Security 2 Flashcards
1
Q
Defence in Depth
A
- ‘Defence in depth’ originated as a military strategy at the time of the Roman empire. The idea was for defensive positions to be prepared at several locations.
- We have adopted the term in cybersecurity to describe defending a system through several independent measures.
- It is more valuable to detect and respond to a breach than it is to prevent one outright because preventative measures can always be bypassed, if not directly then by trying a different route of attack.
- The weakest approach to defence in depth is to secure all parts of the system equally.
- The best approach is to identify critical assets which should be protected and build the heaviest protections around those.
- High-risk areas of the system should be separated from the main system and protected independently.
2
Q
Risk Management
A
Three key areas:
- Confidentiality: Access to systems should only be shared amongst authorised persons or organisations.
For example, credit card information should remain confidential and not accessible by unauthorised users. - Integrity: The systems should be accurate, trustworthy and complete.
- Availability: The systems should be accessible when needed.
e. g. A denial of service attack where an attacker directs so much internet traffic at a target that it can no longer function is an attack on availability.
3
Q
Stages of an Attack
A
- Reconnaissance
- Initial Exploitation
- Establish Persistence & Escalate Privileges
- Move Laterally
- Exfiltration