The protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability, and confidentiality of information system resources (includes hardware, software, firmware, information/data, and telecommunications). Show
Assures that private or confidential information is not made available or disclosed to unauthorized individuals. Assures that individuals control or influence what information related to them may be collected and stored and by whom and to whom that
information may be disclosed. Assures that information and programs are changed only in a specified and authorized manner. Assures that a system performs its intended function in an unimpaired manner, free from
deliberate or inadvertent unauthorized manipulation of the system. Assures that systems work promptly and service is not denied to authorized users. What is the CIA triad.These are
the fundamental security objectives for both data and for information and computing services. b. Confidentiality, Integrity, and Availability Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information. A loss of ____ is the unauthorized disclosure of information. Guarding against improper information modification or destruction, including ensuring
information nonrepudiation and authenticity. a loss of ____ is the unauthorized modification or destruction of information. Ensuring timely and reliable access to and use of information. A loss of ___ is the disruption of access to or use of information or an information system. The property of being genuine and being able to be verified and trusted; confidence in the validity of a transmission, a message, or message originator. This means verifying their users are who they say they are and that each input arriving at the system came from a trusted source. The security tool
that generates the requirement for actions of an entity to be traced uniquely to that entity. this supports nonrepudiation, deterrence, fault isolation, intrusion detection and prevention, and after-action recovery and legal action. Because truly secure systems aren't yet an achievable goal, we must be able to trace a security breach to a responsible party. Systems must keep records of their activities to permit later forensic analysis to trace security breaches or to aid in transaction
disputes. Including computer systems and other data processing, data storage, and data communications devices Including the operating system, system utilities, and applications. Including files and databases, as well as security-related data, such as password files. An entity that attacks, or is a threat to, a system a. Adversary (Threat Agent) an assault on system security that derives from an intelligent act that is a deliberate attempt (especially in the sense of a method or technique) to evade security services and violate the security policy of a system. An action, device, procedure, or technique that
reduces a threat, a vulnerability, or an attack by eliminating or preventing it, by minimizing the harm it can cause, or by discovering and reporting it so that corrective action can be taken. An expectation of loss expressed as the probability that a particular threat will exploit a particular vulnerability with a particular harmful result. A set of rules and practices that specify or regulate how a system or organization provides security services to protect sensitive and critical system resources. Data contained in an information system; or a service provided by a system; or
a system capability, such as processing power or communication bandwidth; or an item of system equipment (i.e., a system component - hardware, firmware, software, or documentation); or a facility that houses system operations and equipment. c. System Resource (Asset) A potential for violation of security, which exists when there is a circumstance, capability, action, or event, that could breach security and cause harm. That is, a ___ is a possible danger that might exploit a vulnerability. A flaw or weakness in a system's design, implementation, or operation and management that could be
exploited to violate the system's security policy. When the computer system is ______ it does the wrong thing or gives wrong answers. for example, stored data values may differ from what they should be because they have been improperly modified. This is a vulnerability of the system. A computer system is ____ when someone who should not have access to some or all of the information available through the network obtains such access. This is a Vulnerability of the system Another Vulnerability of a computer system is when it becomes ____. its when using the system or network becomes impossible or impractical. An attempt to alter system resources or affect their operation. An attempt to learn or make use of information from the system that does not affect system resources. Initiated by an entity inside the security perimeter. the ____ is authorized to access system resources but uses them in a way not approved by those who granted the authorization. Initiated from outside the perimeter, by an unauthorized or illegitimate user of the system. On
the internet, potential _____ range from amateur pranksters to organized criminals, international terrorists, and hostile governments. This results from the threat of unauthorized disclosure. is can be deliberate, as when an insider intentionally releases sensitive information, such as credit card numbers, to an outsider. it can also be the result
of a human, hardware, or software error, which results in an entity gaining unauthorized knowledge of sensitive data. This results from the threat of unauthorized disclosure. It is a common attack in the context of communications. On a shared LAN, such as a wireless LAN or a broadcast Ethernet, any device attached to the LAN can receive a copy of packets intended
for another device. On the Internet, a determined hacker can gain access to e-mail traffic and other data transfers. This results from the threat of unauthorized disclosure. An example of _____ is known as traffic analysis, in which an This results from the threat of unauthorized disclosure. An unauthorized entity gains access to sensitive data by
circumventing a system's security protections. an attempt by an unauthorized to the altering or replacing of valid data or the introduction , a user either denies sending data or a user denies A circumstance or event that may result in an authorized entity receiving false data and believing it to be true. A circumstance or event whereby an entity gains access to data for which the entity is not authorized. b. Unauthorized Disclosure A circumstance or event that interrupts or prevents the correct operation of system services and functions. A circumstance or event that results in control of system services or functions by an unauthorized entity. Prevents or interrupts system operation by disabling a system component. d. Incapacitation Undesirably alters system operation by adversely modifying system functions or data. b. Corruption A threat action that interrupts delivery of system services by hindering system operation. a. Obstruction: One way to obstruct system operation is to interfere with communications An entity assumes unauthorized logical or physical control of a system resource. c. Misappropriation Causes a system component
to perform a function or service that is detrimental to system security. a. Misuse What are the assets of a computer system? Hardware, Software, Data, and Communication Lines and Networks. _____is the most vulnerable to attack and the least susceptible to automated controls. a. Hardware A key threat to software is an attack on ______ c. Availability A more difficult
problem to deal with is software modification that b. Integrity/authenticity Unauthorized copy of software is a threat to ______ a. Confidentiality Attempt to learn or make use of information from the system but does not affect system resources. a. Passive Attack What are two types of passive attacks? 1. Release of message contents _____involve modification of the data stream b. Active Attack What are the four categories of an Active Attack? 1. Masquerade Action that compromises the security of information owned by an organization. Designed to detect, prevent, or recover from a security attack. Intended to counter security attacks b. Security Service This type of service supports applications like email where there are no prior interactions between
the communicating entities. a. Data Origin Authentication Attempts to provide confidence that an entity is not performing either a masquerade or an unauthorized replay of a previous connection. b. Peer Entity
Authentication The ability to limit and control the access to host systems and applications via communications links a. Access Control Service Prevents either sender
or receiver from denying a transmitted message b. Nonrepudiation Service the property of a system or a system resource being accessible and usable upon demand by an authorized system entity, according to performance specifications for the system e. Availability Service is the protection of transmitted data from passive attacks. c. Data Confidentiality Service can apply to a stream of messages, a single message, or selected fields within a message d. Data Integrity Service What three questions does the computer security strategy ask? 1. Specification/policy: What is the security scheme supposed to do? formal statement of rules and practices that specify or regulate how a system or organization provides security services to protect sensitive and critical system
resources c. Security Policy What are the four complementary courses of action for security implementation? 1. Prevention the degree of confidence one has that the security measures work as intended to
protect the system and the information it processes a. Assurance process of examining a computer product or system with respect to certain criteria b. Evaluation What circumstances or event that results in control of system services or functions by an unauthorized entity?A circumstance or event that results in control of system services or functions by an unauthorized entity. 1-Misappropriationسلاتخا : An entity assumes unauthorized logical or physical control of a system resource. 2-Misuse: Causes a system component to perform a function or service that is harmful to system security.
What is an unauthorized entity directly accesses sensitive data traveling between authorized sources and destinations?"Interception": A threat action whereby an unauthorized entity directly accesses sensitive data traveling between authorized sources and destinations.
What is an attempt by an unauthorized user to gain access to a system by posing as an authorized user?Spoof: Attempt by an unauthorized entity to gain access to a system by posing as an authorized user.
What is a circumstance or event that may result in an authorized entity receiving false data and believing it to be true?A circumstance or event that may result in an authorized entity receiving false data and believing it to be true. 1-Masqueradeعانق: An unauthorized entity gains access to a system or performs a malicious act by posing لﺎﺣﺗﻧﻻا as an authorized entity.
|