1/41
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Security objectives
are goals and constraints that affect the confidentiality, integrity, and availability of your data
Confidentiality
this property means that information is not made available or disclosed to unauthorized individuals
Data integrity
ensures that data and programs are changed only in a specified and authorized manner
System integrity
ensures that a system performs its intended function in an unimpaired manner
Availability
ensures that systems work promptly and the service is not denied to authorized users
Authenticity
The property of being genuine and being able to be verified and trusted
Accountability
The security goal that generates the requirement for actions of an entity to be traced uniquely to that entity.
OSI Security Architecture
defines a general security architecture that is useful to managers as a way of organizing the task of providing security
Security attacks
are any action that compromises the security of information owned by an organization
Security attacks padin:)
attempt to gain unauthorized access to information resources or services
Security mechanisms
are technical tools and techniques that are used to implement security services
Security service
is a processing or communication service that enhances the security of the data processing systems
Passive attacks
are like eavesdropping or monitoring transmissions
Release of message contents
In this type, an attacker will monitor an unprotected communication medium like unencrypted email or telephone call
Traffic analysis
In this type, an attacker monitors communication channels to collect a range of information, including human and machine identities
passive attack padin hehe
are very difficult to detect because they do not involve any alteration of the data
masquerade
takes place when one entity pretends to be a different entity.
Active attacks
involve some modification of stored or transmitted data or the creation of false data
Replay
involves the passive capture of a data unit
Data modification
simply means that some portion of a legitimate message is altered
denial-of-service attack
prevents or inhibits the normal use or management of communication facilities.
Authentication
ensure the recipient that the message is from the source that it claims to be from
Access control
is the ability to limit and control access to host systems and applications via communications links
Data confidentiality
is the protection of transmitted data from passive attacks.
Data integrity
ensures that messages are received as sent, with no duplication
Nonrepudiation
prevents either a sender or a receiver from denying a transmitted message.
Availability service
means that a system or a system resource is accessible and usable upon demand by an authorized system
Online privacy
refers to privacy concerns related to user interaction with Internet services through web servers
Data collectors
collect information directly from their customers, audience, or other types of users of their services
Data brokers
compile large amounts of personal data from several data collectors and other data brokers without having direct online contact
WWW
is fundamentally a client/server application running over the Internet
Web server security and privacy
are concerned with the vulnerabilities and threats associated with the platform that hosts a website
Web application security and privacy
are concerned with web software, including any applications accessible via the Web
Web browser security and privacy
are concerned with the browser used from a client system to access a web server.
Mobile Ecosystem
involve communication across several networks and interaction with some systems owned and operated by a variety of parties.
Cellular and Wi-Fi infrastructure
Modern mobile devices are typically equipped with the capability to use cellular and Wi-Fi networks to access the Internet and to place telephone calls.
Public application stores (public app stores)
include native app stores; these are digital distribution services operated and developed by mobile OS vendors
Device and OS vendor infrastructure
host servers to provide updates and patches to the OS and apps.
Enterprise mobility management systems
is a general term that refers to everything involved in managing mobile devices and related components
administrator
is a member of the organization who is responsible for deploying, maintaining, and securing the organization’s mobile devices
app testing facility
employs automated and/or human analyzers to evaluate the security characteristics of an app
auditor
the role of this is to inspect reports and risk assessments from one or more analyzers to ensure that an app meets the security requirements