Introduction to Security Flashcards

-Describe the challenges of securing information. -Define information security and explain why it is important. -Identify the types of attackers that are common today. -List the basic steps of an attack. -Describe the five basic principles of defense.

1
Q

The three protections that must be extended over information are :

Hint : CIA

A

Confidentiality : It is important that only approved individuals are able to access important information.

Integrity : Intergrityensures that the information is correct and on unauthorized person or malicious software has altered the data.

Availability : Availability ensures that the data is accessible to authorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Set of protections that must be implemented to secure information.

Hint : AAA

A

Authentication : Authentication ensures that the individual is who she claims to be and not an imposter.

Authorization : Authorization is providing permission or approval to a specific technology/space.

Accounting : Accounting provides tracking of events.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Information Security Ranking Layers

A

Information

  1. CIA
  2. Hardware, Software, Communication
  3. Products ( Physical Security )
  4. People ( Personnel Security )
  5. Procedures ( Organizational Security )
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Threat

A

A type of action that has the potential to cause harm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Threat Agent

A

A person or element that has the power to carry out a threat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Vulnerability

A

A flaw or weakness that allows a threat agent to bypass security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Threat vector

A

The means by which an attack could occur.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Threat likelihood

A

The probability that a threat will actually occur.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Risk

A

A situation that involves exposure to danger.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How is Risk Calculated?

A

Risk = Consequence * Vulnerablility * Threat Likelihood

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Risk Avoidance

A

Identifying the risk and making the decision to not engage in the activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Acceptance

A

Acknowledging a risk but taking no action to address it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Mitigation

A

Addresing a risk by making it less serious.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Deterrence

A

Understanding the attacker and then informing him of the consequences of the action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Transference

A

Transferring the risk to a third party.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

APT

Advanced Persistent Threat

A

Multi year intrusion campaign that targets highly sensitive economic, proprietary, or national security information.

17
Q

Cyber Kill Chain

A

Reconnaissance : The first step in an attack is to probe for any information about the system; The type of hardware used, version of operating system software, and even personal information about the users. This can reveal if the system is a viable target for an attack and how it could be attacked.

Weaponization : The attacker creates an exploit and packages it into a deliverable payload that can be used against the target.

Delivery : At this step the weapon is transmitted to the target, such as by an email attachment or through an infected web server.

Exploitation : After the weapon is deliverd to the victim, the exploitation stage triggers the intruders’ eploit. Generally the exploitation targets an application or operating system vulnerability, but it also could involve tricking the user into taking a specific action.

Installation : At this step the weapon is installed to either attack the computer or install a remote “backdoor” so the attacker can access the system.

Command and Control : Many times the compromised system connects back to the attacker so that the system can be remotely controlled by the attacker and receive future instructions.

Actions on Objectives : Now the attackers can start to take actions to achieve ther original objectives, such as stealing user passwords or launching attacks against other computers.

18
Q

Five fundamental Security Principles

Hint : LOw LSD

A

Layering, Obscurity, w, Limiting, Simplicity, Diversity.

19
Q

Layering

A

If one layer is penetrated - such as the thief getting into the building - several more layers must still be breached, and each layer is often more difficult or complicated than the previous. A layered approach has the advantage of creating a barrier of multiple defences that can be coordinated to thwart a variety attacks.If only one defense mechanism is in place, an attacker only has to circumvent that single defense. Instead, a security system must have layers, making it unlikely that an attacker has the tools and skills to break through all the layers of defenses. A layered approach also can be useful in resisting a variety of attacks. Layered security provides the most comprehensive protection.

20
Q

Limiting

A

Limiting access to information reduces the threat against it. This means that only those personnel who must use the data should have access to it. In additional, the access should be limited.

What level of access should users have?

The correct answer is the least amount necessary to do their jobs, and no more.

21
Q

Diversity

A

Just as imporatnt as it is to protect data with layers of security, the layers must also be different ( diverse ). This means that if attackers penetrate one layer, they canont use the same techniques to break through all the layers. An attacker who can circumvent a security device from Manufacturer A could then use those same skills and knowledge to defeat all of the same devices used by the organization. However, if devies from Manufacturer A and similar devices form Manufacturer B were both used b the same organization, the attacker would have more difficulty trying to break through both types of devices because they would be different.

22
Q

Obscurity

A

Obscuring to the outside world what is on the inside makes attacks much more difficult. An example of obscurity in information security would be not revealing the type of computer, version of operating system, or brand of software that is used. Sometimes the design or implementation of a device is kept secret. These secrets are also reffered as “Black Box”.

23
Q

Simplicity

A

Complex systems allow many oppurtunities for something to go wrong. In short, complex systems can be a theif’s ally. Complex security systems can be hard to understand, troubleshoot, and even feel secure about. As much as possible, a secure system should be simple for those on the inside to understand and use. Complex security schemes are often compromised to make them easier for trusted users to work with, yet this can also make it easier for the attackers. In short, keeping a system simple from the inside, but complex on the outside, can sometimes be difficult but reaps a major benefit.

24
Q
A