Chapter 1 Flashcards
Operational security of software-intensive systems depends on the practices and techniques during their
design and development
Lifecycle processes must consider the _______ inherent in the operational environments where systems are deployed
security- related
Increased consideration of operational security earlier in the acquisition and development process provides an opportunity to _____________
tone decisions to address security risk and reduce the total cost of operational security
SCADA stands for
supervisory control and data acquisition
Much of the information protection in place today is based on the principles established by _______
Saltzer and Schroeder
Where and when did Saltzer and Schroeder’s publication appear?
1974, Communications of the ACM
What was the title of Saltzer and Schroeder’s influential paper?
“The Protection of Information in Computer Systems”
What did Saltzer and Schroeder define as security?
“Techniques that control who may use or modify the computer or the information contained in it.”
What are the three main categories of security concern?
Confidentiality, integrity, availability
Name some examples of security problems
Malware, viruses, XSS, SQL Injection
Those working with deployed systems refer to their enhanced security needs as _____
Cyber Security Assurance
Software assurance as a term usually refers to the areas of ______
acquisition and development
What is the NASA definition of software assurance?
“The planned and systematic set of activities that ensure that software lifecycle processes and products conform to requirements, standards, and procedures.”
What ISO standards are a good reference for software assurance topics?
ISO/IEC 2008a, 2008b, 2009, 2011, 2015
What do definitions of software assurance usually include?
The requirement that software functions as intended.
What’s one reason for the different approaches suggested by the existing definitions of software assurance?
Risks related to modern systems of systems
What are some other challenges to effective operational security?
The increased use of commercial off-the-shelf (COTS) and open-source software as components within a system
Sustainment is
maintaining a deployed system over time as technology and operational needs change
Ignoring the issues surrounding sustainment can _______
undermine the stability, security and longevity of systems in production
Economy of mechanism
Keep the design as simple and small as possible
Fail-safe defaults
base access decisions on permission rather than exclusion
complete mediation
every access to every object must be checked for authority
open design
the design should not be secret. the mechanisms should not depend on the ignorance of the potential attackers, rather on the possession of specific and more easily protected keys and passwords
separation of privilege
where feasible, a protection mechanism that requires 2 keys to unlock is more robust and flexible than one that allows access to the presenter of only a single key
least privilege
every program and every user of the system should operate using the least set of privileges necessary to complete the job.
least common mechanism
minimize the amount of mechanism common to more than one user and depended on by all users
psychological acceptability
it is essential that the human interface be designed for ease of use so that users routinely and automatically apply the protection mechanisms correctly
a ______ of risk drives assurance decisions
perception
organizations without effective software assurance programs perceive risks based on ______
successful attacks and usually respond reactively
organizations can incorrectly perceive risk when they don’t ________
understand the threats and their impacts
risk concerns shall be _______ across all stakeholders and all interconnected technology elements
aligned
highly connected systems require _________
the aligning of risk across all stakeholders
protections can be applied at every technology _____
level
protections will conflict if not _____________
well orchestrated
dependencies shall not be trusted until proven _______
trustworthy
assurance of an integrated product depends on _________
other people’s assurance decisions
organizations must decide how much trust to place in dependencies based on _______
realistic assessments of the threats, impacts and opportunities represented by various interactions
dependencies are not _____
static
organizations must regularly review ______
trust relationships
attacks shall be _____
expected
a ________ of attackers can compromise an organization’s technology assets
broad community
there are no ______ protections against attacks
perfect
the attacker profile is _______
constantly changing
assurance requires effective ______ among all technology participants
coordination
organizations must apply protection broadly across its ________
people, policies and technologies
attackers take advantage of ______
all possible entry points
clearly establish ______ and _____
authority and responsibilityA
assurance shall be _______ and ______
well planned and dynamic
assurance must represent a balance between _____, _____, and ______
governance, construction and operation
a means to measure and audit overall assurance shall be _______
built in
organizations cannot manage what they cannot ______
measure
users will not address issues unless ______
held accountable
organizations must take focused measures to ensure that components are
securely engineered
operational systems are built and acquired through coordinated actions involving predefined steps. This is known as a _____
lifecycle
what standards provide guidance for suitable lifecycles?
NIST SP-800-160, ISO 15288
Every component of the software system and its interfaces must be operated and sustained with ________ in mind
organizational risk
confidence is a quality measure that means what?
the delivered system will behave as specified
At the start of the development cycle, the confidence gap is ______
large
reliability depends on
identifying and mitigating potential faults
how can assurance be defined?
“a documented body of evidence that provides a convincing and valid argument that a specific set of critical claims about a system’s properties are adequately justified for a given application in a given environment.” (Kelly 1998)
Assurance reviewers may doubt the _______, ________, and _______
claim, argument, evidence