Lecture 1 - Introduction Flashcards

1
Q

Some cyber attacks?

A
  • phishing
  • ransomware (publication or blockage of personal data)
  • malware attacks ( file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker want)
  • insider threats (insider information on security etc.)
  • trade secrets and insider data theft
  • data leaks and breaches
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Steps of the high level plan for a secure system?

A
  • goal (the goal of the system is to protect assets from unauthorized entities)
  • aspects of cyber security should be followed
  • threat model
  • policy
  • mechanism
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the goal of a cyber security system?

A

To protect assets, so that only authorized or legible entities should be able to use certain features / read files / write files etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the aspects of cyber security?

A
  • confidentiality
  • integrity
  • availability
  • authenticity
  • accountability
  • non-repudiation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a high level plan for a secure system?

A

a systematic thought required to set up a successful defense

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a threat model?

A

assumptions about attacker i.e. what they can do to the system and how they would want to exploit it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a policy?

A

plan/rules that will get your system to achieve a goal e.g. having user access levels, having file permissions. Note human components can also be part of the policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Can a policy have human components? Example?

A

Yes. For example : no password sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a mechanism?

A

Software/ hardware that will enforce the policy set out for the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Is the a specific order required for the high level plan to work?

A

No, there isn’t a specific order, however some layering will be required to make a successfully secure system e.g. mechanism will always be after the policy (as it implements it)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why is cyber security necessary?

A

To protect assets (digital, but not always files)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a another name for aspects of cyber security?

A

aspects of asset protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Confidentiality? (aspect 1)

A

protection of information so that unauthorized persons cannot access it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does Confidentiality imply?

A

That there are access control levels in the system and authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Integrity? (aspect 2)

A

Ensuring nothing is lost or deleted (neither accidentally or deliberately). Nothing should be changed against permissions or user wishes. e.g. having a message digest to check for file alteration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Privacy?

A

Confidentiality but in relation to personal data/information. e.g. file encryption

17
Q

What is Availability? (aspect 3)

A
  • Having the capacity and uptime to meet demands.
  • It is ensuring resources are allocated fairly
  • It is also fault tolerance and recovery from faults

e.g. recovering from DDOs
e.g. Protect against denial of service attacks

18
Q

What is denial of service attack?

A

cyber attacks designed to render a service inaccessible

19
Q

What is Authenticity? (aspect 4)

A

The property of being genuine and being able
to be verified and trusted; confidence in the
validity of a transmission, a message, or
message originator.

It validates the source or origin of data and
other file transfers through proof of identity
– This ensures that the message (email, payment
transaction, digital file, etc.) was not corrupted or
intercepted during transmission

20
Q

What is Accountability? (aspect 5)

A
  • one of the key principles of good governance
  • A responsible, responsive, and
    democratic security sector cannot be conceived
    without accountable personnel, institutions, and
    procedures.
  • crucial element of building integrity (BI) initiatives
  • pointed towards who is responsible for each cyber
    role in an organization
21
Q

What is Non-Repudiation?

A
  • Assurance that the sender of information is
    provided with proof of delivery and the recipient is
    provided with proof of the sender’s identity, so
    neither can later deny having processed the
    information
  • Non-repudiation provides evidence of data’s
    origin, authenticity, and integrity
  • Possible with digital file tracking and users’
    action logging
22
Q

What is a threat designed to do?

A

Typically designed to attack or target a specific aspect of cybersecurity.

23
Q

When protecting an asset what do we have to consider?

A

We need to consider all possible threats and what aspect they will attack. There are different techniques for doing this.

24
Q

What are the 2 ways we can check security of a system

A
  • attacker’s POV
  • defender’s POV
25
Q

What is an attack surface?

A

All vulnerabilities collected together for a system.

26
Q

Different ways of protection lead to ?

A

Different vulnerabilities for a system.

27
Q

As a defender what do we want to do (in relation to attack surface)?

A

Reduce the attack surface as much as possible.

28
Q

What does protection have and what do we need to compare it to?

A

Protection has a cost (different protection methods have different costs) and assets have a value. We need to choose a protection method that doesn’t outweigh the value of the asset being protected.

29
Q

What is risk?

A

Risks involve the probability of something
happening, together with the effect of the attack
succeeding.

30
Q

Some technical solutions for protection?

A
  • file encryption
  • digital signatures (So that signatures can’t be forged)
  • Secure message digests to provide document fingerprints
    without revealing the document content
    -secure protocols that ensure the user of message digests or digital signatures or other technical solutions
31
Q

What is the main vulnerability in any system?

A

PEOPLE

Users may not comply with security policies.
* Organizations may develop policies that users find very
difficult to use.
* Developers may not adhere to security guidelines when
building systems.
* Regulatory bodies may not provide appropriate policies and
rules and then may not enforce them.
* Need to consider socio-technical systems.
– Consider people as well as the technical aspects of any system.