ISS Flashcards

(18 cards)

1
Q

What is ISS?

A

Generic term to describe all aspects of security regarding data processing/transmitting including:
- Information security: classification of information, access to information, information availability, confidentiality
- Cyber security: focus on data transfer
- Network security: deals with defending unwanted communications
- Physical security: access, theft prevention, destruction, infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Regulatory frameworks for ANSPs in the context of ISS

A
  • ICAO –> Annex 17 (Security), 19 (Safety)
  • EU: European commission/parliament, ENISA (European Network Information Security Agency)
  • National authorities / legislation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Security policy

A
  • Defines “security” within an organisational context
  • Places constraints on members/employees and adversaries
  • Contains aspects of physical security and IT security
  • Objectives: business continuity (resilience, recovery plan), fulfillment of legal requirements
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Relevant personnel in security management planning

A
  • Security policy management
  • IT security management
  • Personnel management
  • Site/facility management
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Relevant personnel in security management implementation

A
  • Physical security e.g. guards
  • Administrative security e.g. background checks
  • IT security e.g. operators of networks and external interfaces
  • All employees e.g. compliance with security policy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is SRMS?

A
  • Security Risk Management System: all aspects influencing security policy have to be evaluated
  • Risk based approach - risikobasierter Ansatz - vom Risiko ausgehend
  • Risk assessment: threats/vulnerabilities/residual risks, impact, likelihood
  • Impact: administrative, technical, operational
  • Likelihood: time or rate of occurences
  • Risk treatment: combination of impact and likelihood
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are physical and logical threats in the security context?

A
  • Physical threats: theft, destruction, harm to employees or customers
  • Logical threats (data & services): theft, manipulation/modification, interruption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are physical and logical vulnerabilities in the security context?

A
  • Physical vulnerabilities: unsecured access to premises, infrastructural dependencies
  • Logical vulnerabilities: (un-)known software bugs, architectural deficits in software/network/application, weak security policy, external interfaces
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Information security frameworks

A
  • Frame of reference based on: business objectives, threat environment, requirements & control
  • Help to define a strategy and set a benchmark
  • NIST cyber security framework
  • ISO framework
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Functions of NIST cyber security framework

A
  • Identify
  • Protect
  • Detect
  • Respond
  • Recover
  • Evaluate in 4 implementation tiers: partial, risk informed, repeatable, adaptive
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CIA triangle

A
  • Confidentiality: access to data is only granted to legitimate users
  • Integrity: consistent, accurate and thrustworthy data
  • Availability: authorized users can access and modify data within an appropriate timeframe
  • Further development e.g. Parkerian Hexad model: CIA + possession or control + authenticity + utility
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Security threats

A
  • Specifity: random attacks, negligence, hostile intent/directed attack
  • Physical attacks: company, infrastructure, employees, air traffic
  • Digital/data attacks: service or data disruption/distortion, data manipulation, theft
  • Inside or outside threat
  • Functionality vs. security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Explain type of attacks

A
  • Port sniffing: network access point has been found, the aggressor tries to provoke reactions by adressing sockets
  • Network sniffing: aggressor attempts to gain a thorough understandin of the network structure, devides and services
  • Denial of Service (DoS): attack a node so it is not available for legitimate users
  • Distributed Denial of Service (DDoS)
  • Spoofing: aggressor pretends to be legitimate user
  • Man-in-the-middle (MITM): aggressor is inserted into the communication between two legitimate hosts
  • Advanced persistent threat (APT): combine targeted attacks using diverse vectors and methods
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Explain social engineering techniques

A
  • Social networking: try to befriend an employee in a security critical position (shared hobbies, social media, …)
  • Human flaws: try do identify and exploit weaknesses (greed, sex, ego)
  • Phishing: try to collect data by addressing a large target audience
  • Spear head phishing: target single individuals (requires more background knowledge and high level of effort)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Explain the different types of malware

A

Method of propagation
- Viruses: piece of code attached to a legitimate program
- Worms: standalone malware program that replicates itself
Underlying goals
- Spyware: targeted attack distributed using worms
- Ransomware: worm with a long propagation phase and makes itself known to the victim
- Back-door access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Identify the different phases of security attack

A
  1. Reconnaissance: target selection
  2. Weaponization: create one or several remote access malware weapons
  3. Delivery: identify means of transmission
  4. Exploitation: trigger the malware programs code
  5. Installation: install payload
  6. Command and Control: enables intruder to have persistent access to the target network (only if backdoor was installed)
  7. Actions in objective: take action to achieve the goals
17
Q

Appreciate how to detect and stop security attacks

A
  • For optimum defense we need awareness and control
  • Detection: unsual network traffic, access attempts, unexplained failures of security devices and software, suspicious behaviour
  • Defense: prevent attackers from gaining access, happens outside your operational system, heterogenous and multi-layered
18
Q

Apperciate a holistic (nicht löchrig, sondern “ganze” (whole)) security architecture

A
  • Take into account all threat vectors and threatened platforms: application security, network security, operating systems security
  • Application security: application accounts, interfaces, network based services
  • Network security: firewalls, active components, network data flow
  • Operating systems security: authentication, security patches, active services
  • Include organisational units and professionals: SOC, CERT
  • Secuirty operations centre (SOC): pro-active analysis of IT systems and security
  • Computer emergency response team (CERT): group of specialist dealing with attacks, security issues, …
  • System of systems: collection of systems dedicated to their specialised task (security); pooled resources/capabilities and more functionality