Module 1.2 Flashcards

(56 cards)

1
Q

What is an asset again?

A
  • > anything valuable to organization
  • > system resource
  • > 6 examples -> program/application, shared systems, critical systems or support systems, plants, personnel, equipment, data/info
  • database is example
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cyber security review? where is assets in the def?

A

-> preventing damage to, protecting and restoring
components of computers (ASSETS)
to meet goals of objectives such as confidentiality, integrity, availability, authenticity and non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Examples of assets in cyber security definition 4? 3 main?

A

computer
electronic communication systems/services
wire/electronic communication
information contained within those above

systems
information
services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what are 4 classes of assets we need to protect?

A

hardware
software
communication
data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what are hardware assets (3 examples?)

A

hardware components in systems
eg. data processing systems
storage systems
data communication devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

name three software assets

A

operating systems, system utilities, applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what are communication assets? 4 examples?

what else can these be categorized as??

A

->communication components that build our communication network
eg. LAN WAN communication links/devices
switches
bridges
routers
-routers can also be categorized as hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

3 examples of data assets?

A
  • files
  • databases
  • security related data such as password files
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a threat?

threat to?

A
  • event/circumstance that has potential for adverse effects
  • through information systems - unauthorized access, destruction, disclosure, modifying data, denying access
  • effects operations, individuals, organization, nation, assets
  • threat to security objectives
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an attack -what is a realization of?

A
  • a malicious activity that aims to collect damage or destroy information system or system resources
  • realization of a threat
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is the threat of unauthorized disclosure?

threat to?

A

even when a unauthorized person gains access to the data

->threat to confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the 4 realizations/attacks of unauthorized disclosure?

A

-exposure, interception, inference, intrusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is exposure?

A

sensitive data released to unauthorized person

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is interception?

A

unauthorized user directly accesses sensitive data that is travelling between authorized source/destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is inference?

A

unauthorized user indirectly gets access to sensitive info by reasoning from characteristics or by products of communication
->learning through inferring what info is about

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is intrusion?

A

unauthorized user gains access to sensitive data by bypassing system’s security (breaking in)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the threat of deception?

threat to?

A

event that may result in authorized entity receiving false data/believing it
->threat to system integrity (correct operation) and data integrity (trustworthiness of data)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the three attacks of deception?

A

Masquerade, Falsification, Repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is Masquerade?

A

unauthorized entity gains access to system and pretends to be an authorized entity to perform malicious acts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is Falsification?

ex?

A

false data inserted to deceive authorized person

->eg into communication so they take a corrective action which can cause asset damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is Repudiation?

A

entity deceives another by saying it’s not them

-you do unauthorized actions in the system but don’t take accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is disruption? threat to?

A

events that interrupts/prevent correct operation system’s services
->Threat to system integrity and availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are the three realizations of disruption?

A

incapacitation, corruption, obstruction

24
Q

What is incapacitation?

A

interrupts/prevents system operation by disabling a system component

25
What is corruption?
altering system operation by modifying system functions or data (not disabling, but corrupting so it can't provide reliable services)
26
What is obstruction?
interrupts services by hindering system operation (eg. jam communication so no interruption in delivery)
27
What is usurpation? what is it threat to?
event that results in control of system by unauthorized entity ->threat to system integrity
28
Two types of usurpation
misappropriation and misuse
29
what is Misappropriation
entity goes ahead an starts controlling system resources in a way they aren't supposed to (unauthorized to)
30
misuse, 1 ex?
cause component to perform function that's detrimental to system security (Eg. deny authorized users access)
31
What is a passive attack? - goal? - 2 types?
learn or use system's information in a way that does not effect the system - >goal of obtaining information - release of message contents - passive attacker eavesdropping on information that will intercept or see exposure of sensitive info - traffic analysis - observe what is going on in system and infer through analysis other information
32
What is an active attack? | involves what?
- attempt to alter system or effect its operation | - involves modifying data stream or manipulating components
33
what categories of active attacks?
- replay - intercept a communication and replay it as someone else for deception - masquerade - pose as someone else - modification of messages - falsification, injection - denial of service - disruption threats - actively interrupt communication
34
What is an inside attack? | two types of insiders?
initiated by entity inside security perimeter -an insider(eg. building) - insiders are authorized users but use them in a way they aren't supposed to - malicious employees causing damage to assets - non malicious employees- accidently cause harm or misconfigure system controls
35
What are outside attacks?
-initiated by unauthorized entity outside security perimeter - an outsider -outsiders can be pranksters criminals/terrorists governments anything outside organization trying to cause damage
36
What is an attack surface?
-collection of system's reachable and exploitable vulnerabilities (potential and existing)
37
The smaller the attack surface?
-the fewer opportunities for the adversary to enter and threaten assets
38
First category of attack surface?
-network attack services - networking components that provide entry points
39
Second category of attack surface?
-software attack surfaces - vulnerabilities in programming/code that may allow entry
40
Third category of attack surface? 1 ex?
- human attack surface - all the individuals that are part of system and operation that may comprise to provide access - phishing attack
41
Why is an attack surface important to know? - 3 points
- the smaller the fewer entry points, the larger surface the more entry points - we want to minimize it to reduce entry points/focus on making existing entry points difficult to entry
42
2 examples of a network attack surface?
- open ports facing web/servers that can listen using code | - service running inside a firewall that may be bypassed to gain entry into system's network components
43
2 examples of software attack surfaces?
- code processing incoming data/documents/emails since we could inject commands in the data streams and gain access - interfaces, SQL, web forms since it's like the outward facing component of software which can be abused to gain entry
44
1 example of human attack surface?
-employee with access to sensitive information since he could leak it or accidently give it out for adversary entry into system
45
what is social engineering?
-manipulating people so they give up confidential information
46
1 benefit of a attack surface?
technique for assessing scale and severity of threats
47
2 benefit of attack surface?
helps developers know where security is required since we can add countermeasures where (vulnerabilities) entry points are
48
3 benefit of attack surface?
get guidance on setting priorities for testing, strengthening security measures, or modifying the service
49
What is an attack tree? why an attack tree?
- branching data structure representing potential techniques to exploit security vulnerabilities - help understand the different kinds of attacks and threats that may exist
50
what is the root?
highlights what is the goal/objective of the attack from perspective of a hypothetical attacker - usually will violate one of our security objectives
51
what are branches? how many levels? | -what are they not??
- what are the sub goals we need to achieve the root goal - can have many levels of branching - not actions to initiate attack!
52
combine branches using And how? or how?
AND - using angle sign | OR - simple branching
53
what are leaves?
- all the ways that we can initiate the attack - actions we need to perform - always exists LAST (no branch without a leaf usually)
54
first benefit of attack trees? attack pattern?
- exploit information/take action on types of attack patterns that emerge from attack trees - attack patterns - ways of achieving certain kinds of objectives will follow patterns
55
second benefit of attack tree?
-publication of security advisories have developed knowledge about general/specific attack patterns
56
third benefit of attack tree?
-useful for documenting security attacks in a structured form that reveal vulnerabilities which impacts design and choice of countermeasures and systems