, & obstruction

31
New cards

______ is a threat to system integrity.

Usurpation

32
New cards

Examples of usurpation are

Misappropriation & misuse

33
New cards

Two types of passive attacks are ___ and ___.

Release of message contents, traffic analysis

34
New cards

Active attacks can be subdivided into four categories...

Replay, masquerade, modification of messages, & denial of service

35
New cards

Economy of mechanism

The design of security measures embodied in both hardware and software should be as simple and small as possible

36
New cards

Fail-safe default

access decisions should be based on permission rather than exclusion

37
New cards

Complete mediation

Every access must be checked against the access control mechanism

38
New cards

Open design

the design of a security mechanism should be open rather than secret

39
New cards

Separation of privilege

practice in which multiple privilege attributes are required to achieve access to a restricted resource

40
New cards

Least privilege

Every process and every user of the system should operate using the least set of privileges necessary to perform the task

41
New cards

Least common mechanism

The design should minimize the functions shared by different users, providing mutual security

42
New cards

Psychological acceptability

The security mechanisms should not interfere unduly with the work of users, and at the same time meet the needs of those who authorize access.

43
New cards

Isolation

A principle that applies in three contexts: 1) Public access systems should be isolated from critical resources. 2) Processes and files of individual users should be isolated from one another except where it is explicitly desired. 3) Security mechanisms should be isolated in the sense of preventing access to those mechanisms.

44
New cards

Encapsulation

A specific form of isolation based on object-oriented functionality.

45
New cards

Modularity

In the context of security refers both to the development of security functions as separate protected modules, and to the use of a modular architecture for mechanism design and implementation.

46
New cards

Layering

The use of multiple, overlapping protection approaches addressing the people, technology, and operational aspects of information systems.

47
New cards

Least astonishment

A program or user interface should always respond in the way that is least likely to astonish the user

48
New cards

Attack surfaces can be categorized in the following way...

Network attack surface, software attack surface, human attack surface

49
New cards

Security implementation involves four complementary courses of action...

Prevention, detection, response, & recovery

50
New cards

Assurance

An attribute of an information system that provides grounds for having confidence that the system operates such that the system's security policy is enforced.

51
New cards

Evaluation

The process of examining a computer product or system with respect to certain criteria.