Introduction to System Security Flashcards

1
Q

Classification of protective measures

A
  • Prevention: Proactive steps to avert damage
  • Detection: Early identification of threats and intrusions
  • Reaction: Implement measures to restore assets after damage and considering unintended consequences like recovering from manipulated backups
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Computer security

A

Computer security deals with the prevention and detection of unauthorized actions by users of a computer system
-> Protection of information assets (how can they be jeopardized?)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data vs. information

A
  • Data: Physical phenomena chosen by convention to represent certain aspects of our conceptual and real world by convention, raw material
    -> Functions: Transmit and store information, derive new information by processing data according to formal rules
  • Information: Data that has been organized, structured, or interpreted to have meaning
    -> Characteristics: Information is the subjective interpretation of data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Reliability

A

Related to (accidental) failures in the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Safety

A

Related to the impact of system failures on their environment, which also deal with situations where the system has to perform properly in adverse (ungünstigen) conditions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Dependability

A
  • Trustworthiness of a computing system allowing justifiable reliance on its service
  • Encompasses availability, reliability, performance, maintainability, and maintenance support performance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Classical Security Targets

A
  • Confidentiality (Vertraulichkeit):
    -> Prevention of unauthorized disclosure of information
    -> Defining authorized users and relevant disclosure extents
    -> Regulating resource access based on permissions
  • Integrity (Integrität):
    -> Ensuring the accuracy and consistency of information
    -> Maintaining precision, consistency, and authorized modifications
    -> Managing access to resources for authorized alterations
  • Availability (Verfügbarkeit):
    -> Securing accuracy and consistency of information
    -> Maintaining availability is of absolute importance for security
    -> Guaranteeing reliable resource availability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Continued security targets

A
  • Authenticity (Authentizität): Safeguards the integrity and verifies the origin of a message’s content
  • Accountability (Zurechenbarkeit):
    -> Availability and integrity of the identity of the subject who performed an operation
    -> Data origin authentication: Verifies the source of transmitted data
    -> Entity authentication: Confirms the identity of an entity
  • Non-repudiation (Verbindlichkeit):
    -> Maintains the availability and integrity of the sender’s identity (non-repudiation of origin) or the receiver’s identity (non-repudiation of reception)
    -> Capability: Ability to prove this to (honest) third parties, particularly honest ones
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Privacy Targets

A
  • Privacy: Confidentiality with respect to personal data, which can be either “information” or “meta-information”
  • Anonymity: Confidentiality of the identity of a person by maintaining the state of being unindentifiable within a group of subjects
  • Untraceability: Related to anonymity, actions or identities cannot be traced back to a source
  • Unlinkability: Different transaction are not linkable
  • Unobservability: The state of items of interest (IOI) being indistinguishable from any IOI (of the same type) at all (z.B. ob Nachricht gesendet wurde oder nicht)
    -> unobservability protects information about the very existence of the item of interest against uninvolved parties
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Dimensions of Computer Security

A
  • Software
  • Hardware
  • Resource (object)
    -> generally refers to a passive entity (file or record in a database)
    -> However, object may indicate an active device from the systems resource pool (network printer or a programmable service that is managed as a resource)
  • User (subject)
    -> generally refers to an active entity
    -> used to identify a running process
    -> Each subject assumes the identity and the privileges of a single principal
    -> A principal may launch several processes within a single login session and thus be associated with multiple subjects, each of which inherits the identity of the login session
  • Horizontal axis between User and Resource represents the focus of the security policy
  • Vertical axis between Software and Hardware represents the layers of the computer system where a protection mechanism is implemented
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Security Measures

A
  • Technical Measures
    -> Cryptography, System Security
  • Organizational
    -> Password Guidelines
    -> Security Training
  • Physical
    -> Building Protection: Implementing physical security to safeguard premises and assets
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Physical Security Approaches

A
  • Tamper resistant systems:
    -> bank vault approach
    -> Robust materials to slow down attack
    -> Usually the easiest to apply
  • Tamper responding systems
    -> burglar alarm approach (defense is the detection of the intrusion)
    -> Good for portable systems or other systems where size and bulk are a disadvantage
    -> Sometimes destruction of secret data is employed to prevent theft in the case of isolated systems which cannot depend on outside response
  • Tamper evident systems
    -> If a break occurs, evidence of the break-in is left behind
    -> Not designed to prevent an attack or to respond to the indication that one is in progress
    -> Audit policy must be in place
How well did you know this?
1
Not at all
2
3
4
5
Perfectly