6.1 Flashcards

1
Q

What is security? (when we say an organization/person is secure)

A
  1. It can do what it wants, when it wants
  2. It can keep a secret
  3. It can prevent an adversary from doing the same
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is security? (when we say a system is secure)

A

We say a system (say, a network) is secure if an organization can use it without reducing its own security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Nothing is secure by default.

A

You need to take measures to make it secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Name 4 security layers.

A

Physical
Communications
Technical
Human

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The security layers are…

A

cumulative. And overlap.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the goal of the physical layer? How can you reach that goal?

A

The goal is to keep physical things from theft or damage
There are many ways to do this:
Physical barriers
Surveillance
Violence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Physical security is the most effective, but is also

A

stupid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why you need the communication layer?

A

Because you want to communicate with another place:
* Without an adversary knowing what is said
* And perhaps without the adversary knowing that communication even happened

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You can try to communicate

A

Secretly: Whispering, steganography - the adversary does not know you are communicating
By misdirection: Slang – the adversary knows you are communicating but not about what
By transformation: Ship semaphores, encryption – the enemy knows what you are talking about, but not what you are saying

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Communications can also cover

A

the movement of materials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Communications can cover movement of materials, but nowadays modern communication technology changed. This led to…

A

inventions such as cryptography, steganography, frequency hopping, denial of service attacks and more

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Technical security refers to…

A

any security measure that requires a computer to implement it, or which is targeted at a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Technical security includes…

A

Cryptography (it overlaps with the communications layer)
Privilege escalation attacks and other attacks on the operating system
Intrusion detection and prevention
Honey pots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The human layer refers to…

A

security issues that result from the fact that any organization is made up of people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The weakest part of any security system is…

A

the people involved.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How do we mitigate the problem with people?

A

Make sure everyone involved knows only what they need to know in order to do their job (compartmentalization)

Surveillance:
- Watch people’s social media, financial transactions, travel plans and so on
- Look for suspicious patterns

Minimize a person’s attack surface
- A personal attack surface is the sum total of ways that an adversary can gain leverage over a person
- Leverage can be used to make a person do something they perhaps ordinarily would not

17
Q

Make sure all the systems contributing to security support the three A’s

A

Authentication
Authorization
Accounting

18
Q

AAA works for

A

all scales of system and across all layers

19
Q
A