Security Basics - Topic 2 Flashcards

1
Q

Motivation, targets, methods: Information Warfare

A

Motivation:
Military or political dominance

Targets:
Critical infrastructure, political and military assets

Methods:
Attack, corrupt, exploit, deny, conjoint with a physical attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Motivation, targets, methods: Information Warfare

A

Motivation:
Military or political dominance

Targets:
Governments, companies, individuals

Methods:
Advanced persistent threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Motivation, targets, methods: Cyber Crime

A

Motivation:
Economic Gain

Targets:
Governments, companies, individuals

Methods:
Fraud, ID theft, Extortion, Exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Motivation, targets, methods: Cracking

A

Motivation:
Ego, personal enmity

Targets:
Governments, companies, individuals

Methods:
Attack, Exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Motivation, targets, methods: Hacktivism

A

Motivation:
Political change

Targets:
Governments, Companies

Methods:
Attack, defacing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Motivation, targets, methods: Cyber Terror

A

Motivation:
Political change

Targets:
Individuals, Companies

Methods:
Marketing, command and control, computer-based violence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does CIA stand for?

A

Threats in a generic context (Confidentiality, Integrity and Availability)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is disclosure?

A

Threats to confidentiality.

Snooping, sniffing (data in transit)
Unauthorised access (systems, data at rest)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is deception?

A

Fraud and forgeries; threats to integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is deception?

A

Fraud and forgeries; threats to integrity

Spoofing (Identity theft)
Unauthorised data modification
Replay (intercept and retransmit)
Repudiation (false denial) of origin, repudiation of receipt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is disruption?

A

Threat to availability

Modification, delay, Denial of Service (DoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the three types of Integrity / Authenticity / Authentication (making sure data is authentic)?

A

Entity integrity (entity indeed has the claimed identity)

Content Integrity (any unauthorised modification and replay of data can be detected)

Origin Integrity (data is indeed from the claimed source)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is freshness?

A

Ensuring data is not a replay/retransmission of ‘old’ data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is non-reupdiation?

A

Protecting against repudiation (false denial)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is fairness?

A

Either all the parties have received what they expect to receive or none of them receives anything useful

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the three main steps of the achieving security life-cycle

A

Define your security goal and threat analysis: Identify what to protect against and specify security policy

Design and implement security measures: decide how to protect so as to achieve your goal.

Security assurance (operation, monitoring and maintenance): to assess how well the implementation has achieved the goal

17
Q

Methods for defining the security goal

A

Threat analysis: identify and decide what to protect against.

Policy/requirement specification: to define what is, and/or is not, allowed.

18
Q

What is threat analysis?

A

Identify assets, threats and vulnerabilities: to find out what are the most likely avenues in which an attack will succeed at a relatively low cost to the attacker.

Not all threats are worth defeating (cost vs benefit)

Typically carried out with an attack tree analysis method

19
Q

What is the attack tree analysis method?

A

A conceptual diagram showing how an asset, or target, might be attacked.

Consists of one root node, child nodes and leaf nodes

The root is representative of the attack goal

Child and leaf nodes are conditions under which, or ways/methods by which, one may obtain the goal. If a method in turn requires other intermediate steps, then under each of these child nodes, branch off as appropriate.

Relationship branches may be ‘OR’ or ‘AND’
‘OR’ represents alternative attack methods to succeed in the attack
‘AND’ represents multiple steps required to launch the attack

Each node may be given a value to indicate:
- Likelihood that an attacker will mount the attack, or probability of succeeding the attack
- Cost in succeeding the attack, in terms of monetary cost, or time taken to accomplish the attack etc…

Once done any path from a leaf node to the goal is a potential attack marked with likelihood, or cost…

20
Q

What are detective measures?

A

Measures taken during or after the attacks, e.g. logging/auditing, intrusion detection systems (host-based, network-based, hybrid, …)

21
Q

What is response and recovery in the design and implementation phase of the achieving security life cycle?

A

Measures to repair any damage so that the system can continue to function correctly even if an attack succeeds, .e.g. backup.

22
Q

What is cost-benefit analysis?

A

Is it cheaper to prevent (using security mechanisms) or recover (e.g. using restoration from backup) or just ignore?

23
Q

What is security assurance?

A

To assess how well the implementation has achieved the goal

Testing to assess the correct implementation of policies

Formal evaluation of the implementation.

24
Q

Name some security assurance standards

A

US Security Evaluation Criteria (the Orange book)

European ITSEC (Information Technology Security Evaluation Criteria)

25
Q

Name some human cybersecurity issues

A

Organisational issues: power and responsibility, financial benefits

People problems: outsiders and insiders, social engineering

26
Q

What happens if security is put in as an after-thought instead of at the beginning?

A

The system is usually not secure and more expensive.