DEFI Flashcards

1
Q

Elements of Security

A
  • assets,
  • threats,
  • vulnerabilities,
  • impact,
  • risk,
  • safeguards,
  • residual risk,
  • constraints.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Assets

A

Everything that has a value

  • Information and Data,
  • Hardware,
  • Software,
  • other Equipment,
  • documents,
  • services,
  • “trust” in services,
  • personell,
  • A organization’s image
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Threats

A

Everything that potentially harms Assets

  • errors,
  • faults,
  • misuse and theft,
  • malicious code,
  • hacking,
  • sabotage,
  • espionage,…
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Vulnerabilities

A

“Vulnerabilities are weaknesses which allow a threat to occur”
(Vulns do not neccesarily cause damage)

  • Insecure Communication
  • Poorly trained staff
  • trivial passwords
  • poor access control
  • lack of back-ups
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

safeguards

A

Means to reduce threats or vulnerabilities

Example: Access Control, Encryption, training of personell,…

  • ETSI Baseline Security Standard
  • NIST Computer Security Handbook
  • ISO TC 68 Banking and Related Financial Services - Information Security Guidelines
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Risks

A

Risk is a Function of

  • Assets
  • Threats
  • Vulnerabilities
  • Safeguards

There always remains a residual Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Relations

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Confidentiality

A
  • No unauthorized access to Information
  • sometimes security and confidentiality are use as synonyms
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Integrity

A
  • No unauthorized modification of information/resources
  • Everything is as it is supposed to be
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Availability

A

No unauthorized denial of access to information / resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

denial of service

A

prevention of authorised access of resources or the delaying of time-critical operations

⇒ hard to prevent in real life

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Privacy and Secrecy

A
  • protection of personal data
  • protection of data belonging to an organisation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

property

A
  • property is any attribute that can be quantitatively evaluated
  • tempurature, pressur, velocity are properties
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

state

A
  • state of an object is its condition described by a list of properties
  • temperature and pressure may describe the state of a gas
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

integrity property or state

A
  • integrity is a property (of data, of a system)
  • data integrity is a specific state of data that is verifiable
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

integrity a detective or preventative mechanism?

A

Integrity services are classified according to the following criteria

type of protection they support

  1. prevention of integrity compromise
  2. detection of integrity compromise

data integrity mechanisms can be detective or preventative

  • most well known mechanisms are detective (e.g. MAC, Digital Siganture)
17
Q

Security Evaluation

A

“Security evaluation checks whether a product delivers a promised security service. ”

  • A high level of Assurance-Level implies an inspection of a system at a very detailed level.
  • Complex systems and a high levels of assurance tend to me mutually exclusive
18
Q

Security Policy

A

Specification of Security Properties of a System

  • define goals that can be reached with security measures
  • often written down in Natural language
  • should be aligned with the real world they refer to

E.g. two employees are needed to open the safe with confidential documents, only possible between 9 and 4

→ An electronic System might enforce an equivalent policy

19
Q

Data origin authentication

A
  • Data origin authentication is the assurance that a given entity was the original source of received data
  • Data integrity is the assurance that data has not been altered in an unauthorised (which includes accidental) manner.
20
Q

Difference DOA from Integrity

A
  • Data origin authentication is the assurance that a given entity was the original source of received data.
  • Data integrity is the assurance that data has not been altered in an unauthorised (which includes accidental) manner.

Different from Integrity, see the following relation:

  • “Data origin authentication is a stronger notion than data integrity”
  • “Confidentiality does not imply data origin authentication”
  • “Confidentiality does not imply data integrity
21
Q

Dual of integrity difference from “no integrity”

A

Contingency

Contingency describes the verifiable state that the data’s integrity is intended to be unknown. Data in that state is said to be contingent.

  • Contingency is a verifiable property explicitly established by the applied protection mechanism and not an accidental state.
  • Allows an entity to repudiate the data, but not its creation
  • Data origin authentication is required for “intend” to be meaningful
22
Q

Non-Repudiation - Differences and Relations

A
  • … assurance that entity cannot deny a previous commitment or action
  • … assurance that original source of some data cannot deny to a third party that this is the case

Diffrence DOA

  • Data origin authenticationis theassurancethata given entity was theoriginal source of received data.”
  • “Non-repudiation of a source is a stronger notion than data origin authentication”
23
Q

Entity Authentication - Difference and Relations

A

… is the assurance that a given entity is involved and currently active in a communication session

DIfference to DOA:

  • Data origin authenticationon its own is only concerned with the origin of data, not whether the sender of data is currently active.”
  • “Data origin authentication plus a freshness check can provide entity authentication”
24
Q

Classifying Attackers

A
  • Class I: “Clever Outsiders”.
  • Intelligent,
  • has technical knowledge and simple equipment.
  • Tend to use known vulnerabilities of systems
  • Class II: “Knowledgeable Insiders”.
  • Technical Training/Education,
  • in-depth knowledge of systems,
  • has access to sophisticated equipment
  • Class III: “Funded Organizations”.
  • Teams of specialists,
  • access to relevant (Insider-) Information,
  • access to dedicated euquipment and significant resources (time, money)
25
Q

Approaches to Security

A
  • Virtualization: Giving code the illusion that it is in an environment other than the one it is actually being executed on.
  • Attestation: Providing systems the means to attest or verify the integrity of their components. (Needs a root of “trust”)
  • Acceleration: Adding hardware support to reduce the runtime overheads of security features.
  • Tagging: Memory locations are “tagged” with metadata, which can signal things like data types or permission levels.
  • Formal methods: Construct logical proofs to verify or disprove certain properties about a system.
  • Cryptography: Encrypt/protect information using cryptosystems.
  • Isolation: Keep trusted and untrusted components separate from eachother, and carefully monitor any interaction between the two.
  • Flow Approaches: Everything is an object with data and metadata. As computations are applied to data, shadow computations occur on the corresponding metadata, which detect and report illegitimate data modifications.
  • Moving Target Approaches: Almost all attacks (will) have defenses, and all defenses (will) have attacks. If attackers and defenders are constantly trying to better each other, moving target approaches minimize the advantage to the attackers by changing how the system/defenses work over time.
  • Diversification: If each system were distinct, it would force the attacker to prepare bespoke exploits, increasing their work and reducing their profits.
  • Anomaly detection: This paradigm is borne out of the philosophy that systems will always be insecure, irrespective of the presence of other security mechanisms. The goal is to monitor systems for abnormal or unusual behavior, which may indicate an adversarial attack on a system’s security.