IT-Security (Chapter 3) Flashcards

1
Q

Security Providers

A
The ICT industry
•ICT is strategic asset
•Focus on development
•Growth strategy
•Security is not a core competency
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security Consumers

A
Organizations using ICT
•ICT is commodity
•Focus on operations
•Reputation to lose
•Budget negotiations define decision to invest in security
•Security is not a core competency
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Interdependent Security

A

Own wellbeing depends on own and others security choices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Network Externalities - Connections create benefit

A

The value of a network is super-linear in the number of its users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When to add security and where?

A
  1. When lack of security directly harms your own business.
  2. When you are big enough so that lack of security indirectly harms your reputation. →security for your users
  3. Where security helps your strategy, e. g., to lock customers in. →security against your users
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IT Security Management

A

Definition: a process used to achieve and maintain appropriate levels of confidentiality, integrity, availability, accountability, authenticity and reliability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Security Cycle

A

Check
Act
Plan
Do

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Risk Assessment

A
  1. Establish Context: Determine broad risk exposure
  2. Identify assets
  3. Identify threats
  4. Analyze current safeguards
  5. determine likelihood of attacks
  6. Recommending controls that mitigate or eliminate risks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Alternatives to Risk Treatment

A
Risk acceptance
Risk avoidance
Risk transfer
Reduce consequence
Reduce likelihood
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How to handle Attacks Technically

A

Prevention
Detection
Reaction
Recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Firewall

A

Allows just to enter at controlled points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Two Fundamental Policy Approaches (Firewall)

A

Default deny strategy vs. Default permit strategy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Goal ofIntrusion DetectionSystems

A

Supervision of computer systems and communication infrastructures in order to detect intrusions and misuse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Intrusion Prevention Systems (IPS)

A

IDS + Firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Tasks of an Intrusion Detection System

A
  1. Audit
  2. Detection
  3. Response
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Detection Quality

A

False Positive, True Positive,…

17
Q

Types of IDS

A

Host Intrusion Detection Systems (HIDS)
- installed on every system
Network Intrusion Detection System (NIDS)
- Works on information provided by the network, mainly packets sniffed from network layer.

18
Q

Signature-based Attack Detection

A

Some attack patterns can be described with sufficient detail → specification of “attack signatures”