• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/19

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

19 Cards in this Set

  • Front
  • Back

The principle in security whose goal it is to ensure that data is modified only by individuals who are authorized to change it

Integrity

The security principle used in the Bell-LaPadula security model that states that no subject can read from an object with a higher security classification

Simple Security Rule

The term used to refer to the hacking of computers and systems used by the telephone company.

Phreaking

An integrity-based security model that bases its security on control of the processes that are allowed to modify critical data, referred to as constrained data items

Clark-Wilson security model

The condition where a user cannot deny that an event has occurred

Nonrepudiation

The process used to ensure that an individual is who they claim to be

Authentication

The approach of making different layers of security dissimilar so that an intruder who is able to breach one layer will be faced with an entirely different set of defenses at the next layer.

Diversity of defense

The process of combining seemingly unimportant information with other pieces of information to divulge potentially sensitive information

Data aggregation

Using ________ is a method to establish authenticity of specific objects such as an individual's public key or downloaded software.

Certificates

The principle that states a subject has only the necessary rights and privileges to perform its task, with no additional permissions

Least privilege

The concept of blocking an action unless it is specifically authorized is:

Implicit deny

Which of the following concepts requires users and system processes to use the minimal amount of permission necessary to function?

Least privilege

The CIA of security includes:

Confidentiality, integrity, availability

The term used to describe the requirement that different portions of a critical process must be performed by different people is:

Separation of duties

The problem with the Low-Water-Mark policy is that it:

Could ultimately result in all subjects having the integrity level of the least-trusted object on the system

Hiding information to prevent disclosure is an example of:

Security through obscurity

What is the most common form of authentication used?

Username/password

The security principle used in the Bell-LaPadula security model that states that no subject can read from an object with a higher security classification is the:

Simple Security Rule

The Bell-LaPadula security model is an example of a security model that is based on:

The confidentiality of the data