Chapter 1 Introduction Flashcards

1
Q

blackout

A

A long term interruption (outage) in electrical power availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

McCumber cube CNSS

A

policy-education-technology
confidentiality-integrity-availability
storage-processing-transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

host intrusion detection and prevention system ( HIDPS)

A

alerts security administrators when a critical file was modified or deleted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

weakness of CNSS

A
  1. omits the discussion guidelines and policies that directs the implementation of controls.
  2. in HIDPS example it concerns only the infosec community but not the other communities

CNSS main purpose is to identify infosec gaps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CIA plus

A
privacy
identification
authentication 
authorisation 
accountability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

measures for confidentiality

A
information classification 
secure storage
application of security policies 
education of info custodians and endusers
cryptography (encryption)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

measures for integrity

A
  • checking size, cash value or checksum of a file can help to see whether a virus or worm changed the integrity
  • low voltage signal carrying a digital bit can cause the recording of data incorrectly.
  • during transmission; algorithms, hash values, and error-correcting codes ensures integrity.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Measures for availability

A
  • availability when needed by authorised user, not for everyone.
  • for library presenting identification can help to see the collection in appropriate language and formats.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

measures for privacy

A

-information will be used only in ways approved by the provider.

  • collecting and combining information from several different sources
    - > information aggregation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. Identification
  2. Authentication
  3. Authorisation
  4. Accountability
A
  1. user ID
  2. secure ID, password
  3. access to creating, reading, writing, deleting

4.activity can be attributed to a person or automated process…. audit logs..

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
attack….an act
exploit..a technique
loss… a single instance
threat.. has the potential
threat agent.. the specific instance or a component of threat
vulnerability… a potential weakness
A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

threat vs attack

A

always present - exist only when a specific act may cause a loss.

example: threat of thunderstorm during summer is always present in some areas. but attack and its potential risk of loss exist only the duration of actual thunderstorm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

prioritisation of threat

A
  • based on the particular security situation
  • organisational strategy regarding risk
  • exposure level of asset
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

most common intellectual property breach

A

unlawful use or duplication of software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

availability distruption

  • internet service issues
  • communication and other
  • power irregularities:
    1. Black out
    2. Brown out
    3. fault
    4. sag
    5. spike
    6. Surge
A
  • internet service issues - SLA can be used
  • communication and other .. water, trash pickup, gas, telephone…
  • power irregularities… UPS can be used
  1. black out - LT cut
  2. brown out - LT reduction
  3. fault - ST error
  4. sag - ST decrease eg. when turning on air conditioning
  5. spike - ST increase eg. when turning off air conditioning
  6. surge - LT increase eg. lightening
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Espionage and Trespass

Advanced persistent threat (APT)
competitive intelligence
industrial espionage
Brute force password attack
Dictionary password attack
rainbow table
penetration tester
expert hacker
professional hacker
novice hacker
packet monkey
script kiddie

rooting
jail breaking

shoulder surfing
trespass
privilege escalation
pretexting
phreaker
A

Espionage and Trespass - unauthorised access - confidentiality

Advanced persistent threat (APT)

competitive intelligence - legal information collection
industrial espionage - above legal and ethical threshold

Brute force password attack : trying every possible characters and numbers in it…
-always change the default password.
-controls limiting number of unsuccessful attempts
Dictionary password attack : a variation of brute force attack, based on target’s personal info
-controls require special characters
rainbow table: if encrypted password file is stolen, hash values and plain text can be vlooked up to identify matches

penetration tester
expert hacker
professional hacker
novice hacker: inexperienced
packet monkey: a script kiddie doing DOS attacks
script kiddie: inexperienced, uses expertly written scripts

rooting… usually for android or linux
jail breaking… usually for ios

shoulder surfing
trespass : unauthorised entry into real or virtual property
privilege escalation
pretexting : usually by phone and pretending to be an authority
phreaker : free calls from public phones

17
Q

Force of Nature

Fire
Flood
Electrostatic discharge (ESD)Dust contamination
Solar 
Landslide
Tornado hurricane tsunami
A

Fire - indirect damage from water sprinkel

Flood - indirect damage from high humidity and moisture.. good to keep the data center on higher floors

Electrostatic discharge (ESD): en employee walking on a cool dry carpet can produce electricity which can damage the electronics

Dust contamination, Solar, Landslide, Tornado..

18
Q

Human Error

Social engineering:
advanced fee fraud (AFF)
phishing
spear pishing

A

Human error or failure often can be prevented by training, ongoing awareness activities and controls

Social engineering:
advanced fee fraud (AFF): 4-1-9 fraud Nigerian
National Petroleum Company

phishing: usually by email, embedded code, targeting as many people as possible

spear pishing: targeted message pretending to be from colleague etc.
19
Q

Information extortion

A

Demanding compensation for the return or for an agreement not to disclose

Ransomware: payment for the key needed to unlock the encryption

  • No guarantee of the return of the info or key
  • Frequent backup and testing the backups controls are good
20
Q

Sabotage or Vandalism

A

cyberwarfare: government or state against another government or state

hacktivist : a havker who is against the policies, operations of an organization or government agency. cyberactivist.

*control against website defacement can be web site back up, close monitoring of web site, minimizing the use of software such as scripts, plug ins and APIs.

21
Q

Software Attack

Back door, trap door, maintenance hook
Boot virus
Bot, zombie
DNS poisoning 
DOS and DDOS
mail bomb
man in the middle
packet sniffer- network sniffer
pharming
polymorphic threat
spoofing
virus, worm, trojan horses
A

Back door, trap door, maintenance hook: hard to detect.
Boot virus
Bot, zombie

DOS and DDOS: hard to defend against. system connected to internet and providing TCP based network services is vulnerable

mail bomb

man in the middle: monitors(sniffs) packets, modifies and puts back in the network
packet sniffer- network sniffer: can monitor data traffic on network. hard to detect, high risk as in organization data is sent as plain text

pharming: modifying the url, network traffic without the knowledge or active participation.
DNS poisoning: a type of pharming

polymorphic threat
spoofing
worm: worm can replicate itself until filling memory, space, network bandwith. 
trojan horse: eg. readme file
virus and worms can create back door.
22
Q

Technical Hardware Failure or Errors

Mean time between failures (MTBF)

Mean time to diagnose (MTTD)

Mean time to failure (MTTF)

Mean time to repair (MTTR)

A

Murphy’s Law: If something can possible can go wrong, it will.

MTBF = MTTF + MTTD + MTTR

Mean time between failures (MTBF): presumes item can be repaired

Mean time to diagnose (MTTD)

Mean time to failure (MTTF): presumes item must be replaced

Mean time to repair (MTTR)

23
Q

Technical Software Failures or Errors

OWASP is dedicated to helping organizations to create and operate software applications they can trust.

SQL injection
Cross Site Scripting (XSS) and Cross Site Request Forgery (CSRF)
Magic url
buffer overflow
Format string problems
Integer overflow
Catching exceptions 
failure to handle errors
poor usability
not updating easily
much privilege
Sins of mobile code
weak, home made cryptographic algorithms 
trusting network name
A

SQL injection: can lead improper access

(XSS) and (CSRF): malicious content appears to be coming from a trusted source

Magic url : if ID is passed as a parameter in the url, this can be modified and used for spoofing.

buffer overflow
Format string problems
Integer overflow
Catching exceptions 
failure to handle errors
poor usability
not updating easily
much privilege
Sins of mobile code
weak, home made cryptographic algorithms 
trusting network name
24
Q

Management :

informational role
interpersonal role
decisional role

A

Leader:

Autocratic: do as I said. van be effective but not good when the knowledge of leader lacks

Democratic: too much discussion but maybe better for complex issues to consult

laissez-faire: laid back, makes minimal decision. Can work fine when things are going well.

a combination is best.

25
Q

Management characteristics

Planning
Organising
Leading
Controlling

A

Planning:

strategic: long term at senior management level
tactical: 1-5 years and plan organise resources
operational: day to day

Organising: the management function dedicated to the structuring of resources to support the accomplishment of objectives.

Leading:Leadership addressed the direction and motivation of the human resources.

Controlling: The manager ensures that sufficient progress is made, any issues resolved and no additional resources are required.

26
Q

Governance

A

The level of uppermost management is referred to as governance.

27
Q

Solving Problems

  1. Clearly identify the problem
  2. Gather the facts and make assumptions
  3. Develop possible solutions, to develop as many solutions as possible
  4. Analyse and compare possible solutions
    • economic feasibility
    • technological feasibility
    • behavioural feasibility
    • operational feasibility
  5. Select, implement, and evaluate
A

28
Q

The primary focus of IT: to ensure effective and efficient processing of information

the primary focus of Infosec: to ensure availability, confidentiality and integrity

Infosec management functions:

Planning
Policy
Programs
Protection
People
Projects
A

Planning: CISO develops infosec objectives. with managers develops operational security plans. to achive overall organizational strategy.

Policy:
1-Enterprise InfoSec Policy (EISP)
2-Issue specific Security Policies (ISSPs)
3-System specific Policies (SysPs)

Programs: e.g. SETA program, risk management program…

Protection: by risk management, controls, technology etc

People: Security personnel, security of personnel and SETA

Projects: Project management includes finding the resources and also measuring progress towards the goal.