Lecture 9 Flashcards

1
Q

Assurance deals with security features of IT products applies to:

A
  • Requirements
  • Security policy
  • Product design Product Implementation
  • System operation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CC Assurance Levels and why is it needed?

A

EAL 1: Functionally Tested

EAL 2: Structurally tested

EAL 3: Methodically tested and checked

EAL 4: Methodically designed, tested and reviewed

EAL 5: Semi-formally designed and tested

EAL 6: Semi-formally verified design and tested

EAL 7: Formally verified design and tested

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Evaluation Parties and Phases, who is it monitored and operated by?

A

Parties:

  • Sponsor – customer or vendor
  • Developer – provides evidence for evaluation
  • Evaluator – confirms requirements are satisfied
  • Certifier – agency monitoring evaluation process

Monitored and regulated by a government agency in each country

  • Operated by NIST and NSA
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Phases of Evaluation

A

Preparation: Initial contact between sponsor and developer

Conduct of evaluation: Confirms satisfaction of security target

**Conclusion: ** Final report to the certifiers for **acceptance **

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The three fundamental questions IT security management tries to address

A
  • IT security requirements
  • Assignment of responsibilities
  • Risk management approach
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is IT Security Management?

A

A process used to achieve and maintain appropriate levels of confidentiality, integrity, availability, accountability, authenticity and **reliability **

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Four steps in security iterative security management process

A
  • PLAN – Security policy assessment
  • DO – Implementation
  • CHECK – Assessment
  • ACT – Preventive actions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Examines organisation’s IT security

A
  • Objectives – wanted IT security outcomes
  • Strategies – How to meet objectives
  • PolicesIdentify what needs to be **done **
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The Approaches to identify and mitigate risks to an organisation’s IT infrastructure

A
  • Baseline - Implements agreed controls to provide protection against the most common threats
  • **Informal - **Involves conducting an informal, pragmatic risk analysis on organisation’s IT systems
  • Detailed risk
  • Combined
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The final stage of risk assessment will be the risk treatment alternatives:

A
  • Risk acceptance
  • Risk avoidance
  • Risk transfer
  • Risk consequence
  • Reduce likelihood
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Intellectual Property?

A

Is the ownership of ideas: names, designs, symbols, and literal, used in commerce.

  • Patents: Obtaining rights over invention
  • Trademarks: obtaining rights over brand identity
  • Copyright: Unauthorised use
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Copyright and its exclusive rights

A

Legal right that protects published work from being published or sold

Has copyright rights:

  • Reproduction rights
  • Modification rights
  • Distribution right
  • Public-performance right
  • Public-display right
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Patent and types

A

Granting property right to the inventor

Types:

  • Utility
  • Design
  • Plant
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Trademark?

A

A word, symbol, or device used in trade with goods

Used to prevent others from using a confusingly similar mark, selling the same goods under a different mark

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Digital rights Management?

A

Systems and procedures that ensure that holders of digital rights are clearly identified and receive payment for their works

How well did you know this?
1
Not at all
2
3
4
5
Perfectly