Unit 10C Computer Security Flashcards

(15 cards)

1
Q

Computer security provides:

A

Provides Confidentiality, Integrity, and Availability (CIA) assurances to users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Roles in computer security:

A

Users, Black hat hackers, white hats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The International Information System Security Certification Consortium (ISC)2 code of ethics:

A

Protect, have honour, provide services, adhere to profession

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Asset State in McCumber Cube:

A

Where info is when exploited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Safeguards

A

How to protect technical, storage, procedural, and human factors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Confidentiality, Integrity, and Availability (CIA) in McCumber Cube

A

Quality and safety. CIA itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Asset

A

Something of value to protect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Threat

A

Potential event. Loss of value or data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Mitigation is the process . . .

A

Process of reducing risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Attack Vector

A

A path an attacker takes to access an asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Threat Modelling is the process . . .

A

Process of analysing a system for vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Disclosure attacks

A

Confidentiality. Asset viewed against the owner’s wishes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Alteration attacks

A

Integrity. Unauthorised change to/on user’s data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Denial attack

A

Availability. Disrupts access to system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

STRIDE:

A

Spoofing, Tampering, Repudiation (Hide tracks), Info disclosure, Denial of service, Elevation of privileges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly