4.2 - Interpret, describe and explain the security measures that should appear within a Security Case Flashcards

1
Q

Give an example of a Physical Deterrent control?

A

Fences and Lighting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Give an example of a Physical Preventative control?

A

Locks, Badge System, Security Guard,Biometric systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Should implementations details be included in a security claim?

A

No, In general, claims should be straightforward statements that do not consider implementation details. Things like source code and database contents would be too much information for a security case

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How is a top level-claim supported?

A

By objective evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is an example of a security claim?

A

System X is acceptably secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does a security case consider?

A

A security case considers people and processes as well as technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How is a security case developed?

A

A case is developed by showing how the top-level claim is supported by subclaims.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What could a absence of buffer overflow vulnerabilities subclaim be supported in a security case?

A

It could be supported by showing that (1) programmers were trained on how to write code that minimizes the possibility of buffer overflow vulnerabilities; (2) experienced programmers reviewed the code to see if any buffer overflow possibilities existed and found none; (3) a static analysis tool scanned the code and found no problems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why is evidence important in a security case?

A

Evidence is important as this is how the security case is judged on its soundness of argument.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How is a security case judged?

A

The stakeholders and/or their representatives review the security case and decide whether the security case is credible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When should evidence for a security case be collected?

A

During the planning/Design Phrase of the Software development life cycle process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does as security case contain?

A

It consists of a structured collection of security-related claims, arguments, and evidence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does as security case contain?

A

It consists of a structured collection of security-related claims, arguments, and evidence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is included in system testing?

A

Test plan, descriptors, test selection analysis and test results

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When should the security case be developed?

A

Alongside product development

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a security claim in a security case?

A

A claim embodies what is to be shown; an argument tells why to believe a claim has been met, based upon subclaims and evidence such as results of tests, simulations, analysis, etc

17
Q

What is a strategy in a security case?

A

the strategy is an additional cue that helps the reader understand the form that an argument is going to take. Instead of being true or false statements, as the claims and subclaims are, the strategy provides information on how to substantiate the stated claim

18
Q

What could an example claim be?

A

Coding defects

19
Q

Name the three Implementation Strategies issues

A

Constraints, Dependencies and Cost benefit analysis

20
Q

Which IT security policy is needed for a security case?

A
ACCEPTABLE USE POLICY
ANTI-VIRUS POLICY
IDENTITY POLICY
PASSWORD POLICY
ENCRYPTION POLICY
REMOTE ACCESS POLICY
VIRTUAL PRIVATE NETWORK (VPN) POLICY
EXTRANET POLICY
DATA PROTECTION/BACKUPS Policy