Unit 2 - Introduction to Computer Security Flashcards
What is computer security?
Computer security is the protection of the items that a subject values, called the assets ofa computer or computer systems.
Assets: hardware, software,data,people,processes,reputation,…: their value is subjective:based on the asset owner’s or user’s perspective.
Another definition: Computer security deals with the prevention and detection of unauthorizedaccess by users of a computer system.
What are the three different types of security violations?
In 1972 James Anderson identified three different types of security violation in computer systems:
- unauthorised information release;
- unauthorised information modification;
- unauthorised denial of use
What is a security policy?
A statement that defines the security objectives of an organization; it has to state what needs to be protected; it may also indicate how this is to be done.
Why might security violations occur?
Security violations mightoccur because of:
- inadequate physical controls (enabling an attacker to gain physical access to the target system);
- inadequate controls within the computer system (enabling an attacker to make unauthorised access to information stored and processed within the system, as well as to the system itself).
What is a bug?
A software bug is an error, flaw, failure or fault in a computer program or system that causes it to produce an incorrect or unexpected result, or to behave in unintended ways.
Examples: mistakes and errors in a program’s source code, its design, in components,and operating systems
The term “bug” was used in an account by Grace Hopper, who publicized the cause of a malfunction in an early electromechanical computer.
“In 1946, when Hopper was released from active duty, she joined the Harvard Faculty at the Computation Laboratory where she continued her work on the Mark II and Mark III. Operators traced an error in the Mark II to a moth trapped in a relay, coining the term bug. This bug was carefully removed and taped to the log book. Stemming from the first bug,today we call errors or glitches in a program a bug.”
What is a vulnerability?
Avulnerability is a flaw in the design or implementation of a computer system that could lead to a security violation.
Examples of vulnerabilities include:
- program bugs, i.e. errors in programs (including both design errors and implementation errors);
- misuse of program features, i.e. features designed for a valid purpose but which can be misused;
- configuration errors;
- poor choices for passwords;
- flawed management of passwords.
A vulnerability represents a threat to the security of a system.
What is the lifecycle of a vulnerability?
A vulnerability life goes through several phases:
- Discovery-time: the time of the discovery of the vulnerability, and recognized to pose a security threat.
- Exploit-time: the earliest date an exploit for a vulnerability is available.
- Disclosure-time: first date a vulnerability is disclosed on a channel, which is freely available,trusted,and it has undergone a deep analysis.
- Patch-time: the earliest date the vendor/developer releases a fix, a patch or a workaround that provides protection for the vulnerability.
What is a zero-day vulnerability?
A zero-day vulnerability (0-day vulnerability) is an undisclosed computer-software vulnerability that attackers can exploit to adversely affect computer programs, data, additional computers or a network. It is known as a “zero-day” because it is not publicly reported or announced before becoming active, leaving the software’s author with zero days in which to create patches or advise workarounds to mitigate against its actions. Zero-day attacks can occur because a vulnerability window exists between the time a threat is released and the time security vendors release patches.Zero-day attacks are a severe threat.
Where can you find a list of known vulnerabilities?
Common Vulnerabilities and Exposures (CVE) - Database of known security vulnerabilities and exposures
What is CVSS?
Common Vulnerability Scoring System (CVSS) - Standard measurement system to score vulnerability impact
What is exposure?
An information security “exposure” is a system configuration issue or a mistake in software that allows access to information or capabilities that can be used by a hacker as a stepping-stone into a system or network. CVE considers a configuration issue or a mistake an exposure if it does not directly allow compromise but could be an important component of a successful attack, and is a violation of a reasonable security policy. An “exposure” describes a state in a computing system (or set of systems) that is not a vulnerability, but either:
- allows an attacker to conduct information gathering activities
- allows an attacker to hide activities
- includes a capability that behaves as expected, but can be easily compromised
- is a primary point of entry that an attacker may attempt to use to gain access to the system or data
- is considered a problem according to some reasonable security policy
What are some examples of exposures?
Examples of exposures include:
- running services such as finger (useful for information gathering, though it works as advertised)
- inappropriate settings for Windows NT auditing policies (where “inappropriate” is enterprise-specific)
- running services that are common attack points (e.g., HTTP, FTP, or SMTP)
- use of applications or services that can be successfully attacked by brute force methods (e.g., use of trivially broken encryption,or a small key space).
What are the three metrics CVSS is composed of?
- Base: represents the intrinsic and fundamental characteristics of a vulnerability that are constantover time and user environments.
- Temporal: represents the characteristics of a vulnerability that change over time but not among user environments.
- Environmental: represents the characteristics of a vulnerability that are relevant and unique to a particular user’s environment.
What are some other vulnerability scoring systems?
ERT/CC produces a numeric score ranging from 0 to 180 but considers such factors as whether the Internet infrastructure is at risk and what sort of preconditions are required to exploitthe vulnerability.
The SANS vulnerability analysis scale considers whether the weakness is found in default configurations or clientor server systems.
Microsoft’s proprietary scoring system tries to reflect the difficulty of exploitation and the overall impactofthe vulnerability
What is the CVSS vector?
When the base metrics are assigned values, the base equation calculates a score ranging from 0 to 10,and a vector is created.
The vector facilitates the “open” nature of the framework. It is a text string that contains the values assigned to each metric, and it is used to communicate exactly how the score for each vulnerability is derived.
What is the latest version of CVSS and what did it include?
The new version is CVSS v3.0.
New metrics such as Scope (S) and User Interaction (UI) were added including old metrics such as Authentication (Au) being changed to newer ones such as Privileges Required(PR).
The Environmental Metrics group also saw an new addition with the Modified Base Metrics, allowing analysts to customize CVSS scores based on the host that has been affected in the analyst’s organisation,making it contextual when required to be
What is a threat?
A threat to a computing system is a set of circumstances that has the potential to cause loss or harm.
In computer security a threat is a possible danger that might exploit a vulnerability to breach security and therefore cause possible harm.
A threat can be either “intentional” (e.g., an individual cracker or a criminal organization) or “accidental” (e.g., the possibility of a computer malfunctioning, or natural disasters, such as an earthquake,a fire, or a tornado).
What must an attacker know in order to exploit a vulnerability?
A vulnerability might be exploited by an attacker to create a security violation. In order to exploitthe vulnerability:
- the attacker must know about the vulnerability:
- for example, if an attacker doesn’t know of the existence of a potential buffer over-run in a program, then the attacker cannot exploit this vulnerability;
- the attacker must be able to exploitthe vulnerability:
- if the computer system can detect buffer over-runs at run-time, then a buffer over-run vulnerability cannotbe exploited.
Where can attacks come from and which pose the biggest threat?
When we discuss security, we will often refer to attackers, i.e. active opponents of system security.
There are, of course, many types of attacker, each of which poses different threats. It is important to be aware of possible attacks from both insiders (individuals with legitimate access to parts of system) and outsiders (other parties).
Insider attacks are a huge threat in practice,and are difficultto defend against
What are the phases of an attack?
- Reconnaissance: Intruder selects target, researches it, and attempts to identify vulnerabilities in the target network.
- Weaponization: Intruder creates remote access malware weapon, such as a virus or worm, tailored to one or more vulnerabilities.
- Delivery: Intruder transmits weapon to target (e.g., via e-mail attachments, websites or USBdrives)
- Exploitation: Malware weapon’s program code triggers, which takes action on target network to exploit vulnerability.
- Installation: Malware weapon installs access point (e.g., “backdoor”) usable by intruder.
- Command and Control: Malware enables intruder to have “hands on the keyboard” persistent access to target network.
- Actions on Objective: Intruder takes action to achieve their goals, such as data exfiltration,data destruction,or encryption for ransom.
What is STRIDE?
STRIDE is a system developed by Microsoft for thinking about computer security threats. It provides a mnemonic for security threats in six categories.
Spoofing: an agent pretends to be somebody else (e.g., to avoid responsibility or misuse authority).
Tampering: violates the integrity of an asset (e.g., security settings are changed).
Repudiation: an agent denies having performedan action to escape responsibility.
Information disclosure: violates the confidentiality of an asset.
Denial of service: violates the availability ofan asset.
Elevation of privileges: an agent gains more privileges beyond its entitlement
What is DREAD?
DREAD is part of a system for risk-assessing threats that provides a mnemonic for risk rating using five categories:
Damage - how bad would an attack be?
Reproducibility - how easy is it to reproduce the attack?
Exploitability - how much work is it to launch the attack?
Affected users - how many people will be impacted?
Discoverability - how easy is it to discover the threat?
E.g. (damage): If a threat exploitoccurs,how much damage will be caused? 0 = Nothing 5 = Individual user data is compromised or affected. 10 = Complete system or data destruction
Risk_DREAD = (DAMAGE + REPRODUCIBILITY + EXPLOITABILITY + AFFECTED USERS+ DISCOVERABILITY)/ 5