Book - Chapter 2 Flashcards
Why was SSL developed?
It was developed by netscape to deal with the lack of security around card transactions over the internet
What is identity theft?
Using somebody elses identity to gain access to a resource or service, exploits a weakness inherent in services that non-secret information to authentication requests.
What is a security policy?
a statement aht defines the security objectives of an organisation; it has to state what needs to be protected; it may also indicate how this is to be done.
What do the terms security policy objective, organisational security policy and automated security policy mean?
A policy has given objectives:
- Security policy objective: A statement of intent to protect an identified resource from unauthorized use.
A policy also has to explain how the objectives are to be met. This can be done first at the level of the organization.
- Organizational security policy: The set of laws, rules, and practices that regulate how an organization manages, protects, and distributes resources to achieve specified security policy objectives.
Within an IT system, organizational policies can be supported by technical means.
- Automated security policy: The set of restrictions and properties that specify how a computing system prevents information and computing resources from being used to violate an organizational security policy.
Automated policies define access control lists and firewall settings, stipulate the services that may be run on user devices, and prescribe the security protocols for protecting network traffic
In SANS terminology, what is a security metric?
In security engineering we would love to measure security. To convince managers (or customers) of the benefits of a new security mechanism, wouldn’t it be nice if you could measure the security of the system before and after introducing the mechanism? Indeed, it is difficult to reach well-founded management decisions if such information cannot be procured. The terms security measurement and security metric are used in this context, but there is no common agreement on their exact meaning. There are, however, two clearly defined phases.
First, values for various security-relevant factors are obtained. In SANS terminology obtaining a value for such a factor is a security measurement. Some values can be established objectively, e.g. the number of open network ports, whether the latest patch has been installed for a software product, or the privilege level under which a service program is running. Other values are subjective, e.g. the reputation of a company or the security awareness of its employees.
Secondly, a set of measurements may be consolidated into a single value that is used for comparing the current security state against a baseline or a past state. In SANS terminology, the values used by management for making security comparisons are called security metrics. Other sources do not make this distinction in their terminology [64]. Sometimes, the result of a measurement can directly be used as a metric, e.g. the number of software vulnerabilities flagged by an analysis tool.
What is a product?
A product is a package of IT software, firmware and/or hardware, providing functionality designed for use or incorporation within a multiplicity of systems.
What is a system?
A system is a specific IT installation, with a particular purpose and operational environment
How could you measure the cost of mounting an attack?
You could consider
- the time an attacker has to invest in the attack, e.g. analyzing software products,
- the expenses the attacker has to incur, e.g. computing cycles or special equipment,
- the knowledge necessary to conduct the attack.
What are hazard risks?
Hazard risks relate to damaging events
What are oppotunity risks?
opportunity risks to events that might have also have a positive outcome, e.g. to a financial investment on the stock exchange
What is risk?
Informally, risk is the possibility that some incident or attack can cause damage to your enterprise. An attack against an IT system consists of a sequence of actions, exploiting vulnerabilities in the system, until the attacker’s goals have been achieved. To assess the attack exposure environment source exploitability vulnerability enabler impact asset (value) target. Factors in Risk Analysis risk posed by the attack you have to evaluate the impact of the attack and the likelihood of the attack occurring. This likelihood will depend on the exposure of your system to potential attackers and how easily the attack can be mounted (exploitability of vulnerabilities). In turn, this will further depend on the security configuration of the system under attack.
What do systems consist of?
Systems consist of resources and of agents operating on those resources. In a computer, processes are the agents. In an organization, an agent can be a person given a task to perform. This person may have been authorized to use resources necessary for executing the task
What is the first step in a risk analysis?
As a first step assets have to be identified and valued.
How can you value assets?
Identification of assets should be a relatively straightforward systematic exercise. Measurement of asset values is more of a challenge. Some assets, such as hardware, can be valued according to their monetary replacement costs. For other assets, such as data and information, this is more difficult. If your business plans are leaked to the competition or private information about your customers is leaked to the public you have to account for indirect losses due to lost business opportunities. The competition may underbid you and your customers may desert you. Even when equipment is lost or stolen you have to consider the value of the data stored on it, and the value of the services that were running on it. In such situations assets can be valued according to their importance. As a good metric for importance, ask yourself how long your business could survive when a given asset has been damaged: a day, a week, a month?
What is a threat?
A threat is an undesirable negative impact on your assets