CH13 Flashcards

Security Engineering

1
Q

The three security levels include _________ security, ______ security, and __________ security.

A

Infrastructure, Application, Operational.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name the security level:
which is concerned with maintaining the security of all systems and networks that provide an infrastructure and a set of shared services to the organization.

A

Infrastructure security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Name the security level:
which is concerned with the security of individual application systems or related groups of systems.

A

Application security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Name the security level:
which is concerned with the secure operation and use of the organization’s systems.

A

Operational security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Application security is a software engineering problem where the system is _________ to resist attacks.

A

designed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Infrastructure security is a systems management problem where the infrastructure is ________ to resist attacks.

A

configured

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

___________ is the tools, techniques and methods to support the development and maintenance of systems that can resist malicious attacks that are intended to damage a computer-based system or its data.

A

Security engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the 3 security dimensions?

A
  • Confidentiality
  • Integrity
  • Availability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Name the security dimension:
Access to a system or its data that is normally available may not be possible.

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Name the security dimension:
Information in a system may be disclosed or made accessible to people or programs that are not authorized to have access to that information.

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Name the security dimension:
Information in a system may be damaged or corrupted making it unusual or unreliable.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

T/F: Application Security is primarily a human and social issue, concerned with ensuring the people do not take actions that may compromise system security.

A

F, Operational Security not application security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The ________ of a system is a system property that reflects the system’s ability to protect itself from accidental or deliberate external attack.

A

security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Security is essential as most systems are networked so that external access to the system through _________ is possible.

A

the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

________ is an essential pre-requisite for availability, reliability and safety.

A

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

If a system is a networked system and is insecure then statements about its reliability and its safety are _______.

A

unreliable

17
Q

Name threat type:
________ threats that allow an attacker to gain access to an asset.
ex. A possible threat to the Mentcare system might be a situation where an attacker gains access to the records of an individual patient.

A

Interception

18
Q

_________ threats that allow an attacker to make part of the system unavailable.
ex. A possible threat might be a denial of service attack on a system database server so that database connections become impossible.

A

Interruption

19
Q

_________ threats that allow an attacker to tamper with a system asset.
ex. In the Mentcare system, a modification threat would be where an attacker alters or destroys a patient record.

A

Modification

20
Q

________ threats that allow an attacker to insert false information into a system.
ex. a threat in a banking system, where false transactions might be added to the system that transfer money to the perpetrator’s bank account.

A

Fabrication

21
Q

Name the 3 ways in which security can be assured?

A
  • Vulnerability avoidance
  • Attack detection and elimination
  • Exposure limitation and recovery
22
Q

_______ is a system characteristic that reflects its ability to resist and recover from damaging events.

A

Resilience

23
Q

T/F: it is very difficult to make an insecure system secure after it has been designed or implemented.

A

T, Security should be designed into a system

24
Q

Adding security features to a system to enhance its security affects other attributes of the system such as ________ and ________.

A

Performance;
Additional security checks slow down a system so its response time or throughput may be affected.

Usability;
Security measures may require users to remember information or require additional interactions to complete a transaction. This makes the system less usable and can frustrate system users.

25
Q

Two fundamental issues have to be considered when designing an architecture for security are ________ and _________.

A

Protection and Distribution

26
Q

T/F: Considering protection and distribution when designing security architecture is potentially conflicting.

A

T, If assets are distributed, then they are more expensive to protect. If assets are protected, then usability and performance requirements may be compromised.

27
Q

________ protection, ________ protection, and ________ protection lead to a layered protection architecture.

A

Platform-level, application-level, record-level

28
Q

__________ protection is the specific protection mechanisms built into the application itself e.g. additional password protection.

A

Application-level

29
Q

________ protection is protection that is invoked when access to specific information is requested.

A

Record-level

30
Q

__________ protection is the top-level controls on the platform on which a system runs.

A

Platform-level

31
Q

Programs without array bound checking can crash so actions taken to improve program _______ can also improve system ________.

A

reliability, security.

32
Q

T/F: Vulnerabilities are often language-specific.

A

True

33
Q

Name 4 dependable programming guidelines:

A
  1. Limit the visibility of information in a program
  2. Check all inputs for validity
  3. Provide a handler for all exceptions
  4. Minimize the use of error-prone constructs
  5. Provide restart capabilities
  6. Check array bounds
  7. Include timeouts when calling external components
  8. Name all constants that represent real-world values
34
Q

___________ is testing the extent to which the system can protect itself from external attacks

A

Security testing

35
Q

A team is established whose goal is to breach the security of the system by simulating attacks on the system.
This is _________ testing

A

Penetration

36
Q

The system is reviewed and analysed against the types of attack that are known to the validation team.
This is ___________ testing.

A

Experience-based

37
Q

Various security tools such as password checkers are used to analyse the system in operation.
This is ____________ analysis.

A

Tool-based

38
Q

The system is verified against a formal security specification.
This is ________ verification

A

Formal

39
Q

Name the 4 ways in which security is validated:

A
  • Experience-based testing
  • Penetration testing
  • Tool-based analysis
  • Formal verification