Threat Modeling + Security Mindset Flashcards

1
Q

Slammer Worm: What is it? When did it happen? Impact?

A

Computer worm in 2003 that caused denial of service. (Slowed internet traffic around the world within 10 min). It took advantage of a vulnerability/bug from Microsoft SQL Server using a buffer overflow. Mainly for bragging rights.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How have the motivations for cybercrime evolved (3 main areas)? What are some examples?

A

1990s-Early 200s: Bragging rights
Mid 2000s- Today: financially motivated (credit card theft, phishing, identity theft)
2010s: Politically motivated (like espionage, censorship, surveillance, hacktivism)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the 6 properties we want for security (listed)? (CIAx4)

A

Confidentiality, Integrity, Availability, Authorization, Authentication, Accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Security Property: Confidentiality

A

Ensuring that sensitive information is kept** private**

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Security Property: Integrity

A

Ensuring that information has not been tampered with or secretly modified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Security Property: Availability

A

Information is readily accessible when we need it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Security Property: Authorization

A

The correct, authorized entities are accessing the information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Security Property: Authentication

A

Ensuring that information is correct and genuine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Security Property: Accountability

A

We are responsible for past actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What the steps of threat modeling? (5 steps)

A

Step 1: Define assets to protect
Step 2: Come up with security policies
Step 3: Diagram of the System
Step 4: Adversary Modeling (scope out capabilities of what attackers are going to be doing)
Step 5: Threat Modeling (STRIDE, attack trees)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In the context of threat modeling, what are assets?

A

The stuff we are aiming to protect: information/data, software, hardware, communciation services, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Threat Modeling: Policies

A

Common approach: 1) come up with a main functional goal 2) define security policies that will support this goal 3) can categorize these through security properties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does STRIDE stand for?

A

Spoofing, Tampering, Repudiation, Information disclosure, Denial of Service, Escalation of privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Spoofing? Provide an example, and what security property (s) does it violate

A

Violates authenticity and authorization. When someone falsely impersonates something/someone else. Example: IP Address spoofing when someone modifies their IP address to bypass authentication proceedures (making it seem like they are coming from a trusted/legitimate souce)

17
Q

What is Tampering? What security property does it violate? Give an example.

A

Violates integrity. Data/code/information is unauthorizidly modified. Ex: without the correct permissions, modifying data

18
Q

What is Repudiation? What security policy does it violate? Give an example

A

Violates accountability. Denying responsibility for past actions. Ex: After modifying data, denying its modifications

19
Q

What is Information Disclosure? What Security property does it violate? Give an example

A

Violates confidentiality. The unauthorized disclosure of sensitive information. Ex: Phishing attack to get a user to click on a malicious link to reveal sensitive information (passwords, credit card number, SNN etc)

20
Q

What is Denial of Service? What security property does it violate? Give an example

A

Violates availability. Impacts availability of resources or services via malicious actions that can cause errors or consume resources. Ex: Slammer worm of 2003 was a denial of service attack that caused major lack of availability on the internet

21
Q

What is Escalation of Privilege? What security property does it violate? Give an example.

A

Violates Authentication/Authorization. When a user obtains greater privileges to resources. Ex: TOCTOU (time of check, time of use) attack. In between when the file is being checked for permissions, the attacker gains access to it before (privilege escalation) while previously they didn’t have that access