A malware that constantly scans the Internet, searching for vulnerable computers.
Worm
Other word for cybercrime network
botnet
Security decision-making falls into three categories:
These are made for us by external circumstances or established, widely accepted guidelines (example:car ignition locks).
Rule-based decisions
These try to outdo others who are faced with similar security problems (example: hunter’s dilemma)
Relativistic decisions
These are based on a systematic analysis of the security situation (example: the risk management framework)
Requirements-based decisions
Both rule-based and relativistic decisions often arise from _______, which identify various security controls one might use
security checklists
A way to assess cybersecurity risks when developing large-scale computer systems
Risk Management Framework
6 steps in Risk Management Framework:
Proprietor’s Risk Management Framework (PRMF) steps:
System engineering process:
A process based on the Continuous Improvement principle never end at the final step. Instead, any step in the process may suggest a change that will improve the result. To implement the change, we return to earlier steps in the cycle. Once we make the change, we continue the process.
Continuous Improvement
The RMF begins with a high-level estimate of the impact caused by cybersecurity failures. This is called the ___________.
security category
Three general security properties:
Four-point scale that indicates the potential impact for each property:
We express the SC in terms of a particular type of information or system, indicated below by name:
SC name = {(confidentiality, impact), (integrity, impact), (availability, impact)}
Amawig’s website provides publicity to company products and describes the company in general. Everything it provides is public information. The website is not the only one that provides access to Amawig products. In fact, a potential customer needs to go to a distributor or retailer to buy products in any case. To assess the 3 security properties
Not all websites pose such a small risk. Let us reconsider the risks after Amawig expands its business. As part of a new product introduction, Amawig has decided to offer the product directly to customers via a new website and not sell it through distributors. The new sales site represents the only way to purchase that product. Aftersix months, the new product represents a small, but significant, source of revenue. We need to reassess the three security properties
list of security requirements called
security policy
Risk assessment detailed steps
someone who is motivated to attack our assets
threat agent
an attempt by a threat agent to exploit the assets without permission
attack
We call a threat agent an ____when action replaces inclination and the attack actually takes place.
attacker
a weakness in the boundary that protects the assets from the threat agents
vulnerability