ch2 Flashcards

(33 cards)

1
Q

hacking

A

the act of deliberately accessing computer systems and networks without authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

hackers

A

individuals who attempt to gain unauthorized access to computer systems or networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

phreaking

A

refers to the hacking of the systems and computers used by telephone company to operate its telephone network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

goal of cybersecurity has been threefold (CIA of security)

A

1- confidentiality: to ensure that only those individuals who have the authority to view a piece of information may do
2- integrity: generation and modification of data for authorized people only
3- availability: ensure that the data or system itself is available for use when the authorized user want it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

As a result of the increased use of networks for commerce, two
additional security goals have been added to the original three in the
CIA of security:

A

** check p.5
1- Authentication: attempts to ensure that an individual is who they
claim to be.
2- Auditability: refers to whether a control can be verified to be
functioning properly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The Operational Model of Computer Security (OMCS)

A

** check p6 if the figure important or not.
security equation:
Protection = Prevention + (Detection + Response)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Time-Based Security

A

protection > detection + response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

NIST Cybersecurity Framework Model

A
  • risk-based approach for the
    implementation of cybersecurity activities in an enterprise.
  • provides a common taxonomy of standards, guidelines,
    and practices that can be employed to strengthen cybersecurity efforts
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

NIST Cybersecurity Framework Model is composed of five core function

A

** check p10
1- Identify,
2- Protect,
3- Detect,
4- Respond
5- Recover.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

NIST purpose is to complement and enhance risk management efforts
through the following actions:

A
  1. Determining the current cybersecurity posture
  2. Documenting the desired target state with respect to cybersecurity
  3. Determining and prioritizing improvement and corrective actions
  4. Measuring and monitoring progress toward goals
  5. Creating a communication mechanism for coordination among stakeholders
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

all models focus on “static” defenses that are enacted to act as a barrier to intruders except:

A

Active Defense Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

why focus on “static” defenses that are
enacted to act as a barrier to intruders not sufficient?

A

because some intruders will succeed in getting into the
enterprise.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Active defense

A

** check p 11
goes to the next level, the actual hunting of intruders inside
the enterprise. (respond at the same time)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The three operational tenets found in secure deployments are:

A
  1. session management
  2. exception management
  3. configuration management.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Session management

A

** check p13
is the set of activities employed to establish a communication
channel between two parties, identifying each in a manner that allows future activity
without renewed authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Exception Management

A

Exceptions involve the invocation of conditions that fall outside the normal
sequence of operation. (anything up-normal)
– Exception management can also be nontechnical in nature: systems
or environments that cannot follow organizational security policy, for
example, must be documented, exceptions must be approved, and
mitigations must be put in place to lower the risk associated with
exceptions to policy.

17
Q

Configuration Management

A

is key to the proper operation of IT
systems refers to the design and operation of the elements to ensure the proper functional environment of a system.

18
Q

why we need Configuration management?

A

to ensure the proper functional environment of a system.

19
Q

organization can take multiple approaches to address the
protection of its networks:

A

** check p17
1. ignore security issues
2. provide host security
3. provide network-level security,
4. provide a combination of host security & network-level
security (mature organizations use both).

20
Q

Ignore Security Issues

A
  • minimal amount of security that is provided with its workstations,
    servers, and devices.
  • No additional security measures will be implemented.
  • use default security
21
Q

Host Security

A

focusing on protecting each computer and device individually instead of addressing protection of the network as a whole.

22
Q

Network-Level Security

A

is placed on controlling access to
internal computers from external entities.
- This control can be through devices such as routers, firewalls,
authentication hardware and software, encryption, and intrusion
detection systems (IDSs).

23
Q

Security Principles

A
  1. Least privilege
  2. Separation of privilege
  3. Fail-safe defaults
  4. Economy of mechanisms
  5. Complete mediation
  6. Open design
  7. Least common mechanism
  8. Psychological acceptability
  9. Defense in depth (layered security)
  10. Diversity of defense
24
Q

Least privilege

A

Least privilege means that a subject (which may be a user, application, or process) should have only the necessary rights and privileges to perform its task, with no additional permissions.

25
Separation of privilege
The principle of separation of privilege states that the protection mechanism should be constructed so that it uses more than one piece of information to make access decisions. ▪ Applying this principle to the people side, results in the concept of separation of duties.
26
Fail-safe defaults
The concept of fail-safe defaults is that when something fails, it should do so to a safe state. ▪ This protection mechanism should deny access by default and should grant access only when explicit permission exists. This is sometimes called default deny, and the common operational term for this approach is implicit deny.
27
Economy of mechanisms
The principle of economy of mechanism is described as always using simple solutions when available
28
Complete mediation
The principle of complete mediation states that protection mechanisms should cover every access to every object and should never be bypassed
29
Open design
The principle of open design states that protection mechanisms should not depend on the secrecy of the mechanism itself.
30
Least common mechanism
The principle of least common mechanism states that the protection mechanisms should be shared to the least degree possible among users
31
Psychological acceptability
The principle of psychological acceptability states that protection mechanisms should not impact users, but if they do, the impact should be minimal.
32
Defense in depth (layered security)
The principle of defense in depth, or layered security, is that multiple layers of differing, overlapping controls should be employed
33
Diversity of defense
Diversity of defense is a concept that complements the idea of various layers of security. It means to make the layers dissimilar so that if one layer is penetrated, the next layer can’t also be penetrated using the same method.