Midterm Review Flashcards
Vulnerability
System weakness vulnerable to a threat
Categories of vulnerabilities
- Corruption (Integrity)
- Leakiness (Confidentiality)
- Unavailability or very slow responsiveness (Availability)
CIA Triad
- Confidentiality
- Integrity
- Availability
Confidentiality
- Keeping data and resources hidden
- “Need to know”, personnel records, trade secrets
- Often, organizations want to protect system configuration and network topology info (resources) as well
Integrity
- Data integrity (trustworthiness) - data protected against unauthorized change
- Origin integrity (authentication)
- Mechanisms fall into two classes
- Prevention
- Detection
Availability
- Ability to use data and resources
- Denial of service attacks are designed to prevent access
Prevention
- Prevent attackers from violating security policy
- Typically done by employing mechanisms users cannot override
- Mechanisms can be cumbersome for users
Detection
- Detect attackers’ violation of security policy
- Also an indicator of the effectiveness of prevention mechanisms
Recovery
- Stop attack, assess and repair damage
- Continue to function correctly even if the attack succeeds
- Difficult to implement
- Typically only used in safety-critical systems
Security Policy
A formal statement of rules and practices that specify or regulate how a system or organization provides security services to protect sensitive and critical system resources
Security Implementation
- Prevention
- Detection
- Response
- Recovery
Assurance
The degree of confidence one has that the security measures, both technical and operational, work as intended to protect the system and the information it processes
Evaluation
Process of examining a computer product or system with respect to certain criteria
The ideal solution to malware
Prevention
Main elements of prevention
- Policy
- Awareness
- Vulnerability
- Threat mitigation
If prevention fails, what mechanisms can be used to mitigate the threat?
- Detection
- Identification
- Removal
Worm defense approaches
- Signature-based worm scan filtering
- Filter-based worm containment
- Payload-classification-based worm containment
- Threshold random walk (TRW) scan detection
- Rate limiting
- Rate halting
Policy
Says what is and is not allowed. Defines security for the site/system/etc.
Security Mechanisms
Enforces policy
Virus
Piece of software that infects programs
Virus Actions
- Modifies them to include a copy of the virus
- Replicates and goes on to infect other content
- Easily spread through network environments
Virus Components
- Infection mechanism
- Trigger
- Payload
Infection Mechanism
- Means by which a virus spreads or propagates
- Also referred to as the infection vector
Trigger
- Event or condition that determines when the payload is activated or delivered
- Sometimes known as a logic bomb
Payload
- What the virus does (besides spreading)
- May involve damage or benign but noticeable activity
Virus Phases
- Dormant phase
- Triggering phase
- Propagation phase
- Execution phase
Dormant Phase
- Virus is idle
- Will eventually be activated by some event
- Not all viruses have this stage
Triggering Phase
- Virus is activated to perform the function for which it was intended
- Can be caused by a variety of system events
Propagation Phase
- Virus places a copy of itself into other programs or into certain system areas on the disk
- May not be identical to the propagation version
- Each infected program will now contain a clone of the virus which will itself enter a propagation phase
Execution Phase
- Function is performed
- May be harmless or damaging
Virus Classifications
- Classification by target
- Classification by concealment strategy