The flashcards below were created by user
djon
on FreezingBlue Flashcards.
-
3 definitions of security
- confidentiality
- integrity
- availability
-
confientiality
information about system or its users cannot be learned by an attacker
-
Integrity
- when you ask for data, you get the "right " data
- system reaching states that would occur if there was no attacker
-
Availability
actions by an attacker do not prevent users from having access to use of the system
-
security is about
- honest user
- dishonest attacker
- how the attacks disrupts and learns info
-
Network attacker
intercepts and controls network communication
-
Web hacker
- Hacks websites
- sets up malicious sites
- no control of network
-
OS Attacker
controls malicious files and applications
-
reliability
the ability of a system to consistently perform its intended function on demand without failure
-
Accountability
is the property that ensures that the actions of an entity can be traced
-
Non-repudiation
- the ability to prove that an event has taken place
- a system must be able to prove that certain messages were sent and recieved
-
Autentication
the process of determining whether someone or something is who or what it is declared to be
-
privacy
- informational self-determination
- you get to control information about you
-
PIPEDA
- Personal Information Protection and Electronic Documents Act
- Canada's private-sector privacy legislation
-
Assets
- things we want to protect
- hardware
- software
- data
-
-
Threats
a potential cause of an incident, that may result in harm of systems
-
2 types of threats
- intentional - individual cracker
- accidental - application bug
-
4 categories of threats
- Interception
- Interruption
- Modification
- Fabrication
-
Technology weaknesses
standards or lack of standards, application exploits
-
configuration weaknesses
- unsecured accounts
- no anti-virus
-
policy weaknesses
- lack of a written security policy
- software and hardware changes do not follow policy
-
-
Threat model
- a view of the application and its environment through security glasses
- "whom do we want to stop from doing what?"
-
Exploit
tool that an attacker uses vulnerability to cause damage to the target system.
-
Risk
where the threat and vulnerability overlap
-
attack
an action which exploits a vulnerability
-
black hat, white hat, grey hat
- black - bad intentions without invitation
- white - good intentions with invitation
- grey - good intention without invitation
-
Control
removing a vulnerability
-
PDDDR
- Prevent it
- Deter it
- Deflect it
- Detect it
- Recover from it
-
DHTML
- Dynamic HTML
- DOM
- Scripting
- Presentation
- Markup
-
XSL
- Extensible Stylesheet Language
- styles XML
- XSLT
- XPath
- XSL-FO
-
-
-
GET Method
- retrieves resources
- can be used to send parameter in the URL query string
-
POST Method
- perform actions
- parameters can be sent in the query string of the URL or message body
-
HEAD Method
- used to check whether a resource is present before making a GET request
- shouldn't contain anything in the message body
-
MIME
- Multi-purpose Internet Mail Extension
- a set of rules that allow multimedia documents to be exchanged among different computer systems.
|
|