Computer Security Principles and Practices Overview

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/136

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

137 Terms

1
New cards

Confidentiality

Protect information from unauthorized access.

<p>Protect information from unauthorized access.</p>
2
New cards

Integrity

Maintain the accuracy and reliability of information.

3
New cards

Availability

Ensure information and systems are accessible when needed.

4
New cards

Confidentiality (Key Security Concept)

Preserving authorized restrictions on information access and disclosure.

5
New cards

Integrity (Key Security Concept)

Guarding against improper information modification or destruction.

6
New cards

Availability (Key Security Concept)

Ensuring timely and reliable access to and use of information.

7
New cards

Low Impact Level

The loss is expected to have a limited adverse effect.

8
New cards

Moderate Impact Level

The loss is expected to have a serious adverse effect.

9
New cards

High Impact Level

The loss is expected to have a severe or catastrophic adverse effect.

10
New cards

Complexity of Security

Security is more complicated than it seems to novices.

11
New cards

Potential Attacks

Security mechanisms or algorithms must account for potential attacks.

12
New cards

Counterintuitive Procedures

Procedures to provide security services may not always be straightforward.

13
New cards

Placement Decisions

Requires careful determination of physical and logical placement.

14
New cards

Secret Information

Security mechanisms depend on secret information, raising concerns about creation, distribution, and protection.

15
New cards

Asymmetry of Effort

Attackers need only one weakness; designers must address all vulnerabilities.

16
New cards

Afterthought Security

Security is often added post-design instead of being integral to the design process.

17
New cards

Continuous Monitoring

Security requires constant and regular vigilance.

18
New cards

Perceived Value

Security investments are often undervalued until a failure occurs.

19
New cards

Efficiency vs. Security

Strong security is often seen as hindering efficiency and user-friendliness.

20
New cards

Adversary (Threat Agent)

An individual, group, organization, or government intending to conduct detrimental activities.

21
New cards

Attack

Malicious activity aimed at collecting, disrupting, denying, degrading, or destroying information system resources or data.

22
New cards

Countermeasure

Devices or techniques designed to impair adversarial activities and prevent espionage, sabotage, theft, or unauthorized access/use of sensitive systems and information.

23
New cards

Risk

Measures the threat level based on adverse impacts if an event occurs and the likelihood of the event happening.

24
New cards

Security Policy

A set of criteria defining how security services are provided and constrains data processing activities to maintain security for systems and data.

25
New cards

System Resource (Asset)

Includes major applications, systems, critical programs, personnel, equipment, or logically related systems.

26
New cards

Threat

Any event or circumstance with potential adverse impacts, such as unauthorized access, destruction, disclosure or modification of information, or denial of service.

27
New cards

Vulnerability

A weakness in information systems, security procedures, internal controls, or implementation that could be exploited or triggered by a threat.

28
New cards

Leakage of Information

Unauthorized individuals gain access to some or all of the information available through the network.

29
New cards

System Unavailability or Slowdown

The system or network becomes impossible to use or impractical due to significant delays or slow performance.

30
New cards

Hardware

Physical components of a computer system.

31
New cards

Software

Programs and applications that run on a computer system.

32
New cards

Data

Information processed or stored by a computer system.

33
New cards

Communication facilities and networks

Systems that enable data exchange between computers.

34
New cards

Corrupted Vulnerability

Loss of integrity.

35
New cards

Leaky Vulnerability

Loss of confidentiality.

36
New cards

Unavailable or Slow Vulnerability

Loss of availability.

37
New cards

Threats

Entities capable of exploiting vulnerabilities, representing potential security harm to assets.

38
New cards

Passive Attack

Goal: Learn or use information without affecting system resources.

39
New cards

Active Attack

Goal: Alter system resources or disrupt their operation.

40
New cards

Insider Attack

Initiated by entities within the security perimeter.

41
New cards

Outsider Attack

Initiated by entities outside the security perimeter.

42
New cards

Countermeasures

Actions or mechanisms to address security attacks.

43
New cards

Countermeasures Functions

Prevent: Stop attacks before they occur. Detect: Identify attacks in progress or after they happen. Recover: Restore systems and data after an attack.

44
New cards

Countermeasures Considerations

Countermeasures may introduce new vulnerabilities. Residual vulnerabilities might remain even after implementation.

45
New cards

Countermeasures Goal

Minimize the residual risk level to protect assets effectively.

46
New cards

Unauthorized Disclosure

An unauthorized entity gains access to data they shouldn't have.

47
New cards

Deception

An authorized entity receives false data and believes it to be true.

48
New cards

Disruption

Circumstance or event that interrupts system operation.

49
New cards

Usurpation

Unauthorized control of system services or functions.

50
New cards

Availability Threats - Hardware

Equipment is stolen or disabled, denying service.

51
New cards

Confidentiality Threats - Hardware

An unencrypted USB drive is stolen.

52
New cards

Integrity Threats - Hardware

A working program is modified to either cause failure or unintended tasks.

53
New cards

Availability Threats - Software

Programs are deleted, denying access.

54
New cards

Availability (Software)

Programs are deleted, denying access.

55
New cards

Confidentiality (Software)

An unauthorized copy of software is made.

56
New cards

Integrity (Software)

A program is altered, causing failures or unintended behaviours.

57
New cards

Availability (Data)

Files are deleted, denying access.

58
New cards

Confidentiality (Data)

Unauthorized reading of data or analysis of statistical data revealing underlying information.

59
New cards

Integrity (Data)

Existing files are modified or new files are fabricated.

60
New cards

Availability (Communication Lines and Networks)

Messages are destroyed or deleted; communication lines/networks are rendered unavailable.

61
New cards

Confidentiality (Communication Lines and Networks)

Messages are read; message traffic patterns are observed.

62
New cards

Integrity (Communication Lines and Networks)

Messages are modified, delayed, reordered, or duplicated; false messages are fabricated.

63
New cards

Passive Attack

Attempts to learn or make use of information from the system without affecting system resources.

64
New cards

Eavesdropping

Monitoring transmissions.

65
New cards

Goal of Passive Attack

To obtain information being transmitted.

66
New cards

Release of Message Contents

Unauthorized access to message contents.

67
New cards

Traffic Analysis

Observing the patterns of message traffic to infer details without accessing the contents.

68
New cards

Active Attack

Attempts to alter system resources or affect their operation.

69
New cards

Goal of Active Attack

Involve modifications to the data stream or the creation of a false stream.

70
New cards

Replay

The attacker retransmits valid data or messages to affect system operation.

71
New cards

Masquerade

The attacker impersonates an authorized entity to gain access or perform actions.

72
New cards

Modification of Messages

Altering the contents of messages to mislead or disrupt.

73
New cards

Denial of Service (DoS)

Disrupting the availability of the system or network, preventing legitimate access.

74
New cards

Access Control

Limit access to authorized users, processes, or devices and restrict the types of transactions users can perform.

75
New cards

Awareness and Training

Ensure managers and users are aware of security risks and related laws.

76
New cards

Audit and Accountability

Create and retain audit records to monitor, analyze, and report inappropriate activity.

77
New cards

Certification, Accreditation, and Security Assessments

Periodically assess the effectiveness of security controls.

78
New cards

Configuration Management

Maintain baseline configurations and inventories of hardware, software, and documentation.

79
New cards

Contingency Planning

Develop plans for emergency response, backup operations, and recovery to ensure availability and continuity in emergencies.

80
New cards

Identification and Authentication

Identify and authenticate users, processes, or devices before granting system access.

81
New cards

Incident Response

Establish and maintain an incident-handling capability.

82
New cards

Maintenance

Perform periodic and timely maintenance on systems.

83
New cards

Media Protection

Protect both paper and digital media.

84
New cards

Physical and Environmental Protection

Limit physical access to systems and infrastructure.

85
New cards

Planning

Develop, document, and update security plans that describe controls and rules for behaviour.

86
New cards

Personnel Security

Ensure trustworthy individuals occupy responsible positions.

87
New cards

Personnel Security

Protect systems during personnel actions like terminations.

88
New cards

Personnel Security

Enforce sanctions for non-compliance with security policies.

89
New cards

Risk Assessment

Periodically assess risks to operations, assets, and individuals from the use of information systems.

90
New cards

Systems and Services Acquisition

Allocate sufficient resources for security.

91
New cards

Systems and Services Acquisition

Incorporate security in system development and acquisition processes.

92
New cards

Systems and Services Acquisition

Ensure third-party providers follow security practices.

93
New cards

System and Communications Protection

Monitor, control, and protect communications at internal and external system boundaries.

94
New cards

System and Communications Protection

Use architectural and software development principles for effective security.

95
New cards

System and Information Integrity

Identify and correct system flaws quickly.

96
New cards

System and Information Integrity

Protect against malicious code and monitor security alerts.

97
New cards

Economy of Mechanism

Keep the design as simple as possible to reduce the number of security mechanisms, which makes it easier to analyze and maintain.

98
New cards

Fail-Safe Defaults

Default configurations should deny access unless explicitly granted. This minimizes potential harm by ensuring that the system is secure even in the absence of active decisions.

99
New cards

Complete Mediation

Every access request must be checked against the security policy, ensuring no bypassing of access control mechanisms.

100
New cards

Open Design

Security should not rely on the secrecy of the design or implementation. Open design allows for external review and ensures security is based on sound principles rather than obscurity.