P1L1: Security Mindset Flashcards
What is of value that you are trying to protect from attackers?
data
What are the 2 kinds of companies?
- Companies that have been hacked and know it
2. Companies that have been hacked and DON’T know it.
What threat sources are there to worry about?
Cyber criminals
Hacktivists
Nation States
Where are the vulnerabilities?
software
networks
humans
What are the C.I.A. in the CIA model?
Confidentiality
Integrity
Availability
Cyber attacks can have ________ consequences?
physical
What should the good guys do in a security conscious world?
Prevention Detection Response Recovery and remediation policy vs mechanism
How does one go about reducing vulnerabilities?
Economy of mechanism–keep systems small and simple
Fail-safe defaults–means default access is denied
Complete mediation–no one should be able to bypass security measures
Open design–no secrecy
Least privilege–minimum level of access needed
Psychological acceptability–don’t expect people to do what is inconvenient
What is Economy of mechanism?
Keep systems small and simple
Fail-safe defaults means what?
means default access is denied
Wat is Complete Mediation?
no one should be able to bypass security measures
What does open design mean?
open design–no secrecy
What is Least privilege?
providing the minimum level of access needed
What is Psychological acceptability?
don’t expect people to do what is inconvenient
Computer security is protection of the integrity, availability and confidentiality of information system resources. T/F
True
Computer security is essentially a battle of wits between a perpetrator who tries to find holes and the administrator who tries to close them. T/F
True
Many security administrators view strong security as an impediment to efficient and user-friendly operation of an information system. T/F
True
The first step in devising security services and mechanisms is to develop a security policy. T/F
True
_____ assures that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system.
System Integrity
A flaw or weakness in a system’s design, implementation, or operation and management that could be exploited to violate the system’s security policy is a(n) _____.
Vulnerability
A(n) _____ is an attempt to learn or make use of information from the system that does not affect system resources.
passive attack
Masquerade, falsification and repudiation are threat actions that cause _____ threat consequences.
deception
The _____ prevents or inhibits the normal use or management of communication facilities.
denial of service
The assurance that data received is exactly as sent by an authorized entity is _____.
data integrity
Confidentiality, Integrity and Availability form what is often referred to as the _______
CIA triad
A(n) ______ is a threat that is carried out and, if successful, leads to an undesirable violation of security or threat consequence.
attack
Misappropriation and misuse are attacks that result in ______ threat consequences.
usurpation
Release of message contents and traffic analysis are two types of ______ attacks.
passive
Security implementation involves four complementary courses of action: prevention, detection, response and _____.
recovery
Cybercriminals
Want to profit from sensitive information
Hacktivists
Don’t like you or something do
Nation-states
China and North Korea
Confidentiality
Data confidentiality: private information not disclosed to outsiders
Privacy: Individuals control information related to them
Integrity
Data integrity: Information only changed in an authorized manner
System integrity: System is performing as intended
Availability
Service not denied and not slow
what is an active attack?
attempt to alter resources or affect operation
What is a Passive attack?
Attempt to learn from system that does not affect resources
What is a threat agent?
person carrying out attack
Deception
Masquerade
Falsification: false data deceive an authorized entity
Repudiation: Falsely denying responsibility for an act
Disruption
Incapacitation: disables system component
Corruption: alters system operation
Obstruction: interrupts delivery of system services
Usurpation
Misappropriation: Gets unauthorized system resources
Misuse: Cause system to perform function detrimental to security