Introduction Flashcards
What is a Security Policy?
Document that goes to CEO.
Shows their assets and threats to convince CEO to develop a policy to protect from threats.
High-level description of principles, assets and properties that must hold in the system.
What is CIA?
Confidentiality: only authorised individuals/systems can view sensitive or classified information.
Integrity: only authorised individuals/systems are allowed to modify the database
Availability: able to serve information when it is needed to authorised individuals/systems.
What are four types of attacks?
Passive: attempt to learn or make use of information that doesn’t affect system resources.
Active: attempt to alter system resources/affect their operation.
Insider: initiated by an entity inside the security perimeter
Outsider: initiated from outside the perimeter.
Name nine typical threats
Phishing Trojans Botnets Distributed Denial of Service Theft of money Data manipulation Data destruction Spyware/malware Man in the Middle
What are eight typical countermeasures against threats?
Firewalls. Network Intrusion Detection Access Control Antivirus software Encryption Vulnerability testing Physical security Social engineering detection (education)
What makes up the economical model of risk and how do you measure estimates of loss and expected loss with no security?
Model L = loss: value of potential loss. T = threat: probability of attack. V = vulnerability: probability that attack will succeed if it happens. VT = probability of a successful attack.
Risk estimates
Loss = L * T
Expected loss with no security
V * L = VT * L