1: Basic Concepts of Cybersecurity

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/40

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

41 Terms

1
New cards

Information

A knowledge concerning any objects, such as facts, events, things, processes or ideas, which have a special meaning in certain contexts

Heavily related to knowledge, it assumes there is a fact which is known (object), and a person who knows the fact (subject)

2
New cards

When we consider the practical representation of information, data

When will the practical shape of information occur?

3
New cards

Data

Reinterpretable formalized representation of an information in such a form which i suitable for transfer, processing and/or interpretation

The presentation of information, usually in a pre-agreed form

4
New cards

Digital Data Set

Presentation of information as a bit sequence, often referred to as files

Ex: A sequence of symbols 0 and 1

5
New cards

Format

Rule for interpreting data as information, especially as an actual type of information (text, image, sound, video, etc.)

A rule on how information is presented in digital form

6
New cards

True

True or False:

Any information in computers (IT equipment) is always presented in digital form in certain pre-agreed formats as datasets (files) that carry information

7
New cards

Pre-agreed format

What gives the data set (document) its meaning?

8
New cards

True

True or False:

Different data formats are usually supported by a different application software means which allow to write the file in the certain format, or to made the content of data (information) human-perceptable

9
New cards

False

True or False:

A typical end-user usually knows everything about different data formats and interpretation

10
New cards

What You See Is What You Get

The human-perceptable form prepared by software an end user receives

11
New cards

False

True or False:

If we possess (or process) the data then the information carried by the data has no certain value for us (for our business process)

It depends on either the information is represented by the digital nor by the paper-based data

12
New cards

Information/Data Security

A discipline concerning the maintaining the values/properties of information (performed in practice by the maintaining of the properties of data)

13
New cards

Information Availability, Information Integrity, Information Confidentiality

What are the 3 Independent Branches of Information/Data Security?

14
New cards

Data Protection

In Europe, it often means the protection of personal data

15
New cards

Availability

A timely and convenient access and usage of information carried by the data for all authorized persons and other subjects (entities)

The most important concept of data security

In business processes, this means that it actually works by planned process

16
New cards

Integrity

Ensuring that data (information was stored into the data) are originated by a certain source and haven’t been altered (both by an accident or by deliberate act or by the fake)

Second most important security branch

In business processes, this means that it works in a proper way as details and properties are correct

17
New cards

Confidentiality

Availability of the information, carried by the data, only by the authorized subjects (and strict non-availability for other subjects)

In business processes, this means that ineither the details of business process or data used inside the process must be accessible only to certain users

18
New cards

Security of Data

Ensured by securing the IT assets surrounding the data

19
New cards

IT equipment, Data communication channels, Software, Organization, Personnel, Data Carriers, Infrastructure

Examples of IT Assets?

20
New cards

A great but indirect value of a data, Portativity, Possibility of avoiding the physical conact, Disclosure of security losses

Main Properties of Digital IT assets?

21
New cards

Portativity

Data which can be stored by the very small and easily movable carriers can posses a huge value for our business process

22
New cards

Threat

A potential extern-influenced harm of information security

Influences the data and exploits the vulnerabilities of IT assets or components of IT system

Will determine the risk or security risk, then there will appear a security loss, breach, or incident

23
New cards

Threat

1?

<p>1?</p>
24
New cards

p: risk

2?

<p>2?</p>
25
New cards

Influence

3?

<p>3?</p>
26
New cards

Assets

4?

<p>4?</p>
27
New cards

Damage

5?

<p>5?</p>
28
New cards

Vulnerability

6?

<p>6?</p>
29
New cards

Safeguards, Security Measures

A modification of IT assets that will minimize the risks and rate of vulnerabilities of assets

30
New cards

Safeguards

What was added to minimize vulnerabilities and residual risk?

<p>What was added to minimize vulnerabilities and residual risk?</p>
31
New cards

Vulnerability

The property of each IT asset (component) from the point of view of external threats

32
New cards

Risk

A probability that an actual threat can exploit the certain vulnerability and will realize

33
New cards

Security Loss

An event when the security availability, integrity and/or confidentiality of some IT assets will be harmed

A realized risk

34
New cards

Integrity Loss

Integrity, Availability or Confidentiality Loss:

Failure of equipment

35
New cards

Availability Loss

Integrity, Availability or Confidentiality Loss:

Theft of equipment

36
New cards

Integrity Loss

Integrity, Availability or Confidentiality Loss:

Unauthorized modifying of register

37
New cards

Availability Loss

Integrity, Availability or Confidentiality Loss:

Destroying of office rooms by fire

38
New cards

Confidentiality Loss

Integrity, Availability or Confidentiality Loss:

Wiretapping of non-encrypted data cables

39
New cards

Organizational Security

In order to protect data used in a business process (information assets), data security must be handled by the organization or organizations involved in the entire business process

40
New cards

Acceptable Residual Risk

A situation where the total price of all implemented safeguards is approximately equal to the forecasted total loss of security

41
New cards

Risk Management

To standardize different security levels i.e. different availability, integrity and confidentiality levels

To create a system which is able to determine standardized actions (safeguards), for different security levels, which result ensures us to approximately achieve the optimum point (to achieve the acceptable residual risk situation