Lecture 4: 27th September 2019 Flashcards
Vulnerabilities and Threats
What are the main 3 general, high-level aims of security systems?
Prevent: Lock out the unauthorised user
Detect: Discover when an intrusion has been made or an asset is missing
React: Recover from the attack.
What are the desired system characteristics? What are the main 3?
Confidentiality: No unauthorised disclosure
Integrity: Prevent unauthorised modification
Availability: Prevent the withholding of resources.
Reliability: Uptime of system must be near to 100
Auditability: Evidence of actions
Authenticity: No unauthorised users.
The first 3 (CIA) are the main ones.
What is an exploit?
an attack performed by someone to take advantage of the vulnerability
What is a threat?
a circumstance that has the potential to cause loss or harm such as human attacks or natural disasters
What is malware?
same as Malcode or Virus, basically software with an exploits coded. Often there is a signature – a pattern within the code.
What is an attack?
an assault launched by cybercriminals using one or more computers against one or more computers or networks in an attempt to breach their security
What is an attack vector?
the mechanism or entry route of an exploit
Which system layers should security protect?
Hardware: Registers, memory overflow
Operating system: kernel, memory allocation, access rights
Data Storage: access and authorisation
Network: access, authorisation, data packets, routing data
Applications: data and program access and authorisation
Internet: the most problematic application
Physical: the physical machine is also vulnerable
How should security authenticate each layer in a system?
Can authenticate separately at each layer (takes more time, people use simple or 1 password => insecure) or use 1 single authentication measure (less secure than long and different passwords for every layer but quicker and, in practice, not significantly less secure) for every layer.
How can you ensure you have a legally sufficient and defensible level of security measures on a system?
Adhere to recognised international security standards and guides, e.g. from NIST or ITIL.
What should risk analysis consider?
Subject: the who, a person or a process (a program)
Object: the what, the data, the file, the process
Mode: the how, the mode or method of access
Policy: the who, what, how & possibly when.
What are the 4 theoretical types of threats?
Modification; fabrication; interrupt; intercept.
How can we mitigate threats?
Multi-Level Authentication: not just one weak password, Least Privilege: don’t give most users a lot of access to the system Fail Securely (or nicely): compartmentalise the system and have die-time routines Trust No-One: trust is a slow process and not given by default
What should we consider about attacks when taking measures against them?
Who will perform them, what the attack will target, where they will be deployed from, how they work and what the type of attack is.
What is a virus?
A self-replicating program that has some detrimental effects, such as providing backdoors, deleting or stealing data.