Gary 02 - Security modules Flashcards

1
Q

What are the 3 basic terms that are need to be fulfilled while designing a secure system.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is confidentaility in secure system.

A

(POUFNOŚĆ)
The confidentiality is focused on the information and making sure the **only thing as you can see who have a right to say the information conceded. **

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Wha is an integrity in secure system.

A

(SPÓJNOŚĆ)

Integrity, the data has not been distributed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What the accessability is about in secure system.

A

(DOSTĘPNOŚĆ)
Without access security is pointless. The secured assets has to be accesable to be used by the people who need to use them and protectes them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What authenticity is about? Why it is so important?

A

(AUTENTYCZNOŚĆ)
Authenticity anwsets the question is it really from who they say it is from, is it genuine, uses digital signatures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is non-repudiation. Where is it used and why is it important.

A

(NIEZAPRZECZALNOŚĆ)
Non-repudiation is law focused, it is the obligations of a contract. So you cannot say you did not receive or did not send the transaction. Technology helps but it is Law based.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the other 3 things that describe security system, the incentives of creating one, the environment.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a threat.

A

the threat what it is that might happen. The thing we are securing our assets from.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a vulnerability.

A

The vulnerability where we are week. The weaknesses of our system, the potential attack points we need to focus on to secure them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a controll.

A

The control is how do we handle the weakness to make sure that the threat doesn’t become a reality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a good metaphore of secure system and why.

A

Chain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Describe the Static Security Model.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How the more advance model f security look like.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a procedure and who has to stick/obey/follow to it?

A

The procedure is a set of rules how the access has to be granted and how the security has to be kepet, for example authenticity check by providing the valid password and username.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is an ethic code?

A

So you will have to follow a code of ethic that appliers to security. This applies to ethical hackers.

However the Foe does not follow these codes. Kill the guard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is another layer of static security model that concerns the treasure.

A

The encryption.

17
Q

What is an Infromation Passing security model. What are the elements of that model and how are they designed.

A
18
Q

What are the sourcess of attack in case of Information-Passing security model.

A

Note that attack may come in terms of:

  • Corruption of original information
  • Disruption of communication
  • Corruption of information in transit
  • Interference with processing of information
  • Nullification of action
19
Q

What are the additional layers in Information-Passing security model.

A
20
Q

What is communication about in information-passing security model.

A

Communications, moving from one area of storage to another area of storage.

21
Q

How can we maintain na access or communication in information-passing model.

A

Locking it up in some secure server, sets up secure linkage through the stage coach.

22
Q

What is Information Sharing security model about? Why is it so different from previous models?

A

This relates to “security in the marketplace”.

In a distributed environment, we need to be able to “policeentry and exit from the marketplace, but also monitor activity within the marketplace.

23
Q

What are the benefits of Security Models? For what are they designed for?

A

In general, security models -in text books - come from the realms of “formal methods”
–they are designed to help you prove that your system is secure.
–First thing you need to do is create the model, an abstraction of the real world
–General idea is to make a representation, and then test it to ensure it is secure or prove mathematically

24
Q

What is the purpose of Security Models.

A

In general, security models -in text books - come from the realms of “formal methods
–they are designed to help you prove that your system is secure.
–First thing you need to do is create the model, an abstraction of the real world
–General idea is to make a representation, and then test it to ensure it is secure or prove mathematically

the idea is that what we want to do is we want to make a representation of i t. system , and then tests it through whatever means but probably mathematically to prove conclusively that it is secure.

25
Q

What are the steps of analysing the Secure System.

A

•Produce an Abstraction
•Make assumptions explicit
(wyraźniej określaj wszystkie założenia)

•Define clear boundaries
•Declare inviolate rules (that cannot be broken)

26
Q

What does making an Abstraction means.

A

Understand that you are analysing an abstraction, not the real system.

You are representing your secure system as some kind of abstraction that can be assessed in mathematicaly to prove that is secure or fail to rpove that.

27
Q

Whay does it mean that you have to make your assumptions expliciy.

A

As you move from the real world to the model.

There will be some assumptions that you will have to make moving from the real systems to the abstraction

if you forget that you’ve made these assumptions then,

you are liable to start say that I have tested my model rigorously and it’s proved to be totally secure. As it breaks but how did it happened- you forgot the assumption.

28
Q

Why is it so difficult to define clear boundries?

A

People make it messy so this can be difficult.

People and really systems are greyer and people make it messy. You need clear boundaries what is in the system and what is out side (mucky human).

29
Q

What is the problem of security models?

A

In practice, this means that security models work well for small “stuff”, but can’t be applied to entire information systems (because they involve people, and other messy things).

30
Q

What is an oragnge book.

A

Actually Orange book is not really a security model: but a set of requirements by which to assess something

Trusted Computer System Evaluation Criteria (TCSEC) is a United States Government Department of Defense (DoD) standard that sets basic requirements for assessing the effectiveness of computer security controls built into a computer system. The TCSEC was used to evaluate, classify and select computer systems being considered for the processing, storage and retrieval of sensitive or classified information.

31
Q

Describe Diffie–Hellman key exchange.

A
  • Allows two parties that have to jointly establish a shared secret key over an non-secure communications channel.
  • This key can then be used to encrypt subsequent communications using a symmetric key cipher.
32
Q

How Diffie–Hellman key exchange works.

A
33
Q

Describe **State Machine **security model.

A