ch2 Flashcards
(33 cards)
hacking
the act of deliberately accessing computer systems and networks without authorization
hackers
individuals who attempt to gain unauthorized access to computer systems or networks.
phreaking
refers to the hacking of the systems and computers used by telephone company to operate its telephone network
goal of cybersecurity has been threefold (CIA of security)
1- confidentiality: to ensure that only those individuals who have the authority to view a piece of information may do
2- integrity: generation and modification of data for authorized people only
3- availability: ensure that the data or system itself is available for use when the authorized user want it
As a result of the increased use of networks for commerce, two
additional security goals have been added to the original three in the
CIA of security:
** check p.5
1- Authentication: attempts to ensure that an individual is who they
claim to be.
2- Auditability: refers to whether a control can be verified to be
functioning properly.
The Operational Model of Computer Security (OMCS)
** check p6 if the figure important or not.
security equation:
Protection = Prevention + (Detection + Response)
Time-Based Security
protection > detection + response
NIST Cybersecurity Framework Model
- risk-based approach for the
implementation of cybersecurity activities in an enterprise. - provides a common taxonomy of standards, guidelines,
and practices that can be employed to strengthen cybersecurity efforts
NIST Cybersecurity Framework Model is composed of five core function
** check p10
1- Identify,
2- Protect,
3- Detect,
4- Respond
5- Recover.
NIST purpose is to complement and enhance risk management efforts
through the following actions:
- Determining the current cybersecurity posture
- Documenting the desired target state with respect to cybersecurity
- Determining and prioritizing improvement and corrective actions
- Measuring and monitoring progress toward goals
- Creating a communication mechanism for coordination among stakeholders
all models focus on “static” defenses that are enacted to act as a barrier to intruders except:
Active Defense Model
why focus on “static” defenses that are
enacted to act as a barrier to intruders not sufficient?
because some intruders will succeed in getting into the
enterprise.
Active defense
** check p 11
goes to the next level, the actual hunting of intruders inside
the enterprise. (respond at the same time)
The three operational tenets found in secure deployments are:
- session management
- exception management
- configuration management.
Session management
** check p13
is the set of activities employed to establish a communication
channel between two parties, identifying each in a manner that allows future activity
without renewed authentication.
Exception Management
Exceptions involve the invocation of conditions that fall outside the normal
sequence of operation. (anything up-normal)
– Exception management can also be nontechnical in nature: systems
or environments that cannot follow organizational security policy, for
example, must be documented, exceptions must be approved, and
mitigations must be put in place to lower the risk associated with
exceptions to policy.
Configuration Management
is key to the proper operation of IT
systems refers to the design and operation of the elements to ensure the proper functional environment of a system.
why we need Configuration management?
to ensure the proper functional environment of a system.
organization can take multiple approaches to address the
protection of its networks:
** check p17
1. ignore security issues
2. provide host security
3. provide network-level security,
4. provide a combination of host security & network-level
security (mature organizations use both).
Ignore Security Issues
- minimal amount of security that is provided with its workstations,
servers, and devices. - No additional security measures will be implemented.
- use default security
Host Security
focusing on protecting each computer and device individually instead of addressing protection of the network as a whole.
Network-Level Security
is placed on controlling access to
internal computers from external entities.
- This control can be through devices such as routers, firewalls,
authentication hardware and software, encryption, and intrusion
detection systems (IDSs).
Security Principles
- Least privilege
- Separation of privilege
- Fail-safe defaults
- Economy of mechanisms
- Complete mediation
- Open design
- Least common mechanism
- Psychological acceptability
- Defense in depth (layered security)
- Diversity of defense
Least privilege
Least privilege means that a subject (which may be a user, application, or process) should have only the necessary rights and privileges to perform its task, with no additional permissions.