CSIT-460 Computer Security Lecture Notes Flashcards P2

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/31

flashcard set

Earn XP

Description and Tags

Flashcards based on lecture notes about Computer Security, covering topics such as vulnerabilities, threats, attacks, and security measures.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

32 Terms

1
New cards

What is Computer Security?

The protection of computer systems and information from harm, theft, and unauthorized use.

2
New cards

What two things is the security of a system always ‘relative’ to?

A set of desired properties and an adversary with specific capabilities.

3
New cards

What is a vulnerability in computer security?

A weakness or flaw in a system’s design, code, or management that can be exploited by attackers to cause harm.

4
New cards

Name classifications of vulnerabilities:

Where they happen (design, building, running, etc.), how detailed they are (hardware, software, etc.), what kind of problem (memory mistakes, timing, etc.) and how they are revealed (zero-day, known, shared).

5
New cards

What are the three possible causes of an impact related to vulnerability?

Deliberate actions (e.g., hacking), accidents (e.g., human error), and environmental events (e.g., power outages).

6
New cards

Define a potential attack.

The risk that someone could use a vulnerability to harm the system; it exists whenever there is a weakness that could be exploited.

7
New cards

Define an actual attack.

When someone intentionally tries to break a system’s security by exploiting a vulnerability.

8
New cards

What is an active attacker?

Someone who tries to change or damage a system.

9
New cards

What is a passive attacker?

Someone who just observes and collects information.

10
New cards

All cyberattacks are the realization of a , but not all of those result in an __.

cyber threat, attack

11
New cards

Define 'Alteration' in the context of cyber threats.

Unauthorized modification of information, such as in a man-in-the-middle attack.

12
New cards

Define 'Eavesdropping' in the context of cyber threats.

The interception of information intended for someone else during transmission.

13
New cards

Define 'Denial-of-service' in the context of cyber threats.

The interruption or degradation of a data service or information access.

14
New cards

Define 'Masquerading' in the context of cyber threats.

The fabrication of information that is purported to be from someone who is not actually the author.

15
New cards

Define 'Repudiation' in the context of cyber threats.

The denial of a commitment or data receipt.

16
New cards

Define 'Correlation and traceback' in the context of cyber threats.

The integration of multiple data sources and information flows to determine the source of a particular data stream or piece of information.

17
New cards

Name five reasons why people attack other’s systems:

To make money, because they're curious, for political or social reasons, because someone paid them, or to gather secrets or help their country.

18
New cards

What are intrusions?

Actions that try to break into computer systems to steal, change, or damage information.

19
New cards

What is STRIDE?

A threat modeling methodology used to categorize and identify potential security threats in a system including: Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service (DoS), and Elevation of Privilege.

20
New cards

What is DREAD?

A methodology to quantify, compare, and prioritize security threats including: Damage, Reproducibility, Exploitability, Affected Users, and Discoverability.

21
New cards

What is Threat Modeling

A structured set of assumptions about potential attacks that a system aims to defend against.

22
New cards

What is the first key step in Threat Modeling?

Scope Your Work by creating data flow diagrams (DFDs) to visualize system components and interactions.

23
New cards

Give possible mitigations for spoofing

Strong, unique passwords and MFA

24
New cards

Give possible mitigations for tampering

Endpoint protection and patching

25
New cards

Give possible mitigations for repudiation

Secure, remote log storage

26
New cards

Give possible mitigations for information disclosure

Data encryption and access controls

27
New cards

Give possible mitigations for Denial of Service (Dos)

Regular, offline backups

28
New cards

Give possible mitigations for Elevation of Privilege

Least privilege, password policies

29
New cards

What is an Intrusion Detection System (IDS)?

A security technology that monitors network traffic for suspicious activity and known threats, sending alerts or logs but not taking direct action to block threats.

30
New cards

What is an Intrusion Prevention System (IPS)?

A security technology that monitors network traffic for threats and automatically takes action to block, drop, or prevent malicious traffic from reaching its target.

31
New cards

Name three types of local attacks

Privilege Escalation, Physical Access, and Shoulder Surfing

32
New cards

Name three types of remote attacks

Exploiting vulnerabilities over Ethernet, WiFi, 3G/4G, Bluetooth, etc., using compromised disks, CD-ROMs, USB sticks, or other removable media to introduce malware and Manipulating individuals via phone calls or messages to gain unauthorized access or information.