01 Introduction Flashcards
What is a threat?
A threat is any possible event or sequence of actions that might lead to a violation of one or more security goals.
What is an attack?
An attack is the actual realisation of a threat.
Which are examples of an attack?
- A hacker breaking into a computer
- Disclosure of private emails
- An unauthorized change in financial data
- A hacker shutting down a website
- Impersonation of people to order services or goods
How can security goals be defined (in which ways)?
- Depending on the application environment
- On a more general, technical way (CIA + AC)
- Confidentiality
- (Data) Integrity
- Availability
- Accountability
- Controlled Access
Name some examples of Security Goals based on the application environment.
- Banking (fraud detection, transactions identification, PIN protection, customer’s privacy)
- Government (protect sensitive information, electronic signature of documents)
- Public Telecom Providers (restrict access, prevent service interruptions, customer’s privacy)
- All networks (prevent outside penetrations).
How “Security goals” are also called? (synonym)
Security objectives.
Name some examples of Security Goals technically defined:
CIA
- Confidentiality (intended audience only, confidentiality of entities = anonymity)
- (Data) Integrity (data modification can be detected, data creators identifiable).
- Availability (services available and function correctly).
Which are additional Security Goals:
AC
- Accountability (identify the entity responsible for a communication event)
- Controlled Access (authorized entities have access to services/information).
Mention some threats Technically Defined:
MEALDFS
- Masquerade (entity claiming being another)
- Eavesdropping (entity reading unauthorized information)
- Authorization Violation (usage of service/resources not intended to be used)
- Loss / Modification of (transmitted) Information (data altered or destroyed)
- Denial of Communication Acts (repudiation, entity falsely denying participation)
- Forgery of Information (entity creating information in the name of another)
- Sabotage (actions reducing availability/correct function of services/systems).
Explain the cross-table of Threats and Technical Security Goals:
What does a Network Security Analysis perform?
- Evaluates the risk potential of the general threats to user entities.
- Estimates the expenditure (resources, time, etc.) to perform known attacks.
Can unknown attacks be assessed?
No, it is generally impossible.
What are other uses of a Network Security Analysis?
- Receive funding for security enhancements.
- Network can be better structured according to attacks on the message level.
Name the two attacking communication types on the Message Level:
- Passive attacks.
- Active attacks.
An example of a passive attack:
Eavesdropping (entity reading unauthorized information).