Cyber Security Flashcards

1
Q

What is Information Security?

A

Information security is the preservation of confidentiality, integrity and availability of information.

  • Confidentiality:
  • The property that information is not disclosed to unauthorised individuals, entities or processes
  • Integrity:
  • The property of safeguarding the accuracy and completeness of assets
  • Availability:
  • The property of being accessible and usable upon demand by an authorised entity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Asset

A

Anything that has value to the organisation, its business operations and its continuity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Threat

A

A potential cause of an incident that may result in harm to a system or organisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Vulnerability

A

A weakness of an asset or group of assets that can be exploited by one or more threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Impact

A

The result of an information security incident, caused by a threat, which affects assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Risk

A

The potential that a given threat will exploit vulnerabilities of an asset or group of assets and thereby cause harm to the organisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Information Security definitions and terminology:

A

. Preservation of confidentiality, integrity and availability of information.
* Assets; Threats; Vulnerabilities; Impacts; Risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Information System assets:

A
  • Primary assets: Business processes & activities; Information.
  • Supporting assets: Hardware; Software; Network; Personnel; Site; Organisation’s structure.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Information Security Governance

A

Information Security Governance refers to the framework, policies, procedures, and processes that an organization implements to manage and oversee its information security efforts effectively. It involves establishing structures and mechanisms to ensure that information assets are protected in line with the organization’s goals, objectives, and risk tolerance.

  • How organisations control, direct communicate their cybersecurity risk management activities
  • Policies, Standards, Guidelines and Procedures
  • Security, Education, Training and Awareness (SETA)
  • Incident Response
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Assets

A
  • Primary assets:
    * Business processes & activities
    * Information
  • Supporting assets
    (on which the primary assets rely)
    • Hardware
    • Software
    • Network
    • Personnel
    • Site
    • Organization’s structure

Each component has its own strengths and weaknesses, and each has its own security requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Information

A
  • Business critical information for the exercise of the organisation’s mission
  • Personal information, as can be defined specifically in the sense of the national laws regarding privacy
  • Strategic information required for achieving objectives determined by the strategic orientations
  • High-cost information whose gathering, storage, processing and transmission require a long time and/or involve a high acquisition cost
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Business Processes

A
  • Processes that contain secret processes or processes involving proprietary technology
  • Processes that, if modified, can greatly affect the accomplishment of the organisation’s mission
  • Processes that are necessary for the organisation to comply with contractual, legal or regulatory requirements
  • Business processes/procedures (i.e., documented instructions to accomplish a certain task) are often overlooked
  • They are information assets in their own right
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Hardware

A
  • This is the physical technology that
    * houses and executes the software
    * stores and carries the data
    * provides the interface for data
    entry/removal from the system
  • Traditional physical security like locks and keys restrict access to and the interaction with the hardware components
  • Securing the physical location of the hardware is important as physical access may mean info can be extracted
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Software

A
  • The software component of IS comprises
    * applications
    * operating systems
    * assorted command utilities
  • It’s arguably the most difficult IS component to secure
  • Unfortunately, software development is often under resourced
  • As such, information security is usually only added as an afterthought rather than being embedded as an integral part
  • The exploitation of software errors in software programming accounts for a substantial proportion of attacks on information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Networks

A

Component that increased need for information security; challenges emerge as information systems are increasingly interconnected

  • Manage the network perimeter
    * Use firewalls
    * Prevent malicious content
  • Protect the internal network
    * Segregate network
    * Secure wireless access
    * Enable secure administration
    * Configure the exception handling processes
    * Monitor the network
    * Assurance processes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Personnel

A

Often overlooked in computer security considerations, but people make mistakes, fall victim of social engineering, may susceptible to
bribery/blackmail

  • Produce a user security policy
  • Establish a staff induction process
  • Maintain user awareness of the security risks faced by the organisation
  • Support the formal assessment of security skills
  • Monitor the effectiveness of security training
  • Promote an incident reporting culture
  • Establish a formal disciplinary process
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Policies, Standards, Guidelines and Procedures

A
  • Policy A principle or rule to guide decisions and achieve rational outcomes
  • Standards Detailed statements, quantifying what must be done to comply with policy
  • Guideline A set of recommended actions to assist in complying with policy
  • Procedure A list of steps that constitute instructions for performing some action or accomplishing some task
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Disseminating Policies:

A
  • Policies should be promoted/supported by a security education, training, and awareness (SETA) programme that helps employees do their jobs securely
  • Education:
    * Not everyone needs formal degree or
    certificate in info security
    * But some roles may require certain
    employees to hold/attain info security
    academic qualifications or industry certification
  • Training:
  • EVERYONE in an organisation needs to be trained and aware
    of information security
  • Provides employees with hands-on instruction and detailed
    info designed to prepare them to perform duties securely
  • Management of info security can develop customised in-house
    training or outsource training
  • Awareness:
  • keeps info security at forefront of the user’s mind
  • can be as simple as security posters, newsletters, flyers, etc
  • may include printed mouse-pa
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is cryptography?

A

Cryptography is a way of turning plaintext (our secret message) into ciphertext (an unreadable version that can later be turned back into the plaintext).
Encrypting something links four elements together:
* the plaintext m
* the ciphertext c
* the key k (like a password)
* the algorithm E
The encryption algorithm turns the plaintext into the ciphertext by means of the key; so
c = Ek (m)

20
Q

Principles of modern cryptography

A

Modern algorithms (some of which we shall look at) abide by the following principles:
1. Large enough key space to resist exhaustive search
2. Resistant to frequency analysis
3. Small change in plaintext results in large change in ciphertext
4. Security depends only on secrecy of key, and not on secrecy of algorithm (Kerckhoff’s principle)

21
Q

Cryptographic Algorithms

A

Come in two broad categories: symmetric and asymmetric:

  • Symmetric encryption uses the same “secret key” to encipher and decipher message
  • Encryption methods can be extremely efficient, requiring minimal processing
  • Both sender and receiver must possess encryption key
  • If either copy of the key is compromised, an intermediate can decrypt and read messages
  • Asymmetric encryption (public-key encryption) uses two different but related keys to encrypt/decrypt messages:
  • If Key A encrypts message, only Key B can decrypt
  • Highest value when one key serves as the private key and the other serves as the public key
  • Typically used to encrypt a symmetric session key rather than the plaintext message(s)
22
Q

Symmetric cryptography, Asymmetric cryptography

A
  • Symmetric cryptography same key (shared by two or more parties) used to encrypt and decrypt, e.g., AES.
    Hybrid approach utilises advantages of both
  • Asymmetric cryptography two different keys: secret key (known to only one party) used to decrypt messages that were encrypted using the public key (known to all), e.g., RSA. Enables the creation of digital signatures.
23
Q

Caesar Cipher

A
  • Shift the outer wheel on by k letters
  • Encrypt: Find each plaintext letter in outer wheel and replace with letter below.
  • Decrypt: Find each ciphertext letter in inner wheel and replace with letter above.

ELSE
* Label A=0, B=1, C=2, etc
* Choose 0 ≤ k < 25
* Encrypt: Add k to each numeric value of
plaintext (mod 26)
* Decrypt: Subtract k from each numeric
value of ciphertext (mod 26)

24
Q

Substitution and Transposition

A

Substitution: substitute one value for another:
Mono-alphabetic cipher (uses only one alphabet)
* Each given input letter always substitutes to
the same output letter
* E.g., A7→K, B7→Y, …, Z7→S
* Decrypting is done by reversing the
substitution/mapping

Polyalphabetic (uses two or more alphabets)
* E.g., Vigen`ere cipher: a polyalphabetic code; made up of different Caesar ciphers

Transposition: rearranges values within a block

25
Q

Primary challenge of symmetric key cryptography

A

The main problem is key distribution. Let n be the number of parties who want to communicate:
* When n = 2 we need one key
* When n = 3 we need three keys
* When n = 4 we need six keys
* When n = 5 we need ten keys
* In general we need n × (n − 1)/2 keys

26
Q

Diffie-Hellman Key Exchange

A

It is currently necessary for the communicating
parties to share a key which is known to no one else. This is done by sending the key in advance over some secure channel such as private courier or registered mail. A private conversation between two people with no prior acquaintance is a common occurrence in business, however, and it is unrealistic to expect initial business contacts to be postponed long enough for keys to be transmitted by some physical means. The cost and delay imposed by this key distribution problem is a major barrier to the transfer of business communications to large teleprocessing networks

27
Q

Applications of DH Key Exchange

A

Diffie-Hellman key exchange uses asymmetric encryption to exchange session keys. These are limited-use symmetric keys for temporary communications; they allow two entities to conduct quick, efficient, secure communications based on symmetric
encryption, which is more efficient than asymmetric encryption for sending messages

  • DH based key establishment incorporated into in a number of standard protocols:
  • TLS/SSL (Transport Layer)
  • IPSec (Network Layer)
  • and is used in a variety of applications:
  • GlobalProtect VPN
  • Whatsapp
  • etc
28
Q

Example Asymmetric Cryptosystem

A
  • The most famous one is RSA:
  • developed by Rivest, Shamir and Adleman in 1978
  • based on number-theoretical properties of natural numbers
  • Elliptic curves:
  • proposed independently in 1985 by Koblitz and Miller
  • uses similar ideas to RSA but using elliptic curves instead
  • same complexity as RSA but with smaller keys
29
Q

Risk Management

A

Risk = likelihood x impact

Component-driven approaches require the risk analyst to assess three elements of risk: threat, vulnerability and impact.

Threat is the individual, group or circumstance which causes a given impact to occur, e.g., lone hacker, state-sponsored group, staff member who has made a mistake, or high-impact weather.

The purpose of assessing threat is to improve the assessment of how likely a given risk is to be realised.

30
Q

Information Security Risk Methods and Frameworks

A

There are a number of Risk Assessment Methods/Frameworks
* NIST 800-30
* ISO/IEC 27005
* ISACA COBIT
* ISF IRAM 2
* HMG Information Assurance Standard 1 2
* Octave Allegro
* ISACA COBIT 5

  • Equally, there are a number of Information Security
    Management Frameworks:
  • NIST CSF
  • ISO/IEC 27000 series
  • etc
31
Q

NIST Cyber Security Framework

A

*Identify: Understand and prioritize cybersecurity risks, assets, and governance.

Asset Management: Track all hardware, software, and data.
Business Environment: Align cybersecurity with organizational goals.
Governance: Define roles, responsibilities, and policies.
Risk Assessment: Regularly evaluate and prioritize risks.
Risk Management Strategy: Plan to mitigate identified risks.

*Protect: Implement safeguards against cyber threats.

Access Control: Manage access to systems and data.
Awareness and Training: Educate employees on cybersecurity.
Data Security: Encrypt and control access to data.
Processes and Procedures: Establish cybersecurity guidelines.
Maintenance: Update security measures regularly.
Protective Technologies: Use tools to defend against threats.

*Detect: Identify cybersecurity events promptly.
Anomalies and Events: Spot unusual activities.
Continuous Monitoring: Monitor systems and networks.
Detection Processes: Have procedures to quickly identify threats.

*Respond: Address detected cybersecurity incidents.

Response Planning: Plan for incident responses.
Communications: Report and manage incidents.
Analysis: Investigate incidents to understand impact.
Mitigation: Reduce incident impact.
Improvements: Enhance response capabilities.

*Recover: Restore services after a cybersecurity incident.

Recovery Planning: Prepare for recovery.
Improvements: Learn from incidents to improve recovery.
Communications: Inform stakeholders during recovery.

32
Q

Risk Assessment and Risk Management

A

Risk Assessment and Risk Management are essential to effectively implementing an Information Security Framework
Risk Assessment
* Risk = likelihood × impact
* Qualitative vs Quantitative
* Outputs prioritised list of relative risks

Risk Control and Management
* Control Strategies:
* Avoid; Accept; Reduce; Transfer
* Risk Management is a continual process
* Identify, Analyse, Treat, Monitor
* Limitations of Risk Methods and Frameworks

33
Q

Risk Assessment Steps (BS ISO/IEC 27005:2011)

A

Identify risk identification
* Identification of Assets
* Identification of Threats
* Identification of Existing Controls
* Identification of Vulnerabilities
* Identification of Consequences

Analyse risk assessment
* Assessment of consequences
* Assessment of incident likelihood
* Level of risk determination

Treat risk treatment
* Risk modification
* Risk retention
* Risk avoidance
* Risk sharing

Monitor monitoring and review

34
Q

Qualitative Risk Analysis

A

Uses scale of qualifying attributes to describe magnitude of consequences/likelihood (VL,L,M,H,VH)

  • Advantage - ease of understanding by all relevant personnel
  • Disadvantage - Dependence on subjective choice of the scale

May be used:
* As initial screening, to identify risks requiring detailed analysis
* Where this analysis is sufficient for decisions
* Where numerical data/resources inadequate for quotative analysis

35
Q

Quantitative Risk Analysis

A

Uses scale of objective numerical values for
consequences/likelihood

  • Uses data from variety of sources
  • Quality of analysis depends on accuracy/completeness of numerical data
  • Typically uses historical incident data:
  • Advantage - related directly to info security
    objectives/concerns of organization
  • Disadvantage - Lack of data on new risks
  • Disadvantage - Accurate/missing data in general could create illusion of worth/accuracy of risk assessment
  • Uncertainty and variability of consequences/likelihood are to be considered and communicated
36
Q

Risk Treatment Options

A

Retain/Accept
risk retention - organisation may tolerate (but not ignore) risk

  • Avoid/Terminate
    risk avoidance - organisation may decide not to do the thing that incurs risk
  • Share/Transfer
    risk sharing - transfer risk via an insurance policy or a third party
  • Modify/Reduce
    risk modification - adopt controls to lower the current level of risk
  • by reducing likelihood
    . by reducing impact
37
Q

Risk Management Life Cycle

A

Identify: Recognize potential risks.
Analyse: Assess impact and likelihood of risks.
Treat: Develop strategies to mitigate, transfer, avoid, or accept risks.
Monitor: Continuously review and adjust risk management efforts.

38
Q

Critical Appraisal of Risk Methods and Frameworks

A
  • Limits of a ‘reductionist’ approach
  • Lack of variety
  • Limits of a ’fixed state’ approach
  • Lack of feedback and control
  • Losing risk signals in the ’security noise’
  • System operation
  • Information opacity
  • Noise from misguided analysis
  • Noise from bias
  • Assumed determinability
  • Abstraction through labelling
  • The limits of using matrices
  • Limits in the way uncertainty is presented
  • The effect risk relationships have on impact
  • The adverse effect of intervention
  • Impacts are not limited to the scope of assessment
  • The effect of time on risk
39
Q

Common Software Errors

A

The Common Weakness Enumeration (CWE) is a list of software security vulnerabilities maintained by MITRE, a non-profit R&D group. It provides descriptions and mitigation for each vulnerability. MITRE and the SANS Institute developed the CWE/25, listing the 25 most critical software vulnerabilities. A similar list is the OWASP Top 10 Project, which shares many vulnerabilities with the CWE/25.

40
Q

Cross-Site Scripting (XSS )

A

XSS is improper neutralization of input during web page generation.

Vulnerabilities occur when:

.Untrusted data enters a web app.

.The app dynamically generates a web page with this data.

.The app fails to prevent executable data entry (e.g., JavaScript, HTML tags).

.A victim visits the generated page containing the script.

.The browser executes the script in the context of the web server’s domain.

.This violates the same-origin policy, allowing scripts to access resources across domains.

41
Q

Types of Cross-site scripting (XSS):

A
  • Type 1: Reflected XSS (or Non-Persistent)
    Server reflects data in HTTP request back in HTTP response. Attacker makes victim supply bad content to vulnerable web app, which is reflected back and executed by victim’s browser.
  • Type 2: Stored XSS (or Persistent)
    App stores bad data in a database, message forum, visitor log, or other trusted data store. The dangerous data is later read back into the application and included in dynamic content.
42
Q

XSS Prevention

A
  • RULE 0 Never insert untrusted data except in allowed locations
  • RULE 1 HTML escape before inserting untrusted data into HTML element content
  • RULE 2 Attribute escape before inserting untrusted data into HTML common attributes
  • RULE 3 JavaScript escape before inserting untrusted data into JavaScript data values
  • RULE 3.1 HTML escape JSON values in an HTML context and read the data with JSON.parse
  • RULE 4 CSS escape And strictly validate before inserting untrusted data into HTML style property values
  • RULE 5 URL escape before inserting untrusted data into HTML URL parameter values
  • RULE 6 Sanitize HTML markup with a library designed for the job
  • RULE 7 Avoid JavaScript URL’s
  • RULE 8 Prevent DOM-based XSS
  • Bonus 1 Use HTTPOnly cookie flag
  • Bonus 2 Implement content security policy
  • Bonus 3 Use an auto-escaping template system
  • Bonus 4 Use the X-XSS-Protection response header
  • Bonus 5 Properly use modern JS frameworks
43
Q

Principles of Secure Development and Deployment

A
  • Secure development is everyone’s concern
  • Keep your security knowledge sharp
  • Produce clean maintainable code
  • Protect your code repository
  • Secure the build and deployment pipeline
  • Continually test your security
  • Plan for security flaws
  • Secure your development environment
44
Q

Acceptance processes

A

Security testing needs to consider:
* effectiveness of defensive coding
* protection against malware and code injection through interfaces
* backup and recovery of data
* access control
* auditing and behavioural analysis
* communications security
* resilience

45
Q

Change Control and Escrow

A
  • Any change to software risks introducing new bugs/vulns
  • Formal change control processes manage these risks
  • Separation of duties ensures the person responsible for testing the code isn’t also responsible for its implementation non-technical
  • Two person control requires that an additional person signs off on the code changes, to reduce accidental or malicious flaws non-technical
  • Version Control Systems (e.g., git and svn)
46
Q

Patching

A

Every software application and operating system contains bugs
* Code complexity and size makes it impossible to test 100% of execution paths
* Bugs have varied impacts on confidentiality, integrity and availability
* Once found and fixed suppliers issue a patch that can be installed in order to remove the vulnerability
* Patches should be rolled out at the earliest opportunity
* Vulnerability may already be known to and exploited by attackers
* Attackers may also try to reverse engineer patches to create new exploits
* But, patches should be tested before roll out
* patches should be tested in a non-live environment

47
Q

Accreditation and Certification

A
  • Certification – provision by an independent body of written assurance (a certificate) that the product, service or system in question meets specific requirements.
  • Accreditation – formal recognition by an independent body, generally known as an accreditation body, that a certification body operates according to international standards.
  • Accredited certification typically mandated for
    safety/security critical systems
  • Formal review process to approve information security architecture, policy and procedures before the new/updated product/service/system is deployed/used
  • Will typically require periodic review and re-accreditation