Show Home Subjects Expert solutions Create Log in Sign up Upgrade to remove ads Only ₩37,125/year
Terms in this set (30)Phreaking Hacking of the systems and computers used by phone companies Computer security methods used to ensure that a Networking security protection of multiple computers and Information Security/Information Assurance refer to a security focus on the data Confidentiality ensure that only those individuals who have
Integrity only authorized individuals should be able to create, change, or delete info Availability data is available when needed Authentication individuals are who they claim Nonrepudiation verify
that a message has been sent and Auditability a control can be verified to be operating correctly Security Components • Prevention • Detection • Response Operational Method of Computer Security Protection = Prevention + Detection + Response Time based security The amount of time offered by a protection device should be greater than the time to detect the attack plus the reaction time of the organization Allows us
to understand the relationship between Host Security • Each computer is "locked down" individually. Network Security Controlling access to internal computers from external entities concerned with addressing vulnerabilities and threats in computer networks that may or may not be connected to the internet Least Privilege •A subject (user, application, or process) should have only the necessary rights and privileges to perform its task with no additional permissions •By limiting an object's privilege, we limit the amount of harm that can be caused Example Fail Safe Defaults When something fails, it should do so in a safe state Example Implicit Deny • If a
particular situation is not covered by any rules, then access can not be granted Economy of Mechanism •Keep security processes and tools simple and elegant Security processes and tools should be: •A system should only run the services that it needs to provide and no more Complete Mediation • Check all access requests for permission Open Design Protection of an object should not rely on the secrecy of the protection mechanism • Example - public key crypto export control debate Crypto is security based on the crypto algorithm or the keys used Security through obscurity • Security is effective if the environment and protection mechanisms are An approach to security using the mechanism of hiding information to protect it. Least common mechanism Mechanisms used to access resources should be Example Psychological Acceptability • Refers to users' acceptance of security measures Defense in Depth • Implements different access controls, utilizing various tools and devices within a security system on multiple levels Example Diversity of Defense • Complements the layered security approach Example Encapsulation lower layer protocol is encapsulated in the higher layer protocol Isolation separating items so that they cannot interfere Trust relationships identification
of what level of access Sets with similar termsSecurity+ SY0-301 Chapter 133 terms mbxray Access Controls99 terms jqeverage Windows Security Chapter 1-350 terms clusterwhoops Windows Security51 terms cwc39452 Sets found in the same folderCh 1 CIS 233715 terms motiv8tion45 Principles of Computer security chapter 1-6, 9-10,…216 terms Tyl3r09 3408 Comp Security Exam 185 terms ashton_arnold7 Ch. 1 - Info Sec.19 terms spencer_hendee Other sets by this creatorWeb Components5 terms conwabueze Attacks31 terms conwabueze Authentication and Attacks8 terms conwabueze Infrastructure Security17 terms conwabueze Verified questions
SOCIOLOGY In hunting and gathering societies, resources are distributed equally. If one person eats, everyone eats. Is that the case in industrial and postindustrial societies? Should Americans be concerned whether everyone eats every day? Why might they not be concerned? Verified answer
SOCIOLOGY Why does the office of the president includes press and communications staff? a.the president uses mass media to speak to congress. b.the president uses mass media to gain support for policies. c.the president uses mass media to issue executive orders. d.the president uses mass media to speak to other countries. Verified answer
SOCIOLOGY Explain why blood relationships are less important in an industrial society than in a preindustrial society. Verified answer
SOCIOLOGY Using the Internet or your school or local library, find a murder case from the year 1900. Find a similar type of murder case from the year 2005. Consider how each murder, was reported and punished (i.e., the type of approach to crime control that was used). Design a database to illustrate similarities and differences between the two deviant acts. What can you conclude about society's view of deviance at the time tile crime was committed? Verified answer Other Quizlet setsPrinciples of inf security final 130 terms emmanuel_rosado chapter 260 terms aileen_morales5 Accounting Systems Ch. 924 terms Christine_South Acc 327 Chapter 839 terms Grace_Freitag Related questionsQUESTION How is TCP able to reliably deliver messages over an unreliable IP network? 9 answers QUESTION 60) Smart cards are convenient to use because they do not require a personal identification number for authentication. TRUE or FALSE 3 answers QUESTION Comparative Politics, International Relations, Public Administration, Political Philosophy, Political Economy, Public Law 4 answers QUESTION A backup of only the files on your computing devices that have been created (or changed) since the last backup is known as an 12 answers What is prevention detection and response?It's been classic truism for many years that good security is about the combination of protection, detection and response. So you try and stop bad things from happening to you – prevention – you try and detect them when they are actually on their way, and then of course you have to respond when you detect them.
Which security principle refers to the concept that each and every request should be verified?Attack surface. Which security principle refers to the concept that each and every request should be verified? Complete mediation. In the Biba model, instead of security classifications, integrity levels are used. True.
What is prevention in security?Prevention generally comes before protection and is meant to avert the threat before it occurs. An example of prevention for business security includes a set of rules or reminders about best safety practices for cyber security. Protection is the next step and usually takes over if prevention fails.
Which security principle states that access should be based on more than one item of information?5. Separation of Privilege. This security principle states that whenever a user tries to gain access to a system, the access should not be granted based on a single attribute or condition. Instead, there must be multiple situations or conditions or attribute which should be verified to grant access to the system.
|