Ch1 Flashcards

1
Q

Define Confidentiality

A

principle that objects are not disclosed to unauthorized subjects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Attacks on Confidentiality

A
  • capture network traffic
  • steal pwd files
  • social engineering
  • port scanning
  • shoulder surfing
  • eavesdropping
  • sniffing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Countermeasures for Confidentiality

A
  • encryption
  • network traffic padding
  • strict access control
  • rigorous authentication
  • data classification
  • personnel training
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define Integrity

A

principle that objects retain their veracity and are intentionally modified by only authorized subjects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Attacks on Integrity

A
  • virus
  • logic bombs
  • unauthorized access
  • coding errors
  • malicious modifications
  • intentional replacement
  • back doors
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Countermeasures for Integrity

A
  • strict access control
  • rigorous authentication
  • IDS
  • Encryption
  • Hash verification
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Does Confidentiality & Integrity depend on each other

A

Yes - can’t maintain one without the other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define Availability

A

principle that authorized subjects are granted timely and uninterrupted access to objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Attacks on Availability

A
  • device failures
  • software errors
  • environmental issues
  • DOS
  • object destruction
  • communication interruption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Countermeasures for Availability

A
  • intermediary delivery system
  • effectively using access controls
  • monitoring performance
  • monitoring network traffic
  • using firewalls/routers to prevent DOS
  • implementing redundant systems
  • maintain backup systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define Security Governance

A

collection of practices related to supporting, defining & directing the security efforts of an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

define Abstraction

A
  • used to collect similar elements into groups, classes or roles that are assigned security controls, restrictions or permissions as a collective
  • adds efficiency to carrying out a security plan
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

COBIT (Control Objectives for Information and Related Technologies

A

security concept/guidelines used to organize complex security solutions of companies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Threat modeling

A
  • security process where potential threats are identified, categorized and analyzed
  • can be performed proactively during design and development
  • can be performed re-actively once a product has been deployed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Name 3 Threat Modeling approaches

A
  • focus on Assets
  • focus on Attackers
  • focus on Software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

STRIDE

A
  • threat categorization scheme developed by Microsoft
  • used assess threats against applications or operating systems
  • Spoofing
  • Tampering
  • Repudiation
  • Information Disclosure
  • DOS
  • Elevation of Privilege
17
Q

Threat Modeling - Reduction Analysis

A
  • decomposing the application, system, or environment
18
Q

Identify 5 key processes for Threat modeling - Reduction Analysis

A
    • Trust Boundaries
    • Data Flow paths
    • Input points
    • Privileged Operations
    • Details about Security Stance & Approach
19
Q

What can be used to rate/rank threats

A
  • Probability x Damage Potential
  • high/medium/low rating
  • DREAD system
20
Q

DREAD

A
  • Damage potential
  • Reproducibility
  • Exploitability
  • Affected users
  • Discoverability
21
Q

primary objective of Data Classification

A

formalize and stratify the process of securing data based on assigned labels of importance and sensitivity