Lecture 1 Flashcards

The information in lecture 1; Penetrate and patch model, security, reliability, functionality. Top down method. Harm analysis, security goals and requirements. Types of harm.

1
Q

What is a Penetrate and patch model?

A

Wait for vulnerabilities in a system to be found before creating an update to security. Development on security continues as product is used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are a few issues with a Penetrate and Patch model?

A

The bug can be exploited before the patch is released.

The patch may not be executed for a time.

The expense.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which is better? Top down or bottom up?

A

Neither, it depends on the system model. Both is best because it gives a greater number of insights.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a top down approach to design?

A

Is the breakdown, from the highest or broadest level into smaller categories, quite like reverse engineering.
It starts with the big picture. Goes from general to specific.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the bottom up approach to design?

A

In a bottom up approach the base elements of a system are defined first in greater detail and then linked to form higher level elements. It goes from specific to general.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define in a security setting Confidentiality.

A

Confidentiality is a set of rules that govern access to information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define in a security setting Integrity.

A

Integrity is assurance that information is trustworthy and accurate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define in a security setting Availability.

A

Availability is a guarantee that information will be able to be accessed by authorised systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is privacy in a security setting?

A

Privacy is the rights held by entities to control and use their own information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is non-repudiation?

A

It is the assurance that a party is who they say they are. They cannot deny the authenticity of information that originated from them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Anonymity in the context of security?

A

Anonymity is the guarantee that information will not be linked to your identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Harm analysis?

A

Thinking about what harms may come to assets within a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the difference between security goals and security requirements?

A

Security goals are broad behaviours of a system, whereas requirements are specifics of which a system must fulfill.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does it mean for a requirement to be testable?

A

It must be clear, have a measurable outcome and be complete without any ambiguity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly