Lectures Flashcards

(43 cards)

1
Q

What are two key themes in the Computer Security course?

A
• Thinking about security 
  – The “security mindset”
  – Threat modelling
  – Security principles
  – Current events
• Technical aspects of security
  – Attacks
  – Defenses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are 12 categories that an attacker may be motivated by?

A
  • Access or Convenience
  • Curiosity or Boredom
  • Desire or Obsession
  • Diplomacy or Warfare
  • Malice or Revenge
  • Money
  • Politics
  • Protection
  • Religion
  • Self-Promotion
  • World View
  • Unusual
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are eight ways to brainstorm about security?

A
  • Adversary Motivations
  • Adversary Resources
  • Assets
  • Threats
  • Vulnerabilities
  • Attack Techniques
  • Risks
  • Mitigations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are eight categories of assets?

A
  • Emotional Well-being
  • Financial Well-being
  • Personal Data
  • Personal Well-being
  • Relationships
  • Societal Well-being
  • The Biosphere
  • Unusual Impacts
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are some targets of an adversary motivated by Access or Convenience?

A
  • appointment-based online enrollment systems
  • sales of limited tickets
  • personal electronics with restricted permissions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are some actions that an adversary motivated by Access or Convenience might take?

A
  • modify personal electronics
  • bypass company filtering to access personal e-mail
  • access a protected wireless network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are some targets of an adversary motivated by Curiosity or Boredom?

A
  • acquaintances
  • strangers
  • institutions
  • celebrities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are some actions that an adversary motivated by Curiosity or Boredom might take?

A
  • look up celebrity’s medical record
  • browse personal photos
  • attack a random system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are some targets of an adversary motivated by Desire or Obsession?

A
  • ex-boyfriend
  • ex-girlfriend
  • celebrities
  • children
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are some actions that an adversary motivated by Desire or Obsession might take?

A
  • harassing messages
  • sexual blackmail
  • covert webcam activation
  • monitoring communications
  • location tracking
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are some targets of an adversary motivated by Diplomacy or Warfare?

A
  • public infrastructure
  • cyber-physical
  • communication
  • emergency systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are some actions that an adversary motivated by Diplomacy or Warfare might take?

A
  • gather data
  • spread misinformation
  • track individuals
  • disable equipment
  • cause distractions
  • cause bodily harm
  • disable communications
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are some targets of an adversary motivated by Malice or Revenge?

A
  • ex-employer
  • neighbor
  • rival
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are some actions that an adversary motivated by Malice or Revenge might take?

A
  • misinformation
  • cause physical harm
  • cause monetary damage
  • cause emotional damage
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are some goals of an adversary motivated by Money?

A
  • drain assets
  • sell DoS services
  • extort organization
  • sell user data
  • sabotage competitor’s system
  • manipulate market
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are some actions that an adversary motivated by Money might take?

A
  • steal data
  • disclose data
  • misinformation
  • sabotage competitor’s system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are some goals of an adversary motivated by Politics?

A
  • alter, prevent, or invalidate votes
  • discredit political figures
  • alter the public’s understanding or impression
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are some actions that an adversary motivated by Politics might take?

A
  • DoS attack
  • steal data
  • disclose data
  • misinformation
19
Q

What are some targets of an adversary motivated by Protection?

A
  • employers
  • government
  • family
20
Q

What are some actions that an adversary motivated by Protection might take?

A
  • monitor behavior
  • evade censorship
  • preemptive attack
21
Q

What are some goals of an adversary motivated Religion?

A
  • spread information about beliefs

* discredit another group

22
Q

What are some actions that an adversary motivated by Religion might take?

A
  • disclose data
  • misinformation
  • cause physical harm
  • cause monetary damage
23
Q

What are some targets of an adversary motivated by Self-Promotion?

A
  • systems with personal information
  • prominent systems
  • challenging systems
24
Q

What are some actions that an adversary motivated by Self-Promotion might take?

A
  • change grades
  • redact information
  • deface a corporate website
  • crack an encryption scheme
25
What are some issues that an adversary might be motivated by?
* corporations * environmentalism * reproductive rights * drugs * violence * sexuality
26
What are some actions that an adversary motivated by a World View might take?
* DoS attack * disclose data * misinformation * cause physical harm * cause monetary damage
27
What are some assets tied to a person's Emotional Well-being?
* keepsakes * peace of mind * convenience
28
How might a person be harmed due to an attack on their assets tied to Emotional Well-being?
* cause of fear * cause of anger * cause of loneliness * cause of confusion
29
What are some targets tied to a person's Financial Well-being?
* electronic home-entry systems | * online bank credentials
30
What are some attacks that might affect a person's Financial Well-being?
* theft * extortion * blackmail
31
What are some targets tied to a person's Personal Data?
* medical records * embarrassing pictures * browsing history
32
What are some ways that an attacker might use a person's Personal Data?
* perform identity theft * perform blackmail * delete financial records
33
What are some targets tied to a person's Physical Well-being?
* access to food and water * access to electricity * an individual's location * medical devices * cars * medication or allergy records
34
What are some targets tied to a person's Relationships?
* interpersonal * inter-organizational * international
35
How might a person be harmed due to an attack on their Relationships?
* damage a company's reputation | * cause unnecessary tension/arguments between relations
36
What are some targets tied to a person's Societal Well-being?
* online voting systems * public infrastructure and cyber-physical systems * government record databases
37
How might a person be harmed due to an attack on their Societal Well-being?
* create mass hysteria * alter public discourse * cause physical harm * affect access to resources
38
What are some targets tied to the Biosphere?
* public infrastructure and cyber-physical systems | * data centers
39
How might a person be harmed due to an attack on the Biosphere?
* excessive resources are used up * water sources are polluted * fires are started
40
Reliability deals with... Usability deals with... Security deals with...
Reliability deals with accidental failures Usability deals with avoiding "operating mistakes" Security deals with intentional failures created by thinking adversaries
41
The approximation of risk: Risk = ?
Risk = (value_of_asset) * (likelihood_of_threat_succeeding) * (damage to asset)
42
What are threats?
Threats are actions by adversaries who try to exploit vulnerabilities to damage assets.
43
What are three categories of security failures?
* requirement bugs (incorrect/problematic goals) * design bugs (poor use of cryptography/source of randomness) * implementation bugs (buffer overflow attacks)