ChatGPT Chapter 1 Flashcards
What are the three fundamental questions in cybersecurity?
- What assets do we need to protect?
- How are those assets threatened?
- What can we do to counter those threats?
Threat Model
Structured way of identifying potential threats, vulnerabilities and risks to a system
Privacy
Individuals control what infromation rtelated to them may be collected, stored and who can access it.
What is the NIST definition of computer security?
The protection afforded to an automated information system to preserve confidentiality, integrity and availability of its resources.
What is the CIA Triad in cybersecurity?
Confidentiality: Ensuring information is not disclosed to unauthorized individuals; Ensure privacy
Integrity: Ensuring data/system isn’t modified or destroyed by unauthorized individuals
Availability: Ensuring timely access to data and services
What are the two additional security concepts beyond the CIA Triad?
Authenticity: Ensuring genuinity and trustworthiness, ability to verify
Accountability: Tracing actions back to responsible entity
Authenticitity: Confidence in validity of message or message originator
Define vulnerability, threat and attack
Vulnerability: Weakness in a system (Flaw in design, implementation or management that can be exploited)
Threat: A potential for security violation, causing harm
Attack: Deliberate action to breach security by exploiting vulnerability
Define Risk
Probability of a threat exploiting a vulnerability (Rare - almost certain)
AND
Impact it would have on system (insig. - catostrophic)
Helps determine what to fix first.
Expectation of loss
Levels of impact
Levels of impact
Low, Moderate, High
Computer Security Challenges
- Procedures often counterintuitive
- Not as simple as appears (multiple algorithms or protocols)
- Attackers only need to find a single weaknesses (developers must find all!)
- Good Security is Invisible
- Requires constant monitoring
- Impediment to efficient and user-friendly operation
What are the two types of attacks?
Passive: Eavesdropping system without altering resources
Active: Attempt to modify or disrupt the system
What is a countermeasure?
Action or device that reduces vulnerability, threat or attack by eliminating it, preventing it or minimizng the harm it can cause
** Prevent Detect Recover**
May introduce new vulnerabilties or residuals remain
Security Policy
Set of rules and practices that speicfy how a system or org. provides security services
Ex: Strong passwords and their expiration
What are the 4 major threat consequences? (UDDU)
- Unauthorized Disclosure: Breaching confidentiality (interception)
- Deception: Tampering with integrity (masquerade, falsification)
- Disruption: Affecting availability or integrity (incapacitation)
- Usurpation: Gaining unauthorized control (misappropriation, misuse)
Unauthorized Disclosure
Examples
- Exposure (deliberate or error)
- Interception (unauthorized access to data)
- Inference (traffic analysis to get detailed information)
- Intrusion (unauthorized access to sensitive data)
Deception
Examples
- Masquerade (trojan horse)
- Falsification (alter or replace valid data, introduce false data)
3.Repudiation (I didn’t do it)
*All impact integrity