問題一覧
1
are goals and constraints that affect the confidentiality,Integroty and availability
security objectives
2
Also known as data confidentiality, this property means that information is not made available or disclosed to unauthorized individuals, entities, or processes. A loss of confidentiality is the unauthorized disclosure of information
confidentiality
3
This term covers two (2) related concepts:
integritu
4
ensures that data (both stored and is transmitted packets) and programs are changed only in a specified and authorized manner. A loss of data integrity is the unauthorized modification or destruction of information.
data integrity
5
ensures that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system.
system integrity
6
ensures that systems work promptly and the service is not denied to authorized users. A loss of availability is the disruption
availability
7
The property of being genuine and being able to be verified and trusted; confidence in the validity of a transmission, a message, or a message originator. This means verifying that users are who they say they are and that each input arriving at the system came from a trusted source
authenticity
8
The security goal that generates the requirement for actions of an entity to be traced uniquely to that entity. This supports nonrepudiation, deterrence, fault isolation, intrusion detection and prevention, and after-action recovery and legal action. Because truly secure systems are not yet an achievable goal, it must be possible to trace a security breach to a responsible party. Systems must keep records of their activities to permit later forensic analysis to trace security breaches or to aid in transaction disputes.
accountability
9
defines a general security architecture that is useful to managers as a way of organizing the task of providing security • This standardized architecture defines security requirements.
osi archi
10
-are any action that compromises the security of information owned by an organization. - attempt to gain unauthorized access to information resources or services, or cause harm or damage to information systems.
security attacks
11
-are technical tools and techniques that are used to implement security services - A process that is designed to detect, prevent, or recover from a security attack.
security mechanisms
12
is a processing or communication service that enhances the security of the data processing systems, and the information transfers of an organization.
security service
13
are like eavesdropping or monitoring transmissions. The goal of the attacker is to obtain information that is being transmitted.
passive attacks
14
this type, an attacker will monitor an unprotected communication medium like ,unencrypted email or telephone call and intercept it for sensitive information.
release of message contents
15
In this type, an attacker monitors communication channels to collect a range of information, including human and machine identities, locations of these identities, and types of encryption used, if applicable.
traffic analysis
16
involve some modification of stored or transmitted data or the creation of false data. There are four categories of active attacks: replay, masquerade, modification of messages, and denial of service.
active attacks
17
takes place when one entity pretends to be a different entity. A masquerade attack usually includes one of the other forms of active attack.
masquerade
18
involves the passive capture of a data unit and its subsequent retransmission to produce an unauthorized effect.
replay
19
simply means that some portion of a legitimate message is altered or that messages are delayed or reordered to produce an unauthorized effec
data modification
20
prevents or inhibits the normal use or management of communication facilities. Such an attack may have a specific target; for example, an entity may suppress all messages directed to a particular destination (e.g., the security audit service).
denial of service attack
21
security service service is concerned with ensuring that communication is authentic.
authentication
22
SECURITY SERVICE is the ability to limit and control access to host systems and applications via communications links. To achieve this, each entity trying to gain access must first be identified or authenticated so that access rights can be tailored to the individual.
access control
23
security service is the protection of transmitted data from passive attacks. Concerning the content of data transmission, several levels of protection can be identified. The broadest service protects all user data transmitted between two users over a period.
data confidentiality
24
security service ensures that messages are received as sent, with no duplication, insertion, modification, reordering, or replays
data integrity
25
security serveice prevents either a sender or a receiver from denying a transmitted message.
non repudiation
26
security services means that a system or a system resource is accessible and usable upon demand by an authorized system entity, according to performance specifications for the system; that is, a system is available if it provides services according to the system design whenever users request them.
availability service
27
refers to privacy concerns related to user interaction with Internet services through web servers and mobile apps.
online privacy
28
collect information directly from their customers, audience, or other types of users of their services.
data collectors
29
compile large amounts of personal data from several data collectors and other data brokers without having direct online contact with the individuals whose information is in the collected data.
data brokers
30
category encompasses a broad range. One type of data user is a business that wants to target its advertisements and special offers. Other uses are fraud prevention and credit risk assessmen
data users
31
are concerned with the vulnerabilities and threats associated with the platform that hosts a website, including the operating system (OS), file and database systems, and network traffic.
web server security amd privacy
32
are concerned with web software, including any applications accessible via the Web.
web application security and privacy
33
are concerned with the browser used from a client system to access a web server.
web browser security and privacy
34
The execution of mobile applications on a mobile device may involve communication across several networks and interaction with some systems owned and operated by a variety of parties.
mobile ecosystem
35
Modern mobile devices are typically equipped with the capability to use cellular and Wi-Fi networks to access the Internet and to place telephone calls.
calls and wifi infastructure
36
Public app stores include native app stores; these are digital distribution services operated and developed by mobile OS vendors. For Android, the official app store is Google Play, and for iOS, it is simply called the App Store.
public application stores
37
Mobile device and OS vendors host servers to provide updates and patches to the OS and apps. Other cloud-based services may be offered, such as storing user data and wiping a missing device
device and os infastructure
38
Enterprise mobility management (EMM) is a general term that refers to everything involved in managing mobile devices and related components (e.g., wireless networks).
enterprise mobility systems
39
is a member of the organization who is responsible for deploying, maintaining, and securing the organization’s mobile devices as well as ensuring that deployed devices and their installed apps conform to the organization’s security requirements.
administrator
40
in the organization that employs automated and/or human analyzers to evaluate the security characteristics of an app, including searching for malware, identifying vulnerabilities, and assessing risks.
app testing facility
41
is to inspect reports and risk assessments from one or more analyzers to ensure that an app meets the security requirements of the organization.
aufitor
42
The goal of the project is to identify the most important technical and organizational privacy risks for web applications from the perspectives of both the user (data subject) and the provider (data owner).
open web application security project
43
Failing to suitable design and implement an application, detect a problem, or promptly apply a fix (patch), which is likely to result in a privacy breach
web application vulnerabilities
44
Failing to prevent the leakage of any information containing or related to user data, or the data itself, to any unauthorized party resulting in loss of data confidentiality
User side data leakage
45
Not informing the affected persons (data subjects) about a possible breach or data leak, resulting in either from intentional or unintentional events; failure to remedy the situation by fixing the cause; not attempting to limit the leaks.
insufficient data breach response
46
Failing to delete personal data effectively and/or in a timely fashion after the termination of the specified purpose or upon request.
insufficient deletion of personal data
47
Not providing sufficient information describing how data are processed, such as their collection, storage, and processing.
non transparent policies terms and condition
48
Collecting descriptive, demographic, or any other user-related data that are not needed for the system. Applies also to data for which the user did not provide consent.
collection of data not reuired for primary purpose
49
Providing user data to a third party without obtaining the user’s consent. Sharing results either due to transfer or exchanging for monetary compensation or otherwise due to inappropriate use of third-party resources included in websites, such as widgets (e.g., maps, social networking buttons), analytics, or web bugs.
sharing data for the third party
50
Using outdated, incorrect, or bogus user data and failing to update or correct the data.
outdated personal data
51
Failing to effectively enforce session termination. May result in the collection of additional user data without the user’s consent or awareness.
missing insufficient session expiration
52
Failing to provide data transfers over encrypted and secured channels, excluding the possibility of data leakage. Failing to enforce mechanisms that limit the leaking surface (e.g., allowing to infer any user data out of the mechanics of web application operation).
Insecure data transfer
53
Legitimate mobile apps may be vulnerable to several privacy and security threats, typically due to poor coding practices used in app development or underlying vulnerabilities in the mobile device operating system.
mobile app privacy
54
Network traffic needs to be securely encrypted to prevent an adversary from eavesdropping. Apps need to properly authenticate the remote server when connecting to prevent man-in- the-middle attacks and connection to malicious servers
Insecure network communicatin
55
Adversaries can exploit vulnerabilities in mobile device web browser applications as an entry point to gain access to a mobile device.
web browser vulnerability
56
Third-party software libraries are reusable components that may be distributed freely or offered for a fee to other software vendors. Software development by component or modules may be more efficient, and third-party libraries are routinely used across the industry.
vulnerabilities in third party libraries