Information Security –Questions With Correct Answers
Threat ✔️Ans - A threat to a system is any potential occurrence, malicious or
otherwise, that can have an adverse effect on the assets and resources
associated with the system.
Vulnerability ✔️Ans - A vulnerability of a system is some characteristic that
makes it possible for a threat to occur.
Attack ✔️Ans - An attack on a system is some action that involves
exploitation of some vulnerability in order to cause an existing threat to occur.
Threats can be classified into four broad categories. ✔️Ans - Disclosure -
unauthorized access to information
Deception - acceptance of false data
Disruption - interruption or prevention of correct operation
Usurpation - unauthorized control of some part of a system
Examples of threat types are? ✔️Ans - Snooping, sniffing, spoofing, delay,
denial of service, theft of computational resources.
Confidentiality ✔️Ans - Prevention of unauthorized disclosure of
information
Integrity ✔️Ans - Prevention of unauthorized modification of information
Availability ✔️Ans - Ability to withstand unauthorized withholding of
information or resources.
Security Policy ✔️Ans - A security policy is a statement of what is, and is not,
allowed. It can be informal or highly mathematical. A security policy considers
confidentiality, integrity, and availability.
Security Mechanism ✔️Ans - A security mechanism is a procedure, tool, or
method of enforcing security policy.
Confidentiality Policy ✔️Ans - Identifies information leakage and controls
information flow.
, Integrity Policy ✔️Ans - Identifies authorized ways in which information
may be altered. Enforces separation of duties.
Availability Policy ✔️Ans - Describes what services must (and must not) be
provided.
Goals of Security Mechanism ✔️Ans - Given a policy that specifies what is
"secure" and what is "non-secure" goal of security is to put in place
mechanisms that provide:
- Prevention
- Detection
- Recovery
Examples of Security Mechanisms? ✔️Ans - Cryptography and cryptographic
protocols.
Software controls.
Hardware controls.
Physical controls.
Trust ✔️Ans - Security policies and mechanisms are based on assumptions
and one trusts that these assumptions hold.
Mitigation ✔️Ans - The theory that if you can limit the resources that an
attacker has access to, then you can prevent most attacks.
Fundamental Design Principles ✔️Ans - General Design Principles:
1. Principle of open design
2. Principle of sweeping simplifications
3. Principle of design for iteration
4. Principle of least astonishment
Principle of Open Design ✔️Ans - Get others to comment on your design.
Talk through your design with outsiders.
Principle of Sweeping Simplifications ✔️Ans - KISS (keep it simple stupid).
Makes design and interactions easy. Easy to prove its safety. Complexity !=
security.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Studycafe. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $10.49. You're not tied to anything after your purchase.