Quiz1 Flashcards
L1, L2
Security Impact for the company
the important thing to understand here is that no company is safe from a breach, and many companies that we interact with on a daily basis have suffered security breaches.
security mindset, we need to consider:
• Threats (who are the bad actors?)
• Vulnerabilities (what weaknesses can they exploit?)
• Attack (how will the bad actors exploit the weaknesses?)
Athreat sourcerefers to an individual or entity that wishes to do us harm in our online lives.
An example of a vulnerability
a weak password. A threat actor can likely guess a weak password, and use that password tocompromiseyour account.
security breach
If the threat actor is able to compromise an entire digital system instead of just a single account - by gaining access to a centralized server or database,
Can we get rid of vulnerabilities compeletly
Unfortunately, vulnerabilities are very hard to get rid of completely. They are found in software, networks and, frequently, humans.
When thinking about security breaches there are different questions to ask:
• What is of value?
• What is the threat source?
• What vulnerability was exploited?
In this attack, the information of value was credit card data that was available on the point-of-sale systems present in Target stores.
The threat source was cybercriminals wishing to profit off of this information.
What Should We Do in Cyber Security?
- We can try to make threats go away. This is not an easy feat to achieve, but we can try to discourage criminal activity by introducing computer abuse laws.
- We can reduce vulnerabilities, but we are never going to have zero vulnerabilities. Complex systems are error-prone, and some of those errors will expose vulnerabilities that can be exploited.
- If the data is sensitive in the sense that it cannot be disclosed to unauthorized parties, then aconfidentialityrequirement is present.
- If no one should be able to modify or corrupt the data, the data is said to have anintegrityrequirement.
- If the data is critical in the sense that we must always have access to it - your bank account data, for instance - then the data has anavailabilityrequirement.
Integrity
If no one should be able to modify or corrupt the data, the data is said to have anintegrityrequirement.
confidentiality
If the data is sensitive in the sense that it cannot be disclosed to unauthorized parties, then aconfidentialityrequirement is present.
availability
If the data is critical in the sense that we must always have access to it - your bank account data, for instance - then the data has anavailabilityrequirement.
Data breaches violate which of the following security requirement?
confidentiality
How Do We Address Cyber Security?
- One way to reduce vulnerability is to follow design principles that are good for security.
- Economy of mechanismmeans the design of security measures built into the system should be as simple and small as possible.
- Fail-safe defaultmeans that access decisions should be explicitly granted rather than explicitly denied.
- Complete mediationsays that every access to a resource must be checked against the access controls. No access should proceed unmonitored.
- Open designmeans the design of a security mechanism - for example, encryption algorithms - should be open rather than secret. Security by obscurity is a false promise.
- Psychological acceptabilitymeans that security mechanisms should not interfere unduly with the work of users, while at the same time meet the needs of those who authorize access. Security mechanisms that excessively hinder the usability or accessibility of resources are likely to be turned off.
buffer overflow
A buffer overflow occurs when the amount of memory allocated for a piece of expected data is insufficient (too small) to hold the actual received data. As a result, the received data “runs over” into adjacent memory, often corrupting the values present there.
stack buffer overflowsare buffer overflows that exploit data in thecall stack.
call stack
During program execution, astackdata structure, known as the call stack, is maintained. The call stack is made up ofstack frames. When a function is called, a stack frame is pushed onto the stack. When the function returns, the stack frame is popped off of the stack.
The stack frame contains the allocation of memory for the local variables defined by the function and the parameters passed into the function.
function call
A function call involves a transfer of control from the calling function to the called function. Once the called function has completed its work, it needs to pass control back to the calling function. It does this by holding a reference to thereturn address, also present in the stack frame.
Stack buffer overflows
Stack buffer overflows can be exploited through normal system entry points that are called legitimately by non-malicious users of the system. By passing in carefully crafted data, however, an attacker can trigger a stack buffer overflow, and potentially gain control over the system’s execution.