Security Flashcards

1
Q

What are the 5 zones of the Purdue model?

A
Enterprise zone
DMZ
Operations Support
Process control
Safety
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 6 levels of the Purdue model?

A
level 5: enterprise network
level 4: business planning and logistics
level 3: operations and control
level 2: supervisory control
level 1: basic control
level 0: process
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does OCTAVE stand for?

A

Operationally Critical Threat Asset and Vulnerability Evaluation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the 4 stages of the OCTAVE model?

A

Establish drivers
Profile assets
Identify threats
Identify and mitigate risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the 8 steps of the OCTAVE model?

A
  1. establish risk measurement criteria
  2. develop information asset profile
  3. identify information asset containers
  4. identify areas of concern
  5. identify threat scenarios
  6. identify risks
  7. analyse risks
  8. mitigation approach
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

List the technical mitigations of risk?

A

Network monitoring and intrusion detection
Penetration testing
Protocol-aware firewalls
Secure by design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the two types of IDS?

A

Signature based

Detection based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does IDS stand for?

A

Intrusion Detection System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe signature based IDS

A

Only known threats are detected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe detection based IDS

A

‘Normal’ behaviour is learned and anomalies are detected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the 3 main aspects of phased application of security?

A

Secure infrastructure and assets
Deploy security applications
Policy convergence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the 2 main aspects of secure by design?

A

Devices hardened against common attack vectors in hardware

Risk-based analysis to feature inclusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the 4 principles of security?

A

Governance
Risk management
Asset management
Supply chain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is node tampering?

A

Given physical access to a node an attacker can extract sensitive information
The node may also be altered or replaced to create a compromised node which the attacker controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is node jamming?

A

Interferes with the radio frequency used by network nodes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is sleep deprivation attack?

A

Forces nodes to sense bogus packets to keep it awake and drain the battery

17
Q

What is a sinkhole attack?

A

Lures all traffic into a malicious node

18
Q

What are 5 RFID security threats?

A
RF interference
Traffic analysis
RFID spoofing
RFID cloning
Unauthorised access
19
Q

What is a man in the middle attack?

A

Data is intercepted by a malicious node

20
Q

What is a Sybil attack?

A

Malicious (Sybil) node claims the identity of several nodes in the network