Introduction to Computer Security - Module 1

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/24

flashcard set

Earn XP

Description and Tags

Lecture notes covering fundamental cybersecurity principles, the CIA triad, access control mechanisms, cryptography basics, physical security, and computer forensics.

Last updated 5:01 AM on 5/10/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

25 Terms

1
New cards

Confidentiality

The avoidance of the unauthorized disclosure of information.

2
New cards

Integrity

The avoidance of the unauthorized modification of information.

3
New cards

Availability

Ensuring that information and resources are accessible to authorized users when needed, often through physical protections and computational redundancies.

4
New cards

Assurance

A security concept involving Policies (behavioral expectations), Permissions (behaviors allowed for agents), and Protections (mechanisms to enforce policies).

5
New cards

Authentication

The determination of the identity or role that someone has, based on something you are, something you know, or something you have.

6
New cards

Anonymity

The property of being unidentifiable within a set of subjects; maintained through tools like aggregation, mixing, proxies, and pseudonyms.

7
New cards

Repudiation

An attack where a party involves an attempt to back out of a contract or a protocol.

8
New cards

Access Control Matrix

A table where each row is a subject (user/group), each column is an object (file/device), and cells contain specific access rights.

9
New cards

Capabilities

A subject-centered approach to access control where lists of permissions are associated with specific users or systems.

10
New cards

Access Control List (ACL)

An object-centered approach to access control where permissions for different subjects are stored with the object itself.

11
New cards

Symmetric Key Distribution

A system where each pair of communicating parties requires a separate secret key, totaling n(n1)/2n(n-1)/2 keys for nn parties.

12
New cards

Public Key Distribution

A system where only one key pair is needed for each recipient, totaling nn key pairs for nn parties.

13
New cards

Collision-resistant

A property of cryptographic hash functions where it is hard to find two different messages, MM and NN, such that H(M)=H(N)H(M) = H(N).

14
New cards

Message Authentication Codes (MAC)

A tool for data integrity where shared secret key KK is used to compute a hash H(KM)H(K||M) for a message MM.

15
New cards

Digital Certificates

A binding between an identity and a public key that is digitally signed by a certificate authority (CA).

16
New cards

ICCID

Integrated circuit card ID; a unique 18-digit number for hardware identification found on SIM cards.

17
New cards

IMSI

International mobile subscriber identity; identifying information stored on SIM cards for network authentication.

18
New cards

TEMPEST

A U.S. government code word for standards establishing protection zones based on an attacker's distance from equipment to mitigate electronic emanation risks.

19
New cards

Faraday Cage

An enclosure of metallic conductive shielding or mesh designed to block electromagnetic emanations.

20
New cards

Computer Forensics

The scientific process of preserving, identifying, extracting, documenting, and interpreting data on a computer to obtain potential legal evidence.

21
New cards

Priority by Volatility

The forensic principle of capturing data in order of how quickly it is lost: RAM > swap > disk > CDs/DVDs.

22
New cards

Slack Space

The empty space between the actual end of a file and the end of the last physical sector allocated to that file on a hard drive.

23
New cards

Steganography

The process of hiding data inside other data, such as embedding secrets within image files.

24
New cards

Bitstream Copy

A forensic bit-for-bit duplicate of digital media that captures all data, including hidden, residual, and deleted files.

25
New cards

Disk Wiping

A process for secure data deletion that involves overwriting file data with random data before marking the segments as available.