Chapter 1 Flashcards

1
Q

Different Types of Security Decisions

A
  • Rule Based Decisions:
    • Follow pre-existing rules
  • Relativistic Decisions:
    • Make decisions based on surrounding environment
    • My friend does it, so I do as well
  • Requirements Based Decisions:
    • Look at risks and choose security measures accordingly
    • Reasses as part of lifecycle
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Risk Management Framework (RMF)

A

1) Establish system and security goals
2) Select Security Controls
3) Implement Security Controls
4) Asses security controls
5) Authorize the information system
6) Monitor security controls

repeat

Note: not really geared for small enterprises

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CIA Properties

A

1) Confidentiality
2) Integrity
3) Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Levels of Impact

A

1) N/A
2) Low = noticeable impact
3) Moderate = significant damage
4) High = Major catastrophic damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Example RMF Categorization

A

Website to publish public info:

Confidentiality: N/A
Integrity: Low
Availability: Low

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Proprietor’s RMF (PRMF)

A

Shorter, requirements-based assessment

1) Establish System and Security Goals
2) Select security controls
3) Validate the information system
4) Monitor security controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

PRMF Risk Assessment

3 major steps

A

1) Identify Risks: assets, threat agents, attacks
2) Prioritize Risks: estimate relative impacts (impact X likelihood)
3) Establish requirements: identify security goals to address the highest-priority risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Continuous Improvement (basic principle)

A

Identify basic goals, measure success, adjust our work to beter achieve our goals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Assets

A

What is valuable to an entity, what we are trying to protect. We protect them with a boundary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Vulnerabilities

A

Openings in the boundaries around our assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Threat Agent/Attacker

A

Individual or group that can manifest a threat. Who is doing the attacking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Defense/Safeguard/Countermeasure

A

something protecting an asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Compromised System

A

An attacked system that is unsafe to use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Botnet

A

When you have a network of compromised systems that are all controlled by a single attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Least Privilege (Basic Principle)

A

Restrict what people may do to an asset. Provide the minimum privileges required to a person so that they may successfully do their job.

Ex: key opens my store but not yours.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Defense in Depth (Basic Principle)

A

We improve security by providing layers of defense.. We want to have a series of defenses protecting our most valuable assets.

17
Q

Examples of threat agents

A

Cyber criminals, criminal organizations, independent pressure groups, national actors

18
Q

Profiling threat agents

A

Goals, Typical mode of operation (MO), Level of motivation, Capabilities and logistical constraints, references

19
Q

Types of attacks

A

1) Physical Theft: an availability attack
2) Denial of Service: Availability attack
3) Subversion: modify system to work for the threat agent
4) Masquerade: system works on behalf of the wrong user
5) Disclosure: attack on confidentiality
6) Forgery: Bogus messages given to computers

20
Q

Principle Risks

A

Risks with the highest impacts

21
Q

Possible cases of finding vulnerabilities

A

1) authorized search of system
2) unauthorized search of system
3) unplanned/unexpected discovery