Security Specification & Assessment Flashcards

1
Q

What is meant by Security Specification? (Recap)

A

Meaning: A security specification is a set of guidelines that outline how to implement security measures to protect data and ensure confidentiality and integrity.

Note: In common with safety requirements specification – concern is to avoid something bad
happening.

Four Major Differences:
* Safety problems are accidental – the software is not operating in a hostile environment. In security, you must assume that attackers have knowledge of system weaknesses.

  • When safety failures occur, you can look for the root cause or weakness that led to the failure.
    When failure results from a deliberate attack, the attacker may conceal the cause of the failure.
  • Shutting down a system can avoid a safety-related failure. Causing a shut down may be the aim
    of an attack.
  • Safety-related events are not generated from an intelligent adversary. An attacker can probe
    defences over time to discover weaknesses.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security Notions (Recap)

A
  • Asset: something of value that has to be protected
  • Attack: an exploitation of a system’s vulnerability where an attacker has the goal of causing damage to one or more assets.
    • Two types: outside attack
      (external) and inside attack
      (authorised insider)
    • Exposure: possible harm or
      loss to a computing system
  • Threat: circumstances that have potential to cause harm or loss
  • Vulnerability: a weakness
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Name and describe the types of security threats?

A

Interception Threat:
- Allow an attacker to gain access
to an asset (wiretapping,
eavesdropping, etc.)

Interruption Threat:
- Allow an attacker to make the
system unavailable for
some time (denial of service
attack)

Modification Threat:
- Allow an attacker to tamper
with an asset (e.g.,
destroy or change data)

Fabrication Threat:
- Allow an attacker to insert false
information (email spoofing, log
fabrication, etc.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Name three types of control measures?

A
  • Avoidance
    • components not connected to
      the internet, data encryption
  • Detection and neutralisation
    • detect unusual patterns of
      activity
  • Exposure limitation and recovery
    • automated backup strategies
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Security and Dependability relations (Notes)

A
  • Reliability
  • Availability
  • Safety
  • Resilience (ability to resist and
    recover from damaging events, specially in the context of a cyber attack).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an Attack Tree?

A

Meaning: A diagram that represent an attacker’s goals by exploiting vulnerabilities.

Note: Are used to describe security weaknesses of a system.

Example shown in lecture week 8 slide 10.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the limitations of an Attack Tree?

A
  1. We only see the attacker’s point of view.
  2. There are no defensive measures shown in the diagram
  3. There is no attacker/defender interactions visible in the diagram.
  4. There is no evolutionary aspects involved in the attack tree.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an Attack-Defence Tree?
How does it improve on the Original Attack Tree?

A

Meaning: An attack-defence tree extends the attack tree with refined or countered defensive actions.

Note: A diagram that shows how an attacker might try to attack a system vulnerability and how a defender (system security) can protect it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Notes on Quantitative Analysis on Attack-Defence Trees

A

Of an attack-defence scenario:
* What is the minimal cost of an attack?

  • What is the expected impact of a considered attack?
  • Is special equipment required to attack?
  • How long does it take to secure a system, when the attacker has a limited budget?
  • How does the scenario change if A and D are affected by a power outage?
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the main benefit in using an Attack Defence Tree / Diagram?

A

They provide information on security metrics allowing engineers to make decisions:
where to invest their security budget, which security solution to implement.

Note: ADDs supports the analysis of various metrics and strategies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Notes on Keyless Entry in Vehicles

A

Key issues:

  • Fob and Car are constantly communicating
  • Relay attacks amplify signal from key fob to trick car into thinking the owner is nearby
  • Also some hacks can occur by directly plugging into the On board diagnostics port (used for running diagnostics on the car by the manufacturer) to hack into the car, reprogram keys, etc.
  • This is located on/underneath the car itself

Preventative Measures:
* Storing your key in a metal box
or a Faraday pouch

  • Physical preventative measures such as an anti-steering lock
  • 2FA (ensuring that another code has to be entered before the car actually starts)
  • Blocking the OBD port itself, etc.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Summary on Topic (Security Specification and Assessment)

A
  • Having ways to analyse and understand the effect of countermeasures is important in the presence of limited resources
  • Different security models have been explored in the literature to identify ways of prioritising security measures, reasoning about cost, time and the
    probability of success of an attack
  • Using strategies helps to identify what counter measures are more effective, etc
How well did you know this?
1
Not at all
2
3
4
5
Perfectly