IA Test 1

Card Set Information

Author:
Anonymous
ID:
101602
Filename:
IA Test 1
Updated:
2011-09-14 02:15:10
Tags:
IA Test
Folders:

Description:
IA Test 1
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user Anonymous on FreezingBlue Flashcards. What would you like to do?


  1. spending to secure military, intellignece, and other agency computer networks is forecasted to rise 44% to 10.7 billipm in 2013 from 7.4 billion this year
    US Government
  2. spending will grow 7% to 8% annually, significiantly faster than IT which has increased about 4% a year in the past 5 yrs
    Security System
  3. General Chilton said this is as much a domain as air land or sea
    cyberspace
  4. William Gibson came up with the term
    Cyberspace
  5. Hardware, Software, Storage Media, Data, Networks, People - What we are protecting
    Computing System
  6. Any available means, not necessarily obvious ways, not necessarily where defended, not necessarily how we expect
    Principle of Easiest Penetration
  7. Set of circumstances that can lead to loss or harm - rabid guard dog - hacker
    Threat
  8. Weakness in the security system - weak spot in a fence
    Vulnerability
  9. countered by controls
    vulnerabilities
  10. blocked by control of a vulnerability
    threat
  11. exploiting a vulnerability
    Attack
  12. Interception, Interruption, Modification(changes), Fabrication(counterfeits)
    Threats
  13. Interruption(DOS attack), Interception(Theft), Modification, Fabrication, Destruction - Laptops are a good example
    Hardware Vulnerabilities
  14. Fractional Rounding, Deletion, Modification, Theft
    Software Vulnerabilities
  15. A type of software vulnerabilities - including - logic bombs, viruses, trojan horses, back doors, keyloggers
    modification
  16. Interception, Destruction, CIA
    Data Vulnerabilities
  17. Protection equal to value - only until value is lost
    Principle of Adequate Protection
  18. Networks, Access(theft of service, malicious access, taking availability needed by legit users), People (social engineering)
    Vulnerabilities in Other Exposed Assets
  19. 3 things needed to attack - can by applied to hackers and burglers(3rd only for hackers)
    Method, Opportunity, Motive -- MOM
  20. CIA =??
    Confidentiality, Integrity, Availability aka security goals
  21. secrecy, privacy - who should access what?
    Confidentiality
  22. Precise, Accurate, Unmodified, Modified only by authorized ways/people/processes, consistent, meeaningful and usable
    Integrity
  23. Data and services, can get what we need - when we need it- in timely fashion, fault tolerance, concurrency issues
    Availability
  24. another goal of security goals - can prove that you are you
    Authenticity
  25. another goal of security goals - you cannot deny that it was you who sent or recieved a transaction
    non repudiation
  26. Essential for e-commerce
    Confidentiality, Integrity, Availability, Authenticity, Non-Repudiation

What would you like to do?

Home > Flashcards > Print Preview