Week 3 Flashcards

1
Q

What can systems be decomposed into?

A

1) elements - e.g. a football team - the elements are the team, the manager, the spectators etc.
2) interconnections - in the football team, the interconnections are the strategy, the rules of the game.
3) purpose - difficult to determine for any given system. Depending on the perspective, system purpose could be different from what the individuals has documented.

as well as hierarchies of subsystems. Eg the Target case with Firos. If the subsystems feel as though the higher ups aren’t servicing them, it can lead to disintegration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a system?

A

Its a set of things, people, cells, molecules etc that are interconnected in such a way that they produce their own pattern of behaviour over time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is operation cat drop?

A

The mosquito example in 1945-1960.
WHO want to control the spread of malaria in Borneo. WHO wanted to spray DDT in people’s homes.
Over a 21 month period, the percentage of mosquitos carrying malaria dropped from 36% to 2% by spraying DDT.
But then people started suffering from rat bites and their homes falling down.
The reason for this was a particular type of caterpillar started to eat through homes that were not covered in DDT. Previously, wasps were controlling the caterpillar population. But wasps started being killed off my DDT, so weren’t able to control the caterpillars anymore. There was a knock on effect on the food chain where rats started thriving (particularly due to cats being killed off). Cats ended up being dropped into Borneo to deal with the rat issue.

This signifies the dangers of implementing solutions (i.e. DDT) without fully understanding what it would do.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What was the story of mosquitos in Brazil?

A

Mosquitos in Brazil either feed off of humans or cattle. Focus was on the population of mosquitos that fed off humans which led to a 68% increase in population. Now we have a knock on effect of larger population.

One problem is resolved, but other problems arise.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are stabilising feedback loops?

A

Stabilising feedback loops are goal-seeking loops, resistant to change, seek to balance elements.
Reinforcing feedback loops emphasise the direction of change.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the limitations of systems thinking?

A

People intensive systems are hard to decompose and understand.
Human elements are difficult to model and fully understand.
We may think a system is failing, but it is succeeding in ways we do not perceive or understand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is cyber space?

A

The complex environment resulting from the interaction of people, software, and services on the Internet by means of technology devices and networks connected to it, which does not exist in any physical form.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an example of cyber space?

A

The internet. Cyber space and the internet are not interchangeable though. In the UK/EU they are though.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a cyber system?

A

Cyber systems are dependent or make use of a cyber space. Cyber systems are often referred to as critical infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are cyber physical systems?

A

They are specific cyber systems that control and react to the physical environment. e.g. distributions of clothes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does cyber security tie in with cyber systems and cyber threats?

A

cyber security is the defence of cyber systems from cyber threats. Cyber threats can be thought of as any threat that makes use of a cyber space.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is information security?

A

Information security is concerned with the protection of information assets. It is the preservation of confidentiality, integrity and availability of info.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Critical Infrastructure Protection (CIP)?

A

Safeguarding infrastructure crucial to modern society from interruption and destruction. Critical Infrastructure goes beyond cyber.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is safety?

A

Safety can be defined as being free from unacceptable risk to human life, injury or damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is safety?

A

Safety can be defined as being free from unacceptable risk to human life, injury or damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is risk?

A

The possibility that human actions or events leads to consequences that have an impact on human value.

These are the union of malicious and non-malicious risk.

17
Q

What is risk assessment?

A

Taking concerns and start to gather evidence and data to the things we care about. Then we have to focus on certain ones that we deem the most critical.

1) observations and perceptions
2) reasoning and evidence
3) prioritise and rank

18
Q

What are the important stages in risk assessment?

A

1) context - appreciating the environment (is it a university, power plant, who are their stakeholders etc etc ).
2) identification - trying to gather all the potential concerns
3) analysis - really looking at the concerns that have been identified. Strengthen them with evidence or discard.
4) evaluation - if some risks are similar or we can aggregate any.
5) treatment - what are we going to do to mitigate against this risk. Technical tools/technical infrastructure.

19
Q

What are the key points for the “Context” stage in risk assessment?

A

We need to consider:

  • the external context eg national laws, critical infrastructure.
  • the internal context - the factors that influence how an organisation manages risk and attains objectives. This could be the staff, stakeholders, customers.
  • the attack surface
  • the target of assessment
20
Q

What are the aims of a risk assessment?

A

To mitigate against risk and reduce the likelihood of undesirable incidents. Comply with legal requirements. Communicate to several internal and external stakeholders about risk.

21
Q

Why would we want to limit scope?

A

Improves communications between various individuals if we have a clear documentation of scope, focus and assumptions

22
Q

What is a risk matrix used for?

A

Displaying the consequence versus likelihood of an event. We have to define the value explicitly, e.g. “rare” is less than 20 years etc.

23
Q

What is the attack surface?

A

There could be a remote or a physical attack

24
Q

what are the key points for the “identification” stage in the risk assessment?

A

Think of it in terms of malicious/non-malicious attacks.
Think in terms of technical systems and non-technical elements (gathering articles, newspapers etc). It’s not about determining the likelihood of risks at this stage; it’s just about getting more info and tailoring it to what we’re interested in.

25
Q

How do we identify malicious threats?

A

Identify where the threats are coming from.
Understand the potential threats the adversaries represent and the attack surface.
focus on the assets to determine vulnerabilities.
Predict potential incidents stemming.

1) source - who is going to initiate an attack and why.
2) threat
3) vulnerabilities
4) incident - what incidents stem from these threats.

26
Q

How do we identify non-malicious threats?

A

The opposite of malicious threats.

1) incident
2) vulnerabilities
3) threat
4) source

27
Q

What do we do in the “analysis” phase of risk assessment?

A

Assess the threat, likelihood, estimate

Incident, asset, likelihood, consequence.