Lectures Flashcards

1
Q

What are two key themes in the Computer Security course?

A
• Thinking about security 
  – The “security mindset”
  – Threat modelling
  – Security principles
  – Current events
• Technical aspects of security
  – Attacks
  – Defenses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are 12 categories that an attacker may be motivated by?

A
  • Access or Convenience
  • Curiosity or Boredom
  • Desire or Obsession
  • Diplomacy or Warfare
  • Malice or Revenge
  • Money
  • Politics
  • Protection
  • Religion
  • Self-Promotion
  • World View
  • Unusual
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are eight ways to brainstorm about security?

A
  • Adversary Motivations
  • Adversary Resources
  • Assets
  • Threats
  • Vulnerabilities
  • Attack Techniques
  • Risks
  • Mitigations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are eight categories of assets?

A
  • Emotional Well-being
  • Financial Well-being
  • Personal Data
  • Personal Well-being
  • Relationships
  • Societal Well-being
  • The Biosphere
  • Unusual Impacts
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are some targets of an adversary motivated by Access or Convenience?

A
  • appointment-based online enrollment systems
  • sales of limited tickets
  • personal electronics with restricted permissions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are some actions that an adversary motivated by Access or Convenience might take?

A
  • modify personal electronics
  • bypass company filtering to access personal e-mail
  • access a protected wireless network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are some targets of an adversary motivated by Curiosity or Boredom?

A
  • acquaintances
  • strangers
  • institutions
  • celebrities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are some actions that an adversary motivated by Curiosity or Boredom might take?

A
  • look up celebrity’s medical record
  • browse personal photos
  • attack a random system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are some targets of an adversary motivated by Desire or Obsession?

A
  • ex-boyfriend
  • ex-girlfriend
  • celebrities
  • children
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are some actions that an adversary motivated by Desire or Obsession might take?

A
  • harassing messages
  • sexual blackmail
  • covert webcam activation
  • monitoring communications
  • location tracking
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are some targets of an adversary motivated by Diplomacy or Warfare?

A
  • public infrastructure
  • cyber-physical
  • communication
  • emergency systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are some actions that an adversary motivated by Diplomacy or Warfare might take?

A
  • gather data
  • spread misinformation
  • track individuals
  • disable equipment
  • cause distractions
  • cause bodily harm
  • disable communications
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are some targets of an adversary motivated by Malice or Revenge?

A
  • ex-employer
  • neighbor
  • rival
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are some actions that an adversary motivated by Malice or Revenge might take?

A
  • misinformation
  • cause physical harm
  • cause monetary damage
  • cause emotional damage
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are some goals of an adversary motivated by Money?

A
  • drain assets
  • sell DoS services
  • extort organization
  • sell user data
  • sabotage competitor’s system
  • manipulate market
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are some actions that an adversary motivated by Money might take?

A
  • steal data
  • disclose data
  • misinformation
  • sabotage competitor’s system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are some goals of an adversary motivated by Politics?

A
  • alter, prevent, or invalidate votes
  • discredit political figures
  • alter the public’s understanding or impression
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are some actions that an adversary motivated by Politics might take?

A
  • DoS attack
  • steal data
  • disclose data
  • misinformation
19
Q

What are some targets of an adversary motivated by Protection?

A
  • employers
  • government
  • family
20
Q

What are some actions that an adversary motivated by Protection might take?

A
  • monitor behavior
  • evade censorship
  • preemptive attack
21
Q

What are some goals of an adversary motivated Religion?

A
  • spread information about beliefs

* discredit another group

22
Q

What are some actions that an adversary motivated by Religion might take?

A
  • disclose data
  • misinformation
  • cause physical harm
  • cause monetary damage
23
Q

What are some targets of an adversary motivated by Self-Promotion?

A
  • systems with personal information
  • prominent systems
  • challenging systems
24
Q

What are some actions that an adversary motivated by Self-Promotion might take?

A
  • change grades
  • redact information
  • deface a corporate website
  • crack an encryption scheme
25
Q

What are some issues that an adversary might be motivated by?

A
  • corporations
  • environmentalism
  • reproductive rights
  • drugs
  • violence
  • sexuality
26
Q

What are some actions that an adversary motivated by a World View might take?

A
  • DoS attack
  • disclose data
  • misinformation
  • cause physical harm
  • cause monetary damage
27
Q

What are some assets tied to a person’s Emotional Well-being?

A
  • keepsakes
  • peace of mind
  • convenience
28
Q

How might a person be harmed due to an attack on their assets tied to Emotional Well-being?

A
  • cause of fear
  • cause of anger
  • cause of loneliness
  • cause of confusion
29
Q

What are some targets tied to a person’s Financial Well-being?

A
  • electronic home-entry systems

* online bank credentials

30
Q

What are some attacks that might affect a person’s Financial Well-being?

A
  • theft
  • extortion
  • blackmail
31
Q

What are some targets tied to a person’s Personal Data?

A
  • medical records
  • embarrassing pictures
  • browsing history
32
Q

What are some ways that an attacker might use a person’s Personal Data?

A
  • perform identity theft
  • perform blackmail
  • delete financial records
33
Q

What are some targets tied to a person’s Physical Well-being?

A
  • access to food and water
  • access to electricity
  • an individual’s location
  • medical devices
  • cars
  • medication or allergy records
34
Q

What are some targets tied to a person’s Relationships?

A
  • interpersonal
  • inter-organizational
  • international
35
Q

How might a person be harmed due to an attack on their Relationships?

A
  • damage a company’s reputation

* cause unnecessary tension/arguments between relations

36
Q

What are some targets tied to a person’s Societal Well-being?

A
  • online voting systems
  • public infrastructure and cyber-physical systems
  • government record databases
37
Q

How might a person be harmed due to an attack on their Societal Well-being?

A
  • create mass hysteria
  • alter public discourse
  • cause physical harm
  • affect access to resources
38
Q

What are some targets tied to the Biosphere?

A
  • public infrastructure and cyber-physical systems

* data centers

39
Q

How might a person be harmed due to an attack on the Biosphere?

A
  • excessive resources are used up
  • water sources are polluted
  • fires are started
40
Q

Reliability deals with…
Usability deals with…
Security deals with…

A

Reliability deals with accidental failures
Usability deals with avoiding “operating mistakes”
Security deals with intentional failures created by thinking adversaries

41
Q

The approximation of risk:

Risk = ?

A

Risk = (value_of_asset) *
(likelihood_of_threat_succeeding) *
(damage to asset)

42
Q

What are threats?

A

Threats are actions by adversaries who try to exploit vulnerabilities to damage assets.

43
Q

What are three categories of security failures?

A
  • requirement bugs (incorrect/problematic goals)
  • design bugs (poor use of cryptography/source of randomness)
  • implementation bugs (buffer overflow attacks)