Lecture 2: Course overview (key definitions) Flashcards
Give the definition of cyber security provided from the NIST computer security handbook.
The protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability, and confidentiality of information system resources (include hardware, software, firmware, information/data, and telecommunications).
What is NIST?
The National Institute of Standards and Technology is a physical sciences laboratory and non-regulatory agency of the United States Department of Commerce. Its mission is to promote American innovation and industrial competitiveness.
What is the difference between computer security and cyber security?
computer security: concerned with the security of a single computer
cyber security: concerned with the security
of multiple computers
Define “a threat”
A threat represents a potential security harm to an asset
system resource
Define “an attack”
An attack a threat that is carried out and, if successful,
leads to an undesirable violation of security
Define “the threat agent”
The threat agent carrying out the attack is referred to as an attacker
Define “a countermeasure”
A countermeasure is any means taken to deal with a security attack (e.g. prevention, detection/recovery).
Define “a residual level of risk to the assets”
A residual level of risk to the assets is represented by
vulnerabilities possibly exploited by threat agents.
What assets (system resources) do we need to protect?
Hardware
Software
Data
Communication facilities and networks
How are those assets threatened?
A leaky, corrupted and/or unavailable computer system or network
Define the hardware asset
computer systems and other data processing,
data storage, and data communications devices
Define the software asset
operating system, system utilities, and applications
Define the data asset
files and databases, as well as security-related
data (e.g. password files)
Define the communication facilities and networks asset
local and wide area network communication links, bridges, routers, etc.
What is meant by a computer system or network having the vulnerability of being leaky?
meaning that it gives access to information
through the network while it should not (see
Confidentiality)
What is meant by a computer system or network having the vulnerability of being corrupted?
meaning that it does the wrong thing or gives wrong answers (see Integrity).
What is meant by a computer system or network having the vulnerability of being unavailable?
meaning that it becomes impossible to use it or
impractical (see Availability)
What are the two types of passive attacks?
1) Eavesdropping (interception)
2) Traffic analysis (inference)
What are the characteristics of a passive attack?
1) DO NOT alter information and resources in the system
2) may be hard to detect but easy to prevent
Define the passive attack of eavesdropping (interception)
the attacker directly accesses
sensitive data traveling between authorised source
and destination
Define the passive attack of traffic analysis (inference)
the attacker gains information from observing the amount of traffic between source and destination
What are the three types of active attacks?
1) Masquerade
2) Modification of messages (falsification)
3) Distributed denial of service (misappropriation)
What are the three types of active attacks?
1) Masquerade
2) Modification of messages (falsification)
3) Distributed denial of service (misappropriation)
What are the characteristics of an active attack?
1) DO alter information and/or resources in the system
2) may be hard to prevent but easy to detect (and recover)
Define the active attack of modification of messages (falsification)
the attacker changes messages during transmission
Define the active attack of modification of messages (falsification)
the attacker changes messages during transmission
Define the active attack of distributed denial of service (misappropriation):
the attacker prevents legitimate users from accessing
resources.
What are the two types of inside attacks?
1) Exposure
2) Falsification
What are the characteristics of an inside attack?
1) initiated by an entity INSIDE the security perimeter
2) authorization to access system resources but use of them in a malicious way
Define the inside attack of exposure
the attacker intentionally releases sensitive information to an outsider.
Define the inside attack of falsification
the attacker alters or replaces valid data or introduces false data into a file or database
What are the two types of outside attacks?
1) Obstruction
2) Intrusion