Chapter 1 Flashcards
Threat Mode
Structured way of identifying potential threats, vulnerabilities and risks to a system
NIST Definition of computer security
Measures/Control to ensure:
- Confidentiality
- Integrity
- Availability
of system assets
The CIA triad
Core principles of computer security:
- Confidentiality
- Integrity
- Availability
Confidentiality
Sensitive/private data not accessible to unauthorized individuals
Integrity
Guards against unauthorized modification and destruction of data
Availability
Service is not denied to authorized users
Two concepts some argue should be added to CIA triad
Authenticity and Accountability
Authenticity
Verifies genuinity and trustworthiness of data
Accountability
Trace actions back to responsible entities
Confidentiality example
- Student grades (high)
- Student entollment info (moderate)
- Staff directory (low - public)
Integrity example
- Patient allergy database (high)
- Website hosting forums (moderate)
- Anonymous polls (low, known for inaccuracy)
Availability example
- authentication services for finance (high) or Airport surveillance system
- Public Uni website (moderate)
- Non-critical applications like phone directories (low, alternatives are available for accessing the information)
Vulnerability
Weakness in system
Threat
Potential danger that may exploit vulnerability (cause harm to system)
Phishing emails, malware, hacker exploiting software bug
Attack
Deliberate action taken to exploit vulnerability
Ransomware, SQL injection, DoS
What is the first challenge of computer security?
Complexity: Security requirements may seem straightforward, but fulfilling may not be
Why is it difficult to anticipate attacks in computer security?
Must consider potential threats from different perspectives to identify unexpected weaknesses (Anticipate what hasn’t been done)
Counterintuitive Procedures
address non-obvious threats by adding “annoying” complexity (MFA) - threats not immediately obvious from requirements
Challenge of Deployment decision
Deciding where and how to implement security mechanisms (Physically - where and Logically - which layer)
Additional considerations in security challenges
Security measures often rely on secret information distribution or complex algorithms
Battle of Wits
Attackers only have to exploit one vulnerabiltiy, defenders must close all