Chapter 1 Flashcards

(11 cards)

1
Q

What is Security

A

Regulating asset access to minimize risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Software Security

A

managing software functionality risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Security Should Assess…

A
  • Stakeholders
  • Assets
  • Threats
  • Attackers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Security Policy?

A

Specification of what coutermeasures intend to achieve

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How are Security Policies Enforced?

A

Via security mechanisms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define CIA

A
  • Confidentiality: prevent unauthorized disclosure
  • Integrity: prevent unauthorized altering
  • Availability: always available
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Non-repudiation?

A

Authorized users cannot deny actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define AAAA

A
  • Authentication
  • Authorization (Prevention)
  • Auditing (Detection)
  • Action (Reaction)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are Sources of Software Vulnerabilities?

A
  • Application/infrastructure bugs
  • Inappropriate infrastructure features
  • Inappropriate use of infrastructure features
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the Main Causes of Software Vulnerabilities?

A
  • Feature Complexity
  • Developer Ignorance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the Threat Modelling Steps

A
  • Identify assets and stakeholders
  • Consider app architecture and environment
  • Brainstorm known threats
  • Define security assumptions
  • Rank threats
  • Decide threat priorities
  • Decide how to mitigate threats
How well did you know this?
1
Not at all
2
3
4
5
Perfectly