Introduction to Information security Flashcards
What is a threat
A potential occurence that can have an adverse effect on the assets and resources of a system
What is a vulnerability
A characteristic in a system that allows for a threat to occur. A weakness in the system that makes the threat possible.
What is an attack
An action that involves exploiting a system vulnerability in order to cause an existing threat to occur
What are the 4 types of threats?
Disclosure, deception, disruption and usurpation
What is disclosure?
When information is available or leaked to an attacker
What is deception?
Providing false information or tricking someone to do what you want them to do.
What is disruption?
Preventing communication from happening, for example disrupting information from being shared
What is disruption?
Preventing communication from happening, for example disrupting information from being shared
What is usurpation?
When someone gets unauthorized access to a system or parts of a system.
What is snooping?
And disclosure attack where someone is getting and viewing information they weren’t supposed to have. Usually done with direct access to a machine
What is the CIA triad that is used to uphold computer security?
Upholding the three properties of confidentiality, integrity and availablility
What is confidentiality?
Prevention of disclosure of authorized information
What is integrity?
Prevention of unauthorized modification of information
What is availability?
The ability to withstand unauthorized withholding of information.
The necessary and promised data and system functionality should be available for indiviuals when they need them to be.
What is accountability in respect to of information security?
Who can you blame or account resources to
What is non-repudiation?
Not being able to deny one’s actions or repudiate, because of evidence or records of the action happening
What is computer security?
A system needs to behave in the way the designer intended it to.
Preventing attackers from achieven objectives through unautherized acces or use of systems.
How a system behaves in respect to integrity, confidentiality and availability.
What are security policies?
Policies set by organizations to keep their organization secure.
Tells what you are and aren’t supposed to do (i.e. going to certain websites on a work computer, downloading apps)
What is security mechanisms?
Ways to enforce security policies to make them work in practice.
What is one way that a security policy can be viewed as successful/effective?
When the policy handles multiple states of a system (secure states, insecure state) and there is no way for a system to transition to move from a secure to an insecure state. The system must also begin in a secure state.
What are three concept that can be used in security mechanisms to enforce security policies
Prevention (making sure aspects of the policy can’t be violated)
Detection (detecting policy violation, or determining when the policy was violated).
Recovery (Being able to revert back to a secure state after violation).
What are some types of security mechanisms?
Physical controls: Physical mechanisms that stop things from happening (locks)
Hardware and software controles: Mechanisms that can run checks/test to ensure a policy is held (access control, authorization).
Cryptography: Enforces confidentiality and integrity inside computer systems.
What are some methods to decide what security mechanisms to put into practice?
Evaluate added cost to possible mechanisms when their in use - mitigating (how to make things expensive for an attacker)
Laws and regulations
Risk analysis and assesment (likelyhood, possible consequences, how tolerable is the risk)’
Cost-benefit analysis (calculates the benefits of implementation and the associated cost of doing so)
Human issues (usability): Prioritizing mechanisms that are easy for users to use or realistic that users actually will use properly
What does security mechanisms want to accomplish?
Making the system so difficult to attack or so expensive to penetrate that it is no longer worth it for an attacker to do so
What does security mechanisms want to accomplish?
Making the system so difficult to attack or so expensive to penetrate that it is no longer worth it for an attacker to do so
What is mitigantion in regards to information security?
Reduction of severity or seriousness of an event. Centered around limiting impact of threats
What is hacktivism?
The action of hacking with politically or socially motivated purposes
What is an hobbyist hacker?
A hacker who’s is not employed by the government or an organization
What happens during a security breach
A system has transitioned from a secure state to an insecure state
What is security by designation
A user grants authority, so the user has the necessary context to know why it should be granted.
What is security by admonition?
The program initiates the request for authority. A user might not understand if it should be granted or not. A user may not have the context to decide whether to grant it.
When is security by admonition required?
When a user is likely to grant an actor the ability to do something that the user doesn’t want.
What is the principle of “Path of least resistance”?
The most natural way of executing a task should also be the safest
What is the principle “Appropriate boundaries”?
(TODO)
What is the principle of “Explicit authorization”?
A user’s authority should only be granted to
another actor through an explicit user action understood to imply
granting.
Define the principle of “Visibility” in secure interaction design
The interface should let the user easily review any active authority relationships that could affect security decisions.
Define the principle of “Recoverability” in secure interaction design
The interface should let the user easily revoke authority
that the user has granted, whenever revocation is possible.
Define the principle of “Expected ability” in secure interaction design
The interface should not give the user the impression of having authority that the user does not actually have.
Define the principle of “Trusted path” in secure interaction design
The user’s communication channel to any entity that manipulates authority on the user’s behalf must be unspoofable and free of corruption.
Define the principle of “Identifiability” in secure interaction design
The interface should ensure that identical objects or
actions appear identical and that distinct objects or actions appear different
Define the principle of “Expressiveness” in secure interaction design
The interface should provide enough expressive
power to let users easily express security policies that fit their goals.
Define the principle of “Clarity” in secure interaction design
The effect of any authority-manipulating user action should
be clearly apparent to the user before the action takes effect.
What are the 5 steps in the methodology for physical security?
Assessment, assignment, arrangement, approval, action
What is assesment in physical security methodology?
A thorough examination of the facility to be protected
- Scope of the property
- Establish all points of entry and egress
- Potential points of entry and egress
- Existing security measures
- Evaluation of physical property
- Risk assessment (how much risk is there)
What is assignment in physical security methodology?
Establish the required level of security for specific areas and assets within the facility
- High level (data centers, executive offices, finance and acconting)
- Medium (Entry and egress, reception, elevators)
- Low level (Common areas, cubicle farm)
What is approval in physical security methodology?
Submit all plans, costs to get them approved
- Hardware (quotes form vendors)
- Costs (plan A-B-C - have multiple plans, flexibility, options)
- Schedules (time frame from completion, interference with business operations)
What is action in physical security methodology?
Implement the proper security plans
- Construction (construction, inspection, corrections)
- Training (security officers, users, policy)
- Testing (ensure systems works as planned, compliance testing)
What are the four fundamental design principles?
Principle of open design, principle of sweeping simplifications, principle of design iteration and principle of least astonishment
What is the principle of open design in design principles?
Get others to comment and give feedback on you design. “Given enough eyeballs, all bugs are shallow”.
The more people that looks at the system, the bigger a chance that flaws, vulnerabilities and errors are found.
What is the principle of sweeping simplifications in design principles? (KISS - keep it simple stupid)
The less complicated something is, the less likely it is that someone made an error in the design or implementation of the system.
Complexity is the enemy of security.
To achieve this in complex systems, implement layering where each layer implement the principle of sweeping simplifications, and only communicate with the adjacent layers.
What is the principle of design for iteration in design principles?
Design your software in a way that makes it possible to implement changes later on.
Important since priorities and threats change over time.
Being able to adapt and update a system over time
What is the principle of least astonishment in design principles?
As software are written for the user, if any error occurs, these should be presented in a way that makes sense to the user. The system should create an experience that follows what the user thinks should happen.
Connected to the principle of phsycological acceptability. Security mechanisms should be comprehensable and fit efficiantly into user activities.
What is the principle of minimizing secrets in design principles?
Secrets shoul be few and should be easily changable.
These should not be baked into the code, and changing them should not require chenging of the source code.
Should never assume that the attacker can’t see the code - the code itself is not secret.
The security of a mechanism should not depend upon secrecy of it’s design or implementation (obscurity).
Secrets should also maximize entropy, meaning they should increase an attacker’s work factor
What is the principle of complete mediation in design principles?
All access to objects should be checked to ensure allowed access. One of the most vital parts of system security is access control.
This principle is often embedded in the piece of software called reference monitor, which checks the authenticity, authorization and integrity of access requests. Every request should be checked.
Access rights are always completely validated, every time an access occurs.
What is the principle of fail safe defaults in design principles?
The default values in a system should be sane and secure.
The idea is to “fail-closed”, meaning to fail in a way that does not compromise other parts of the system. “Fail-open” would allow an attacker to achieve some objective. Default behaviour of a system should be a safe one. Don’t fail and then let all requests in, rather fail and let no requests in.
No access by default - for example.
What is the principle of least privilege in design principles?
Privileges should only be granted such that an individual can perform their duty, and nothing more. Permissions must also be granular enough to only grant the permission nedded to fulfill the duty. This principle also ensures privacy
What is the principle of economy of mechanism in design principles?
Security mechanisms should be as simple as possible. Complex security mechanisms leads to errors.
What is the principle of least common mechanism in design principles?
Mechanisms used to access resources should not be shared. Shared resources can lead to denial-of-service attacks or other attacks.
An example is when seperate processes execute with shared CPU/RAM resources, the different processes can affect each other (?).
What is security by obscurity?
When a system tries to increase security by hiding parts of the system. For example hide design or implementation. This is not good and will not work, as one should always assume an attacker has access to the source code.
What is the principle of separate privileges in seure design patterns?
A protection mechanism is more flexible if it requires two seperate keys to unlock - allowing for two person control.
An example are dual-keys for safety deposit boxes.
What is the principle of Physological aceptability in secure design principles?
A policy interface should reflect the user’s mental model of protection. This is to avoid users using a mechanism incorrectly if the mechanism does not make sense to them.
Passwords fail this, even though people know they should use strong passwords, not share them, and not re-use them, people will still do that.
What is the physical security principle of “work factor”?
Stronger security will make the attacker work harder, in software security this would translate to trial-and-error attempts. Larger and more complex password and encryptions will lead to more attempts required to guess them. However, as attackers penetrate system by exploiting vulnerabilities that does not rely on trial-and-error this principle does not necessarily relate to all software security situations.
What is the physical security principle of “compromise recording”?
A system should keep attack records even if the attacks aren’t blocked.
In software security the benefit of these records can be questionable. If a system weren’t able to prevent an attack that modified data, the attack records themselves may have been modified - questionable integrity.
What is the security principle of Defence in depth?
A system shouold be built with independant security layers, making it necessary for an attacker to break through multiple security measures.
This echoes the least common mechanism - but targets a separate problem