CHAPTER 1 PPT Flashcards

(18 cards)

1
Q

What is the hunter’s dilemma?

A

You don’t have to outrun the bear; just another hunter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe the three security properties of information

A
  1. Confidentiality - Keeping information secret; avoiding disclosure vulnerabilities
  2. Integrity - Protecting information from improper changes; Avoiding forgery, subversion, and masquerade attacks
  3. Availability - Keeping systems available and in operation; Avoiding denial of service attacks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Four-point scale that indicates the potential impact for each property:

A
  1. Not applicable
  2. Low impact
  3. Moderate impact
  4. High impact
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Amawig’s website provides publicity to company products and describes the company in general. Everything it provides is public information. The website is not the only one that provides access to Amawig products. In fact, a potential customer needs to go to a distributor or retailer to buy products in any case. To assess the 3 security properties

A
  1. Confidentiality: Not applicable, since all information is public.
  2. Integrity: Low, since a site outage will not prevent customer sales.
  3. Availability: Also low, since a site outage doesn’t prevent customer sales
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Not all websites pose such a small risk. Let us reconsider the risks after Amawig expands its business. As part of a new product introduction, Amawig has decided to offer the product directly to customers via a new website and not sell it through distributors. The new sales site represents the only way to purchase that product. Aftersix months, the new product represents a small, but significant, source of revenue. We need to reassess the three security properties

A
  1. Confidentiality: Moderate, since the website handles some electronic payment information from customers.
  2. Integrity: Moderate, since the website handles some electronic payment information from customers, it specifies product prices, and it directs product shipments.
  3. Availability: Moderate, since an interruption would visibly affect sales, but would not cause long-term damage to the company
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Risk assessment three major parts:

A
  1. Identify risks: assets, threat agents, attacks
  2. Prioritize risks: estimate relative impacts
  3. Establish requirements: identify security goals to address the highest-priority risks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Risk assessment detailed steps

A
  1. Identifying risks
    Step 1: Identify assets
    Step 2: Identify threat agents and attacks
  2. Prioritizing risks
    Step 3: Estimate the likelihood of attacks
    Step 4: Estimate the impact of attacks
    Step 5: Calculate their relative significance
  3. Establish requirements
    Step 6: Write requirements to address the highest-priority risks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is continuous improvement?

A
  • a basic principle
  • we identify our basic goals
  • we measure our success
  • we adjust our work to better achieve our goals
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the four things to assess when looking at boundaries?

A
  1. Can a threat agent breach a wall?
  2. How do we control doorways?
  3. How can a threat agent pass through a doorway?
  4. How much do we trust those inside the boundary?
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Explain the concept of Least Privilege

A
  • Restrict what people may do to an asset
  • Provide the minimum privileges required
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Explain Defense in Depth

A

We improve security by providing layers of defense;

Attackers must breach a series of defenses to reach our most valuable assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Profiling a Threat Agent

A
  • Goals
  • Typical mode of operation
  • level of motivation
  • capabilities and logistical constraints
  • references: reputable sources for the information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Typical goals of threat agents

A
  • news coverage
  • financial gain
  • ideological victory
  • regime change
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

typical mode of operation

A
  • how targets are selected
  • how operations are organized
  • preference for broadly targeted attacks, or specific targets
  • individual versus multiple coordinated attacks
  • remote attacks, on-site attacks, insider attacks, social engineering
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

level of motivation of threat agents

A
  1. Unmotivated
  2. Scant motivation - will exploit minor vulnerabilities
  3. Stealth motivation - applies effort, but avoids social stigma
  4. Low motivation - causes harm and limited damage to assets
  5. Moderate motivation - cause significant damage to assets or some injury to persons, but to critical injury
  6. High motivation - will cause significant disruptions and/or critical injuries to people to achieve objectives
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

types of attacks

A
  1. physical theft
  2. denial of service
  3. subversion
  4. masquerade
  5. disclosure
  6. forgery
17
Q

Writing a requirement

A
  1. Number each requirement
  2. Use the word shall
  3. Each requirement should be testable
  4. Each statement identifies the risks it addresses
  5. Phrase the requirement in a positive and specific form
18
Q

Describe the six general types of attacks on information. Which are passive attacks and which are active?

A
  • Physical theft — is active and involves the asset being physically taken
  • Denial of service — is active and temporarily or permanently cuts computing services
  • Subversion — is active and involves a program that gives the threat agent control of system
  • Masquerade — is passive and involves the threat agent pretending to be a user of the system
  • Disclosure — is passive and involves disclosure of secret information
  • Forgery — is passive and involves a false message being sent to a computer