What is the hunter’s dilemma?
You don’t have to outrun the bear; just another hunter
Describe the three security properties of information
Four-point scale that indicates the potential impact for each property:
Amawig’s website provides publicity to company products and describes the company in general. Everything it provides is public information. The website is not the only one that provides access to Amawig products. In fact, a potential customer needs to go to a distributor or retailer to buy products in any case. To assess the 3 security properties
Not all websites pose such a small risk. Let us reconsider the risks after Amawig expands its business. As part of a new product introduction, Amawig has decided to offer the product directly to customers via a new website and not sell it through distributors. The new sales site represents the only way to purchase that product. Aftersix months, the new product represents a small, but significant, source of revenue. We need to reassess the three security properties
Risk assessment three major parts:
Risk assessment detailed steps
What is continuous improvement?
What are the four things to assess when looking at boundaries?
Explain the concept of Least Privilege
Explain Defense in Depth
We improve security by providing layers of defense;
Attackers must breach a series of defenses to reach our most valuable assets
Profiling a Threat Agent
Typical goals of threat agents
typical mode of operation
level of motivation of threat agents
types of attacks
Writing a requirement
Describe the six general types of attacks on information. Which are passive attacks and which are active?