What is Information Security?
Ensure data is protected from unauthorised people, preventing them from modifying, deleting, recording etc
What and Why is a CIA Triad needed?
A model to guide policies for internet security
Needed to protect data and its services

What is Confidentiality?
Maintain sensitive data (such as personal data) from reaching to the wrong the wrong people
What is Integrity?
Maintaining accurate, consistant, **trusted information. **Data cannot be changed by people who don’t have access
**Back up copy must be stored **
What is Availability?
Ensurre that information is accessible and available at the right time
Maintain hardware and repair quickly
What are the few Computer Security Challenges?
What is Attack?
An attempt of threat to companies to bypass security services and its policies
What is countermeasure?
Is an action that reduces the threat by reporting or taking action
What is Risk?
Holding a chance that a threat may lead data more vulnerable or further **harmful results **
What is Secuity Policy?
Is a set of rules that is applied to organisations to protect sensitive data and resources
What is a System Resource?
Data in the system provides further security to control access to resourcess
What is a threat?
A potential of violating and exploiting the security which may cause harm
What is Vulnerability?
A weakness in a systems design that could be exposed which can easily attack the system’s security policy
What are the Vulnerabilities of:
Corrupted, Leaky and Unavailable (CIA)
What are the types of threats?
Types of Attacks
What is Unauthorised Disclosure? What are the 4 main points?
Gaining access to data without permission
What is Deception? List and define the 3 main classes
An event that results to an authorised entity to receive false data that may believe to be true
What is Disruption? What are the 3 main classes?
prevents the correct operation from processing
What is Usurpation? List the classes
Controlling a system by using unauthorised entity
What is a Passive threat? Give examples
Attempts to make use of the information but DOES NOT affect the system resources
Example: Eavesdropping/monitoring
What is a Active attack? Give examples
Examples:
What is Countermeasures?
Dealing with a security attack
Can be used:
What is X.800?
Is a security service provided by a protocol layer of communicating open systems