Lecture 2: Course overview (key definitions) Flashcards

1
Q

Give the definition of cyber security provided from the NIST computer security handbook.

A

The protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability, and confidentiality of information system resources (include hardware, software, firmware, information/data, and telecommunications).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is NIST?

A

The National Institute of Standards and Technology is a physical sciences laboratory and non-regulatory agency of the United States Department of Commerce. Its mission is to promote American innovation and industrial competitiveness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the difference between computer security and cyber security?

A

computer security: concerned with the security of a single computer

cyber security: concerned with the security
of multiple computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define “a threat”

A

A threat represents a potential security harm to an asset

system resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define “an attack”

A

An attack a threat that is carried out and, if successful,

leads to an undesirable violation of security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define “the threat agent”

A

The threat agent carrying out the attack is referred to as an attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define “a countermeasure”

A

A countermeasure is any means taken to deal with a security attack (e.g. prevention, detection/recovery).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define “a residual level of risk to the assets”

A

A residual level of risk to the assets is represented by

vulnerabilities possibly exploited by threat agents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What assets (system resources) do we need to protect?

A

Hardware
Software
Data
Communication facilities and networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How are those assets threatened?

A

A leaky, corrupted and/or unavailable computer system or network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define the hardware asset

A

computer systems and other data processing,

data storage, and data communications devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define the software asset

A

operating system, system utilities, and applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define the data asset

A

files and databases, as well as security-related

data (e.g. password files)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define the communication facilities and networks asset

A

local and wide area network communication links, bridges, routers, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is meant by a computer system or network having the vulnerability of being leaky?

A

meaning that it gives access to information
through the network while it should not (see
Confidentiality)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is meant by a computer system or network having the vulnerability of being corrupted?

A
meaning that it does the wrong thing or gives
wrong answers (see Integrity).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is meant by a computer system or network having the vulnerability of being unavailable?

A

meaning that it becomes impossible to use it or

impractical (see Availability)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the two types of passive attacks?

A

1) Eavesdropping (interception)

2) Traffic analysis (inference)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the characteristics of a passive attack?

A

1) DO NOT alter information and resources in the system

2) may be hard to detect but easy to prevent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Define the passive attack of eavesdropping (interception)

A

the attacker directly accesses
sensitive data traveling between authorised source
and destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Define the passive attack of traffic analysis (inference)

A

the attacker gains information from observing the amount of traffic between source and destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are the three types of active attacks?

A

1) Masquerade
2) Modification of messages (falsification)
3) Distributed denial of service (misappropriation)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are the three types of active attacks?

A

1) Masquerade
2) Modification of messages (falsification)
3) Distributed denial of service (misappropriation)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are the characteristics of an active attack?

A

1) DO alter information and/or resources in the system

2) may be hard to prevent but easy to detect (and recover)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Define the active attack of modification of messages (falsification)
the attacker changes messages during transmission
26
Define the active attack of modification of messages (falsification)
the attacker changes messages during transmission
27
Define the active attack of distributed denial of service (misappropriation):
the attacker prevents legitimate users from accessing | resources.
28
What are the two types of inside attacks?
1) Exposure | 2) Falsification
29
What are the characteristics of an inside attack?
1) initiated by an entity INSIDE the security perimeter | 2) authorization to access system resources but use of them in a malicious way
30
Define the inside attack of exposure
the attacker intentionally releases sensitive information to an outsider.
31
Define the inside attack of falsification
the attacker alters or replaces valid data or introduces false data into a file or database
32
What are the two types of outside attacks?
1) Obstruction | 2) Intrusion
33
What are the characteristics of an outside attack?
initiated from OUTSIDE the perimeter, by an unauthorised or illegitimate user of the system
34
Define the outside attack of obstruction
the attacker disables communication links or | alters communication control information
35
Define the outside attack of intrusion
the attacker gains unauthorised access to sensitive data by overcoming the access control protections
36
What is information security management required to do?
1. Identify threats 2. Classify all threats according to likelihood and severity 3. Apply security controls based on cost benefit analysis
37
What do countermeasures to vulnerabilities and threats comprise?
1. Computer security technical measures (e.g. access control, authentication, system protection) 2. Management measures (e.g. awareness and training) 3. Both (e.g. configuration management)
38
Give the information security definition from the ISO security architecture. [security, vulnerability, threat]
The term security is used in the sense of minimizing the vulnerabilities of assets and resources. An asset is anything of value. A vulnerability is any weakness that could be exploited to violate a system or the information it contains. A threat is a potential violation of security.
39
What is the CIA triad?
Traditional definitions are based on 3 information security goals: confidentiality, integrity, availability
40
Define confidentiality
preventing unauthorised disclosure of | information (POODLE attack)
41
Define integrity
``` preventing unauthorised (accidental or deliberate) modification or destruction of information (SQLI attack) ```
42
Define availability
ensuring resources are accessible when required | by an authorised user (DoS attack)
43
What does the OSI Security Architecture X.800 define?
``` security threats (attacks), security services and security mechanisms and how they are related. ```
44
Define security service
a processing or communication service to give a specific kind of protection to system resources
45
Define security mechanism
a method of implementing one or more security services
46
What does a security service, provided by a layer of communicating open systems, ensure?
adequate security of the systems or of data | transfers as defined by ITU-T X.800
47
What are the 8 security services?
1) peer entity authentication 2) data origin authentication 3) access control 4) data confidentiality 5) traffic flow confidentiality 6) data integrity 7) non-repudiation 8) availability
48
What does the security service of peer entity authentication provide?
confirmation of the claimed identify of an entity
49
What does the security service of data origin authentication provide?
confirmation of the claimed source (origin) of a data unit (message)
50
What does the security service of access control provide?
protection against unauthorization use of resources. Access control service is usually provided in combination with authentication and authorisation services
51
What does the security service of data confidentiality protect?
data against unauthorised disclosure
52
What does the security service of traffic flow confidentiality protect?
disclosure of data which can be derived from knowledge of traffic flows
53
What does the security service of data integrity detect?
any modification, insertion, deletion or replay of data in a message or a stream of messages
54
What does the security service of non-repudiation protect against?
any attempt by the creator of a message to falsely deny creating the data or its contents
55
What does the security service of availability protect?
a system against denial of service
56
In terms of non-repudiation, what does X.800 talk about?
non-repudiation of origin to protect against denial by the sender of a message, and non-repudiation of receipt to protect against denial by the recipient of a message
57
What are the 8 security mechanisms?
1) Encipherment 2) Digital signature 3) Access control 4) Data integrity 5) Authentication exchange 6) Traffic padding 7) Routing control 8) Notarization
58
What is the security mechanism of enchipherment?
the transformation of data in order to hide its information content --> relates to public-key and symmetric-key encryption
59
What is the security mechanism of digital signature?
cryptographic algorithms which transform data using a signing key --> essential property is that signed data can only be created with the signing key --> relates to standard signature schemes
60
What are the security mechanisms of access control?
include access control lists, passwords, or tokens, which may be used to indicate access rights
61
What are the security mechanisms of data integrity?
“corruption detection techniques“ which can be used with ”sequence information“ --> Message Authentication Codes (MACs)
62
What is the security mechanisms of authentication exchange?
protocols which exchange information to ensure identity of protocol participants --> e.g. TLS
63
What is the security mechanisms of traffic padding?
spurious traffic generated to protect against traffic analysis. typically used in combination with encipherment
64
What is the security mechanisms of routing control?
the use of specific secure routes
65
What is the security mechanisms of notarization?
uses a trusted third party to assure the source or receipt of data. The trusted third party is sometimes called a notary
66
What security mechanism(s) relate to the security service of peer entity authentication?
1) Encipherment 2) Digital signature 3) Padding
67
What security mechanism(s) relate to the security service of data origin authentication?
1) Encipherment | 2) Digital signature
68
What security mechanism(s) relate to the security service of access control ?
1) Encipherment
69
What security mechanism(s) relate to the security service of Data Confidentiality?
1) Encipherment | 2) Routing control
70
What security mechanism(s) relate to the security service of Traffic Flow Confidentiality?
1) Encipherment 2) Padding 3) Routing control
71
What security mechanism(s) relate to the security service of Data Integrity?
1) Encipherment 2) Digital signature 3) Data Integrity
72
What security mechanism(s) relate to the security service of Non-repudiation?
1) Digital signature 2) Data Integrity 3) Notarization
73
What security mechanism(s) relate to the security service of Availability?
1) Data Integrity | 2) Auth. exchange
74
What security service(s) relate to the security mechanism of Encipherment?
1) Peer entity authentication 2) Data origin authentication 3) Data Confidentiality 4) Traffic Flow Confidentiality 5) Data Integrity
75
What security service(s) relate to the security mechanism of Digital Signature?
1) Peer entity authentication 2) Data origin authentication 3) Data Integrity 4) Non-repudiation
76
What security service(s) relate to the security mechanism of Access control?
1) Access control
77
What security service(s) relate to the security mechanism of Data Integrity?
1) Data Integrity 2) Non-repudiation 3) Availability
78
What security service(s) relate to the security mechanism of Auth. exchange?
1) Peer entity authentication | 2) Availability
79
What security service(s) relate to the security mechanism of Padding?
1) Traffic Flow Confidentiality
80
What security service(s) relate to the security mechanism of Routing control?
1) Data Confidentiality | 2) Traffic Flow Confidentiality
81
What security service(s) relate to the security mechanism of Notarization?
1) Non-repudiation