Introduction Flashcards

1
Q

What is a Security Policy?

A

Document that goes to CEO.

Shows their assets and threats to convince CEO to develop a policy to protect from threats.

High-level description of principles, assets and properties that must hold in the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is CIA?

A

Confidentiality: only authorised individuals/systems can view sensitive or classified information.

Integrity: only authorised individuals/systems are allowed to modify the database

Availability: able to serve information when it is needed to authorised individuals/systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are four types of attacks?

A

Passive: attempt to learn or make use of information that doesn’t affect system resources.

Active: attempt to alter system resources/affect their operation.

Insider: initiated by an entity inside the security perimeter

Outsider: initiated from outside the perimeter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Name nine typical threats

A
Phishing
Trojans
Botnets 
Distributed Denial of Service
Theft of money
Data manipulation 
Data destruction 
Spyware/malware
Man in the Middle
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are eight typical countermeasures against threats?

A
Firewalls. 
Network Intrusion Detection 
Access Control
Antivirus software 
Encryption
Vulnerability testing 
Physical security 
Social engineering detection (education)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What makes up the economical model of risk and how do you measure estimates of loss and expected loss with no security?

A
Model
L = loss: value of potential loss. 
T = threat: probability of attack. 
V = vulnerability: probability that attack will succeed if it happens. 
VT = probability of a successful attack.

Risk estimates
Loss = L * T

Expected loss with no security
V * L = VT * L

How well did you know this?
1
Not at all
2
3
4
5
Perfectly