Term
|
Definition
weakness in the security system that might be exploited to cause loss or harm |
|
|
Term
Principle of Easiest Penetration |
|
Definition
An intruder must be expected to use any available means of penetration. |
|
|
Term
describe the relationship among threats, controls, and vulnerabilities |
|
Definition
A threat is blocked by control of a vulnerability |
|
|
Term
|
Definition
a set of circumstances that has the potential to cause loss or harm |
|
|
Term
|
Definition
an exploitation of a vulnerability |
|
|
Term
|
Definition
an action, device, procedure, or technique that removes or reduces a vulnerability |
|
|
Term
|
Definition
some unauthorized party has gained access to an asset |
|
|
Term
|
Definition
- illicit copying of program or data files - wiretapping to obtain data in a network |
|
|
Term
|
Definition
an asset of the system becomes lost, unavailable, or unusable |
|
|
Term
|
Definition
- malicious destruction of a hardware device - erasure of a program or data file - malfunction of an operating system file manager so that it cannot find a particular disk file. |
|
|
Term
|
Definition
unauthorized party not only accesses but tampers with an asset |
|
|
Term
|
Definition
*someone might change the values in a database *alter a program so that it performs an additional computation *modify data being transmitted electronically |
|
|
Term
|
Definition
counterfeit objects on a computing system |
|
|
Term
|
Definition
* insert spurious transactions to a network communication system
* add records to an existing database |
|
|
Term
malicious attacker must have what three things |
|
Definition
# Method: the skills, knowledge, tools, and other things with which to be able to pull off the attack
#Opportunity: the time and access to accomplish the attack
#Motive: a reason to want to perform this attack against this system |
|
|
Term
|
Definition
computer-related assets are accessed only by authorized parties |
|
|
Term
|
Definition
assets can be modified only by authorized parties or only in authorized ways |
|
|
Term
|
Definition
assets are accessible to authorized parties at appropriate times |
|
|
Term
Three goals of computer security |
|
Definition
confidentiality, integrity, and availability |
|
|
Term
|
Definition
access to software is usually carefully controlled so that software is not deleted, destroyed, or replaced accidentally |
|
|
Term
|
Definition
where a program is maliciously modified to fail when certain conditions are met or when a certain date or time is reached |
|
|
Term
|
Definition
program that overtly does one thing while covertly doing another |
|
|
Term
|
Definition
a specific type of Trojan horse that can be used to spread its "infection" from one computer to another |
|
|
Term
|
Definition
a program that has a secret entry point |
|
|
Term
|
Definition
code that makes information accessible to unauthorized people or programs |
|
|
Term
Principle of Adequate Protection |
|
Definition
Computer items must be protected only until they lose their value. They must be protected to a degree consistent with their value |
|
|
Term
|
Definition
the crook shaves a little from many accounts and puts these shavings together to form a valuable result, like the meat scraps joined together in a salami. |
|
|
Term
|
Definition
*intercept a message ordering one bank to credit to an account. * The fabricator might try to replay that message, causing the receiving bank to credit the same account again. |
|
|
Term
|
Definition
*"hacker," (nonmaliciously) programs, manages, or uses computing systems
*"cracker," someone who attempts access to computing systems for malicious purposes. Crackers are the "evildoers." |
|
|
Term
|
Definition
possibility for harm to occur |
|
|
Term
|
Definition
formal name for the scrambling process |
|
|
Term
|
Definition
an agreed-upon sequence of actions that leads to a desired result |
|
|
Term
internal program controls |
|
Definition
parts of the program that enforce security restrictions, such as access limitations in a database management program |
|
|
Term
operating system and network system controls |
|
Definition
limitations enforced by the operating system or network to protect each user from all other users |
|
|
Term
independent control programs |
|
Definition
application programs, such as password checkers, intrusion detection utilities, or virus scanners, that protect against certain types of vulnerabilities |
|
|
Term
|
Definition
quality standards under which a program is designed, coded, tested, and maintained, to prevent software faults from becoming exploitable vulnerabilities |
|
|
Term
|
Definition
* hardware or smart card implementations of encryption * locks or cables limiting access or deterring theft * devices to verify users' identities * firewalls * intrusion detection systems * circuit boards that control access to storage media |
|
|
Term
|
Definition
locks on doors, guards at entry points, backup copies of important software and data, and physical site planning that reduces the risk of natural disasters |
|
|
Term
Principle of Effectiveness |
|
Definition
Controls must be used—and used properly—to be effective. They must be efficient, easy to use, and appropriate |
|
|
Term
Principle of Weakest Link |
|
Definition
Security can be no stronger than its weakest link. Whether it is the power supply that powers the firewall or the operating system under the security application or the human who plans, implements, and administers controls, a failure of any control can lead to a security failure. |
|
|
Term
four kinds of attacks on computing systems |
|
Definition
interception, interruption, modification, and fabrication |
|
|
Term
|
Definition
a system must be protected against penetration only so long as the penetration has value to the penetrator |
|
|
Term
|
Definition
*several different controls may apply to address a single vulnerability
*sometimes called a layered defense
*expectation that one control will compensate for a failure of anothe |
|
|
Term
|
Definition
rely on agreed-upon procedures or policies among users |
|
|
Term
Ex. of administrative control |
|
Definition
frequent changes of passwords |
|
|