Computer Security Lecture 1

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/30

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

31 Terms

1
New cards

What does the CIA Triad stand for in computer security?

Confidentiality, Integrity, Availability.

2
New cards

What is Confidentiality in the CIA Triad?

Keeping information and resources secret from unauthorized parties.

3
New cards

What is Integrity in the CIA Triad?

Ensuring correctness and trustworthiness of data and its origin.

4
New cards

What is Availability in the CIA Triad?

Ensuring information and services are accessible and usable when needed.

5
New cards

Why is availability equally important as confidentiality and integrity?

Because an unavailable system is as useless as no system at all.

6
New cards

What are mechanisms used to ensure confidentiality?

Cryptography, metadata minimization, and system-level access controls.

7
New cards

Why can the existence of data itself be sensitive?

Because metadata or traffic analysis can reveal events even without reading the data (e.g., emergency activity).

8
New cards

Why must cryptographic keys themselves be protected?

Because they grant access to encrypted data; if keys are stolen, encryption fails.

9
New cards

What are common failure modes for confidentiality?

Bypassed controls, side-channel leaks, and key exposure.

10
New cards

What are the two aspects of integrity?

Data integrity (unaltered content) and data origin integrity (correct source).

11
New cards

What are the two main types of integrity mechanisms?

Prevention (block unauthorized changes) and Detection (signal loss of trust using hashes or logs).

12
New cards

How is integrity different from confidentiality?

Integrity deals with correctness and trustworthiness, not just secrecy.

13
New cards

What’s the difference between correctness and trustworthiness?

Correctness: data matches reality; Trustworthiness: data origin and chain-of-custody can be relied on.

14
New cards

Give an example of “correct but not trustworthy” data.

A legitimate-looking invoice PDF received from an unknown sender.

15
New cards

Give an example of “trustworthy but incorrect” data.

A signed sensor report with perfect provenance but faulty readings.

16
New cards

What does availability mean in computer security?

Ensuring reliable, timely access to data and services.

17
New cards

What is a Denial of Service (DoS) attack?

An attack that exhausts resources or disrupts services to block access.

18
New cards

Why is system availability more than just measuring uptime?

Because true availability also depends on performance, usability, and fault tolerance, not just whether the system is running.

19
New cards

How can improving one CIA property weaken another?

Example: Encrypting everything (C↑) can slow access (A↓) and hinder validation (I↓).

20
New cards

What is graceful degradation?

Designing systems to fail safely and partially instead of completely breaking.

21
New cards

What are the four main classes of threats?

Disclosure (violates C), Deception (violates I), Disruption (violates A), and Usurpation (violates all by taking control).

22
New cards

What are Advanced Persistent Threats (APTs)?

Long-term, organized attacks by well-funded groups (often nation-states).

23
New cards

What’s the difference between a policy and a mechanism in security?

Policy defines what is allowed; Mechanism enforces the policy.

24
New cards

What are the three goals of security mechanisms?

Prevention, Detection, and Recovery.

25
New cards

Why do assumptions matter in security?

Wrong assumptions about environment or requirements invalidate security.

26
New cards

What’s the difference between trusted and trustworthy?

Trusted means relied upon; Trustworthy means deserving of that trust.

27
New cards

What is assurance in computer security?

Evidence that a system deserves to be trusted for its purpose.

28
New cards

Why can’t testing alone prove security?

Testing only gives confidence after the fact and can’t cover all conditions.

29
New cards

Why is “security by design” better than “security as a patch”?

Built-in security is cheaper and more effective than adding it later.

30
New cards

Why is usability important in security design?

If controls are too complex, users bypass them, defeating security.

31
New cards