ChatGPT Chapter 1 Flashcards

1
Q

What are the three fundamental questions in cybersecurity?

A
  1. What assets do we need to protect?
  2. How are those assets threatened?
  3. What can we do to counter those threats?
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Threat Model

A

Structured way of identifying potential threats, vulnerabilities and risks to a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Privacy

A

Individuals control what infromation rtelated to them may be collected, stored and who can access it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the NIST definition of computer security?

A

The protection afforded to an automated information system to preserve confidentiality, integrity and availability of its resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the CIA Triad in cybersecurity?

A

Confidentiality: Ensuring information is not disclosed to unauthorized individuals; Ensure privacy
Integrity: Ensuring data/system isn’t modified or destroyed by unauthorized individuals
Availability: Ensuring timely access to data and services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the two additional security concepts beyond the CIA Triad?

A

Authenticity: Ensuring genuinity and trustworthiness, ability to verify
Accountability: Tracing actions back to responsible entity

Authenticitity: Confidence in validity of message or message originator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define vulnerability, threat and attack

A

Vulnerability: Weakness in a system (Flaw in design, implementation or management that can be exploited)
Threat: A potential for security violation, causing harm
Attack: Deliberate action to breach security by exploiting vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define Risk

A

Probability of a threat exploiting a vulnerability (Rare - almost certain)
AND
Impact it would have on system (insig. - catostrophic)

Helps determine what to fix first.

Expectation of loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Levels of impact

Levels of impact

A

Low, Moderate, High

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Computer Security Challenges

A
  1. Procedures often counterintuitive
  2. Not as simple as appears (multiple algorithms or protocols)
  3. Attackers only need to find a single weaknesses (developers must find all!)
  4. Good Security is Invisible
  5. Requires constant monitoring
  6. Impediment to efficient and user-friendly operation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the two types of attacks?

A

Passive: Eavesdropping system without altering resources
Active: Attempt to modify or disrupt the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a countermeasure?

A

Action or device that reduces vulnerability, threat or attack by eliminating it, preventing it or minimizng the harm it can cause

** Prevent Detect Recover**

May introduce new vulnerabilties or residuals remain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Security Policy

A

Set of rules and practices that speicfy how a system or org. provides security services

Ex: Strong passwords and their expiration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the 4 major threat consequences? (UDDU)

A
  1. Unauthorized Disclosure: Breaching confidentiality (interception)
  2. Deception: Tampering with integrity (masquerade, falsification)
  3. Disruption: Affecting availability or integrity (incapacitation)
  4. Usurpation: Gaining unauthorized control (misappropriation, misuse)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Unauthorized Disclosure

Examples

A
  1. Exposure (deliberate or error)
  2. Interception (unauthorized access to data)
  3. Inference (traffic analysis to get detailed information)
  4. Intrusion (unauthorized access to sensitive data)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Deception

Examples

A
  1. Masquerade (trojan horse)
  2. Falsification (alter or replace valid data, introduce false data)
    3.Repudiation (I didn’t do it)

*All impact integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Disruption

Examples

A
  1. Incapacitation (destroy or damage system hardware)
  2. Corruption (unauthorized modification) Integrity
  3. Obstruction (overload system to interfere with communications) availability
18
Q

Usurpation

*Examples

A
  1. Misappropriation (enity takes control of system resource)
  2. Misuse (Make system component perform damaging function or service)

*Integrity

19
Q

What is the attack surface?

A

Set of all reachable and exploitable vulnerabilities in a system

Open ports, firewall, APIs, SQL queries, web forms

20
Q

3 Main Attack Surface Categories

A

Network
Software
Human *social engineering

21
Q

What is an attack tree?

A

A hierarchical diagram representing possible attack methods, used for analyzing vulnerabilities and improving defenses.

used for attack surface analysis

22
Q
A
23
Q

What is the principle of economy of mechanism in security?

A

Security mechanisms should be as simple as possible to reduce errors and vulnerabilities.

24
Q

What is the principle of fail-safe defaults?

A

The default state of a system should be to deny access, unless explicitly allowed.

25
Q

Define the principle of complete mediation

A

Every access request must be checked against the access control system without relying on cached decisions

26
Q

What is the principle of least privilege?

A

Users or processes should only have the minimum privileges necessary to perform their tasks.

27
Q

Least common mechanism principle

A

A design should minimize the functions shared by different users/entities

Sharing state among different software programs

28
Q

Define the principle of isolation

A

Critical resources should be separated from public access, and user files should be isolated from one another.

29
Q

What is the principle of psychological acceptability?

A

Security mechanisms should not interfere with usability, ensuring user acceptance.

30
Q

Open Design Principle

A

Keep design open not secret

31
Q

Separation of privileges principle

A

Multiple privileges should be required to achieve access to a restricted resource

32
Q

Encapsulation principle

Encapsulation principle

A

hide internal structures

similar to object-oriented programming concepts

33
Q

Modularity principle

A

security functions as separate, protected modules

34
Q

Layering principle

A

multiple overlapping protection approaches

multiple firewalls based on different technologies and approaches

35
Q
A
36
Q

What is the scope of computer security?

A

Protecting data, processes, and applications on a single computer or device through measures like file security, user authentication, local network protections, and controlled access to resources.

EX: Encrypting hard drive

37
Q

Example of CIA Triad Affecting Hardware

A
  1. Confidentiality - USB drive stolen
  2. Integrity - ATM skimmers (physical tampering of ATM hardware)
  3. Availability - Equipment is stolen
38
Q

Example of CIA Triad Affecting Software

A
  1. Confidentiality - Copy of software made
  2. Integrity - Program modified to cause it to fail
  3. Availability - program deleted
39
Q

Example of CIA Affecting Data

A
  1. Confidentiality - Unauthorized read of data
  2. Integrity - Files modified or new ones fabricated
  3. Availability - Files deleted
40
Q

Example of CIA Affecting Communication Lines

A
  1. Confidentiality - messages read or traffic patterns observed
  2. Integrity - messages modified, delayed, reordered, duplicated, fabricated
  3. Availability - Messages destroyed or deleted
41
Q

4 Main Types of Active Attacks

A
  1. Masquerade
  2. Replay (gaining access by replaying message)
  3. Modification of messages (change IBAN in bank transfer)
  4. Denial of service (interuruption of an authorized user’s access to a computer network)