CPS 633

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/49

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

50 Terms

1
New cards

CIA of security

confidentiality, integrity and availability

2
New cards

confidentiality (cia of security)

only authorized people can learn the information

3
New cards

integrity (cia of security)

only authorized people can modify the information

4
New cards

availabilty (cia of security)

the authorized people are able to access resources

5
New cards

authorization

granting access to resources only to authorized principles

6
New cards

indentification

checking a subject identity

7
New cards

authentication

verifying that a principal, data or software is genuine

8
New cards

accountability

the ability to identify the principals responsible for past actions

9
New cards

asset

valuable resource which is protected. can be information, software, hardware and computing and communication services

10
New cards

vulnerability

weaknesses in a system that may be able to be exploited in order to cause loss or harm

11
New cards

threat

a loss or harm that might befall a system. there are four major categories of threats. interception, interruption, modification, fabrication

12
New cards

types of threats nautral causes

natural causes (fire, earthquake, flood, power failure)

13
New cards

types of threats human causes

benign, human error, unintentional mistakes in code
malicious targeted or directed attacks

14
New cards

attacks

an action that exploits a vulnerability

15
New cards

controls

removing or reducing a vulnerability. can control vulnerability to prevent an attack and defend against a threat. controls are physical, procedural and technical

16
New cards

asset value

depends on the perception of its importance with respect to the targeted security goals.

17
New cards

hardware objects of value

are computer, devices, network gear

18
New cards

software objects of value

OS, utilities, commercial applications, individual applications

19
New cards

data objects of value

documents, photos, class projects

20
New cards

how can we defend against an attack

prevent it, deter it (make it more expensive or harder), deflect it (make it look less attractive to attacker), mitigate it ( reducing the impact of the attack), detect it (notice that the attack is occuring), recover from it( mitigate the effects of the attack),

21
New cards

concept of privacy

controlling the information about you

22
New cards

concept of anonymity

hiding your identity

23
New cards

linkability

the property which allows an unauthorized party to learn separate actions to a principal

24
New cards

types of attacker

amateurs, malicious insiders, script kiddies, crackers, organized crime, industrial espionage agents, government cyber warriors, terrorists

25
New cards

risk

expected loss due to future harmful events

26
New cards

exposure factor

percentage of loss in the asset value in case of an attack

27
New cards

single loss expectancy

expected cost of one attack

28
New cards

annual loss expectancy

the expected cost of attacks over a year

29
New cards

risk management

risk reduction, risk transfer, risk acceptance, risk avoidance

30
New cards

cryptography

using math techniques to provide confidentiality and integrity

31
New cards

operating system and network controls

sandboxes, virtual machines, logs, network scans

32
New cards

independent control programs

password checker, virus scanner, intrusion detection systems

33
New cards

internal program controls

read and write in DBMS

34
New cards

development controls

quality standards followed by the developers such as input validations and input sanitization

35
New cards

policies

what is and what is not allowedp

36
New cards

procedures

how you enforce this policy

37
New cards

physical controls

walls, fences, locks, human guard

38
New cards

method opportunity motive model (mom model)

consider the motivations of the attacker, the opportunities for the adversary and the methods they can achieve their goals. (reduce their opportunities and methods they can use to attack)

39
New cards

simplicity and necessity

keep it simple so that you do not overlook anything. the more complicated it is, the harder it is for you to leave no loop holes

40
New cards

security policy informal

precisely describes the protection properties that a system must have

41
New cards

formal definition of confidentiality

confidentiality implies that there is information that must not be disclosed to some set of entities(people or roles). it has to be able to be disclosed to some entity

42
New cards

security policy formal

statement that partitions the states of the system into a set of authorized and unauthorized states

43
New cards

separation of duties

forbids an entity from completing the transaction on its own

44
New cards

military security policy

policy primarily protecting confidentiality. focuses on privacy

45
New cards

commercial security policy

policy primarily protecting integrity

46
New cards

role based access control

based on roles that users have within the system and rules stating what accesses are allowed to users in given roles

47
New cards

mandatory access control

system mechanism controls access to object, and individual cannot alter that access

48
New cards

discretionary access control

individual user sets access control mechanism to allow or deny access to an object

49
New cards

originator controlled access control

creator of information controls who can access information

50
New cards