CSIT 460 Computer Security - Lecture 01

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/24

flashcard set

Earn XP

Description and Tags

Flashcards for Computer Security Lecture 01

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

25 Terms

1
New cards

Computer Security

The protection of computer systems and information from harm, theft, and unauthorized use.

2
New cards

Threat

A threat is anything that has the potential to cause harm to your computer systems, data, or organization. Threats can be intentional or unintentional.

3
New cards

Risk

Risk is the chance that a threat will actually exploit a weakness (vulnerability) in your system and cause damage or loss. Risk combines the probability of the threat happening and the impact it would have if it did.

4
New cards

C.I.A

Confidentiality, Integrity, and Availability

5
New cards

Confidentiality

The property that information is not made available or disclosed to unauthorized individuals, entities, or processes.

6
New cards

Tools for Confidentiality

Encryption, Access Control, Identification, Authentication, Authorization, Physical Security

7
New cards

Encryption

The transformation of information using a secret, called an encryption key, so that the transformed information can only be read using another secret, called the decryption key.

8
New cards

Access Control

Rules and policies that limit access to confidential information to those people and/or systems with a 'need to know'.

9
New cards

Identification

The determination of the identity or role that someone has.

10
New cards

Authentication

The verification of the identity or role that someone has.

11
New cards

Authorization

The determination if a person or system is allowed access to resources, based on an access control policy.

12
New cards

Physical Security

The establishment of physical barriers to limit access to protected computational resources.

13
New cards

Integrity

The property that information has not been altered in an unauthorized way.

14
New cards

Tools for Integrity

Backups, Checksums, Data correcting codes

15
New cards

Backups

The periodic archiving of data.

16
New cards

Checksums

The computation of a function that maps the contents of a file to a numerical value.

17
New cards

Availability

The property that information is accessible and modifiable in a timely fashion by those authorized to do so.

18
New cards

Tools for Availability

Physical protections, Computational redundancies

19
New cards

A.A.A (Authenticity, Anonymity, Assurance)

A set of broader security goals related to trust, genuineness, and privacy.

20
New cards

Assurance

Refers to how trust is provided and managed in computer systems. Confidence that the system's security policy is enforced.

21
New cards

Trust management depends on

Policies, Permissions, Protections

22
New cards

Authenticity

The ability to determine that statements, policies, and permissions issued by persons or systems are genuine.

23
New cards

Primary tool for Authenticity

Digital signatures

24
New cards

Anonymity

The property that certain records or transactions not to be attributable to any individual.

25
New cards

Tools for Anonymity

Aggregation, Mixing, Proxies, Pseudonyms