01 Introduction Flashcards
(35 cards)
What is a threat?
A threat is any possible event or sequence of actions that might lead to a violation of one or more security goals.
What is an attack?
An attack is the actual realisation of a threat.
Which are examples of an attack?
- A hacker breaking into a computer
- Disclosure of private emails
- An unauthorized change in financial data
- A hacker shutting down a website
- Impersonation of people to order services or goods
How can security goals be defined (in which ways)?
- Depending on the application environment
- On a more general, technical way (CIA + AC)
- Confidentiality
- (Data) Integrity
- Availability
- Accountability
- Controlled Access
Name some examples of Security Goals based on the application environment.
- Banking (fraud detection, transactions identification, PIN protection, customer’s privacy)
- Government (protect sensitive information, electronic signature of documents)
- Public Telecom Providers (restrict access, prevent service interruptions, customer’s privacy)
- All networks (prevent outside penetrations).
How “Security goals” are also called? (synonym)
Security objectives.
Name some examples of Security Goals technically defined:
CIA
- Confidentiality (intended audience only, confidentiality of entities = anonymity)
- (Data) Integrity (data modification can be detected, data creators identifiable).
- Availability (services available and function correctly).
Which are additional Security Goals:
AC
- Accountability (identify the entity responsible for a communication event)
- Controlled Access (authorized entities have access to services/information).
Mention some threats Technically Defined:
MEALDFS
- Masquerade (entity claiming being another)
- Eavesdropping (entity reading unauthorized information)
- Authorization Violation (usage of service/resources not intended to be used)
- Loss / Modification of (transmitted) Information (data altered or destroyed)
- Denial of Communication Acts (repudiation, entity falsely denying participation)
- Forgery of Information (entity creating information in the name of another)
- Sabotage (actions reducing availability/correct function of services/systems).
Explain the cross-table of Threats and Technical Security Goals:

What does a Network Security Analysis perform?
- Evaluates the risk potential of the general threats to user entities.
- Estimates the expenditure (resources, time, etc.) to perform known attacks.
Can unknown attacks be assessed?
No, it is generally impossible.
What are other uses of a Network Security Analysis?
- Receive funding for security enhancements.
- Network can be better structured according to attacks on the message level.
Name the two attacking communication types on the Message Level:
- Passive attacks.
- Active attacks.
An example of a passive attack:
Eavesdropping (entity reading unauthorized information).
Mention examples of Active attacks:
DRDMI
- Delay of PDUs
- Replay of PDUs
- Deletion of PDUs
- Modification of PDUs
- Insertion of PDUs.
What are PDUs?
Protocol Data Units.
What does a successful attack launch requires?
- No detectable side effects on other communications or transmissions (connection/connectionless)
- No side effects to other PDUs of the same transmission (connection/connectionless) between same entities.
Mention some Safeguards against Information Security Threats:
- Physical Security (lock or physical access control).
- Personnel Security (identification, screening, training).
- Media Security (safe storage, reproduction and destruction of information, scanning for viruses).
- Lifecycle Controls (programming standards and documentation controls).
- Computer Security (protect devices and information while being stored/processed in computers systems).
- Communications Security (protection of information during system-to-system transport, protection of the communication infrastructure).
What are some Safeguards from Communications Security?
- Protection of information during system-to-system transport.
- Protection of the communication infrastructure itself.
What is the definition of a Security Service and its properties?
- Security Service: an abstract service seeking to ensure a specific security property. Realized with the help of algorithms and protocols and other conventional means.
What is a Cryptographic Algorithm?
A mathematical transformation of input data to output data, it can be used in cryptographic protocols.
What is a Cryptographic Protocol?
A series of steps and message exchanges between entities to achieve a specific security objective.
Mention and define some Security Services:
- Authentication (the most fundamental, verifies the identity claimed by an entity).
- Integrity (ensures that data created by entities is not modified without detection).
- Confidentiality (ensures secrecy of protected data).
- Access Control (ensures that each identity accesses only authorized or corresponding services/informations).
- Non repudiation (prevents from entities falsely denying participation in a communication exchange).

