Infosec Flashcards
What are the three foundations of security?
Confidentiality, integrity and availability
What is Kerckhoff’s principle?
- Assume that your adversary knows which
algorithm you have used. - The security of the message should
only rely on the security of the key
a cryptosystem should be secure even if everything
about the system, except the key, is public knowledge.
What is Schneier’s law?
Anyone, from the most clueless amateur to the best cryptographer, can create an algorithm that he himself can’t break.
Should you try to make your own crypto?
No. Never, ever try to make your own crypto.
What are four network security threats?
- Communication
interruption (Attack on availability) - Eavesdropping (Attack on confidentiality)
- Modification of information (Attack on integrity)
- Fabrication
What are 3 security services?
- Authentication
- Access control
- Non-repudiation
What is PII and SPI?
PII = Personal Identifiable Information
SPI = Sensitive Personal Information
What are Isaac Asimov’s 3 laws of robotics?
- A robot may not injure a human being or, through inaction, allow a human being to come to harm.
- A robot must obey the orders given it by human beings except where such orders would conflict with the First Law.
- A robot must protect its own existence as long as such
protection does not conflict with the First or Second Laws.
What is the Heartbleed bug?
The Heartbleed bug is a vulnerability in open source software that was first discovered in 2014. Anyone with an internet connection can exploit this bug to read the memory of vulnerable systems, leaving no evidence of a compromised system. The Heartbleed attack works by tricking servers into leaking information stored in their memory. So any information handled by web servers is potentially vulnerable. That includes passwords, credit card numbers, medical records, and the contents of private email or social media messages.
What is the definition of software security according to Gary McGraw?
Software security is the practice of building software to be secure and to continue to function properly under malicious attack
The three pillars of software security:
Risk management, touchpoints and knowledge.
What are 3 types of assets?
- Information assets (ex: customer data, employe data, CRM data)
- Software assets (ex: e-mail system, online ordering system, common authentication (SSO) system)
- Physical assets (ex: Buildings, Servers, Network equipment)
What is Security Engineering?
Security engineering is about building systems to remain dependable in the face of malice, error and mischance.
As a discipline, it focuses on the tools, processes, and methods needed to design, implement and test complete systems,
and to adapt existing systems as their environment evolves.
What is the design hierarchy (3 levels)?
- Policy (what are we trying to do?)
- Protocols.. (how?)
- Hardware, crypto.. (With what?)
What does dependability mean?
Dependability is reliability AND security!
Trinity of trouble:
Connectivity, Complexity and Extensibility
What can a system be?
- a product or component (PC, smartcard,…)
- some products plus O/S, comms and infrastructure
- the above plus applications
- the above plus internal staff
- the above plus customers / external users
What is a subject, a person and a principal?
A subject is a person
A person can also be a legal person
A principal can be a person, equipment (PC, smartcard), a role (the officer of the watch), a complex role (Alice or Bob, Bob deputising for Alice)
What is secrecy, privacy and confidentiality?
Secrecy is a technical term – mechanisms
limiting the number of principals who can access information.
Privacy means control of your own secrets.
Confidentiality is an obligation to protect
someone else’s secrets.
What is anonymity, integrity and authenticity?
Anonymity is about restricting access to
metadata. It has various flavours, from not
being able to identify subjects to not being able
to link their actions.
An object’s integrity lies in its not having been
altered since the last authorised modification.
Authenticity has two common meanings:
* an object has integrity plus freshness
* you’re speaking to the right principal
What does trust imply?
A trusted system or component is one that can break my security policy
What is security policy, protection policy and security target?
Security policy = a succinct (short and clear) statement of protection goals.
Proctection policy = a detailed statement of protection goals.
Security target = a detailed statement of protection goals applied to a particular system.
What are the four levels of information?
- Top secret
- Secret
- Confidential
- Restricted
Information only flows upwards
Who said “If we had our hands tied behind
our backs … and could do only one
thing to improve software security
… we would do threat modeling”
Michael Howard and Steve Lipner