Front | Back |
Computer and network security are based on what 3 pillars?
|
ConfidentialityIntegrityAvailability
|
What is a favored authentication method?
|
Username and password: who you say you are and prove it
|
What does secrecy ensure?
|
Users only access info they are allowed to access
|
What does confidentiality ensure?
|
The protection of private info as well as sensitive business documents
|
What does authenticity provide?
|
A way of verifying the origin of data by who entered or sent it
|
What does accuracy and integrity mean?
|
System must not corrupt the info or allow malicious or accidental changes
|
What is confidentiality associated with?
|
Business environments
|
What is secrecy associated with?
|
Government systems where access is determined by security clearances
|
What is message authentication?
|
A method that ensures the accuracy of a transmission
|
What does availability mean?
|
Hardware and software keep working efficiently and systems can recover quickly if a disaster occurs
|
What is the opposite of availability?
|
Denial of service, unable to get resources needed
|
What is vulnerability?
|
Point where a system is susceptible to attack - no password protection
|
What is a threat?
|
Possible danger to system - hacker
|
What are countermeasures?
|
Techniques for protection your system
|
What are some types of vulnerabilities?
|
Physical - theft - lock Natural - dust - coverHard/software - patch flawsMedia - damage - backup filesEmanations - eavesdropping - TEMPEST
|