1: Basic Security Concepts

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/18

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 6:37 AM on 5/1/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

19 Terms

1
New cards

Security

Protection of computer-related assets: hardware, software, storage media, data, people.

2
New cards

3 classification of protection

  1. Prevention - take measures that prevent your assets from being damaged.

  2. Detection - take measures that allow you to detect when an asset has been damaged.

  3. Reaction - take measures that allow you to recover from damage to your assets

3
New cards

Real life example:

Prevention - locks at the door or around the property

Detection - burglar alarm rings when a break-in occurs

Reaction - call the police

4
New cards

Security Goals

Confidentiality - Assets of computing systems are accessed only by authorized parties. Access for reading, viewing, printing.

Integrity - Assets can be modified only by authorized people / ways. Preserve integrity means it is precise, accurate, unmodified.

Availability - Assets are accessible to authorized parties when needed without any delay Applies to data and services.

5
New cards

Security Threats: 4

  • Interruption

  • Interception

  • Modification

  • Fabrication

<ul><li><p>Interruption</p></li><li><p>Interception</p></li><li><p>Modification</p></li><li><p>Fabrication</p></li></ul><p></p>
6
New cards

Interruption

An asset of the system is destroyed or become unavailable. Attack on Availability.

7
New cards

Interception

An unauthorized party gains access to an asset. Attack on Confidentiality.

8
New cards

Modification

An unauthorized party not only gain access but tampers with the assets. Attack on Integrity.

9
New cards

Fabrication

An unauthorized party insert counterfeit objects into the system. Attack on Authenticity.

10
New cards

Vulnerability

Weaknesses in the security system that might be exploited to cause loss or harm.

Threats to hardware: DoS and Theft
Threats to software: Modification, piracy
Threats to data: Loss of data, Interception
Threats to other exposed assets: storage media - backups

<p>Weaknesses in the security system that might be exploited to cause loss or harm.</p><p>Threats to hardware: DoS and Theft<br>Threats to software: Modification, piracy<br>Threats to data: Loss of data, Interception<br>Threats to other exposed assets: storage media - backups</p>
11
New cards

Methods of defense

Encryption - provides confidentiality for data

Policies - frequent change of password, training, codes of ethics

Software/Hardware controls - OS controls, Dev controls, Smart card encryption

Physical controls - Lock doors, keep backup copies

12
New cards

People: 4

Amateurs = Normal people who observe a flaw in a security system

Crackers = May be students who attempt to access computing facilities for which they have not been authorized

Career criminal = Understands the targets of computer crime

Hackers = Someone with deep knowledge and interest in multiple OS

13
New cards

Methods how computer security provides protection

System Access Control - ensuring unauthorized users don’t get into the system

Data Access Control - monitoring who can access what data and for what purposes

System and Security Administration - performing certain procedures

System Design - taking advantage of basic hardware and software security characteristics

14
New cards

System Access Control

Identification tells the system who you are

Authentication proves to the system that you are who you are

Prove by something you know, you have, you are

(username & password, tokens, fingerprints)

15
New cards

Common threats on password

Password guessing

Password spoofing

Compromise of the password file

16
New cards

How to defend password security

Change default password

Avoid obvious passwords

Password length and format

17
New cards

Improve password security

Password checkers

Password generator

Limit login attempts

18
New cards

Data Access Control

Observe: look at the contents of an object

Change: change the contents of an object

19
New cards

Effectiveness of controls

Likelihood of use: controls must be effective, easy to use and appropriate.

Overlapping controls: combination of controls on one exposure

Periodic review: ongoing task in judging the effectiveness of a control.