Wk 3 Flashcards

1
Q

Define security

A

The protection of information against being stolen or used wrongly or
illegally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Types of security (5)

A
  • Physical security: protection of physical objects belonging to the
    organisation
  • Personal security: protection of the organisation’s members of staff
  • Communications security: protection of communications media, technology and content
  • Network security: protection of networking components, connections and content
  • Information security: protection of information assets
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

define cyber security

A

the practice of protecting systems, networks, and programs from digital attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Types of cyber security (3)

A
  • Communications security: protection of communications media, technology and content
  • Network security: protection of networking components, connections and content
  • Information security: protection of information assets
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Potential motivations for attacker (4)

A

1) Just for fun / bragging rights

2) Ideological (“Hacktivists”), e.g. animal/human rights activists, ecowarriors, etc

3) Monetary gain / criminal activity:
* Ransomware attacks
* Credit card fraud
* Data theft
* Industrial espionage
* Disruption (DDoS)

4) State-sponsored attacks (cyber warfare) are also on the increase:
* Stuxnet: allegedly by USA/Israel to attack Iran’s nuclear programme
* German Bundestrojaner: malware on a suspect’s computer to spy on them
* NSA: Edward Snowden’s documents revealed spying on a massive scale
* Critical National Infrastructure is a natural target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

components of an information system (6)

A

The components of an IS are made up of:
* Hardware
* Software
* Data
* Procedures
* People
* Network/Telecommunications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

any assets we possess may… (5)

A
  • lost: accidental deletion, laptop/dossier left on train
  • damaged: fire/flood/accidents
  • tampered with: butter-fingered employee, trojan, virus, rootkit, ransomware
  • stolen: break-in, malicious insider
  • unavailable: denial of service
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what does CIA stand for

A
  • Confidentiality
  • Integrity
  • Availability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

define confidentiality

A

ensures that only those with the rights and privileges to access information are able to do so

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

define integrity

A
  • ensures that information is whole, complete and uncorrupted
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

define availability

A

enables authorised users person/computer systems) to access
information without interference or obstruction and to receive it in the
required format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what assets may require confidentiality?

A
  • passwords
  • customer details including
    credit card numbers
  • personnel files
  • trade secrets, eg your secret
    fizzy drink formula
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what assets may require integrity?

A
  • your bank balance
  • any evidence in a court case
  • contractual documents
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what assets may require availability?

A

web servers
* database servers
* network access
* emergency shutdown

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the 5 steps Bruce Schneier gives to analyse/evaluate security systems?

A
  1. What assets are you trying to protect?
  2. What are the risks to these assets?
  3. How well does the proposed security solution mitigate those risks?
  4. What other risks does the security solution cause?
  5. What costs and trade-offs does the security solution impose?
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

define asset

A

an object of value to an organisation

17
Q

define threat

A

any potential event that might have an undesirable or unwanted outcome for an organisation or for a specific asset. Threats can originate from people, organisation, systems or nature

18
Q

define vulnerability

A

A weakness in an asset or a weakness in a safeguard or countermeasure

19
Q

define impact

A

the impact on an organisation of an asset being lost or damaged (often expressed in monetary terms)

20
Q

define risk

A

a combination of: (1) the likelihood that a threat will exploit a vulnerability to cause harm to an asset and (2) its impact

21
Q

define Control/Safeguard/Countermeasure:

A

anything that removes or reduces a
vulnerability or protects against one or more threats

22
Q

CASE STUDY:

Asset:
STUDENT RECORDS

threats to confidentiality?

A
  • Unauthorised access to data
  • Inappropriate relaying of data
  • Data leakage
23
Q

CASE STUDY:

Asset:
STUDENT RECORDS

threats to integrity?

A

Data tampering

24
Q

CASE STUDY:

Asset:
STUDENT RECORDS

threats to availability?

A
  • Power outage
  • Theft/fire/flood
  • Hardware failure e.g. disk crash
  • Ransomware
  • Denial of Service
25
4 strategies to risk control
1) Avoidance/Prevention the preferred approach accomplished by countering threats, limiting asset access, removing asset vulnerabilities, and adding protective safeguards * application of policy, training & education, technology 2) Transfer the risk by: * out-sourcing, ie make it someone else's responsibility * buying insurance 3) Mitigation aims to reduce the impact of vulnerability exploitation through planning and preparation: * Incident response plan, disaster recover plan and business continuity plan 4) Acceptance - just live with it * decision that the risk is acceptable
26
What are the information Security Risk Management Frameworks (3)
National Centre for Cyber Security (NCSC) Cyber Assessment Framework National Institute of Standards and Technology (NIST) CyberSecurity Framework ISO 27000-series of standards for the management of information security risk
27
WannaCry Ransomware attack was an attack on which property?
Availability WannaCry’s main goal was to deny access to files on infected systems by encrypting them
28
confidentiality
29
integrity
30
Sellafield fined for cyber security breaches, explained why they got fined what was the potential risks?
IT systems were vulnerable to unauthorised access and loss of data Risk: - potential phishing attack/ malicious insider could trigger loss of key systems of data - disrupted operation, damaged facilities, delayed decommissioning activities
31
what was wannaCry
ransomware cyberattack 2017, ransomware encrypted files on the system and displayed message demanding payment. If payment wasn't made within timeframe would delete files permanently spread rapidly due to its ability to self-replicate across networks Availability WannaCry’s main goal was to deny access to files on infected systems by encrypting them.
32
2021 Florida hacking case study
hacker gained access to water system of a city in Florida, tried to increase amount of sodium hydroxide in water treatment system
33
34