Secure Computing Flashcards
(134 cards)
What is MOM?
Attackers must possess:
- Method: skills & tools
- Opportunity: time & access
- Motive
What is threat modelling?
The process of identifying all possible threats to a system, exploitable or not
What does threat modelling help us to do?
- Understand the system’s threat profile
- Facilitate secure design and implementation
- Guide code reviews and penetration tests
- Discover vulnerabilities
How do we characterise systems?
All about system components and their interconnections
Using usage scenarios, assumptions & dependencies e.g. data flow diagrams and network models
What is an asset and some examples?
What we are trying to protect e.g. sensitive data or system availability
What is an access point and some examples?
How we can reach the system and asset e.g. ports or files
How do we identify threats?
Develop a threat profile which can be classified as high or low risk by looking at where/how assets can be reached via access points through components and interconnections
For each asset, we create attack goals for it
What do attack trees show?
How an asset can be attacked
What does the root node of an attack tree represent?
The goal of the attack
What do all other nodes of an attack tree represent?
Condition/predicate/action
What is an attack path in an attack tree?
The path from a leaf node to the root node
What do data flow diagrams show?
The flow of information between different components of a system, focusing on what data is being transferred, where it’s going and how it’s processed
What do data flow diagrams help us to pinpoint?
- Areas where sensitive data is exposed
- Areas where improper validation, authentication or encryption might occur
Where do trust boundaries occur?
Any point at which entities with different levels of privilege interact
How do we find trust boundaries?
- Identify the different principals
- Start from either end of the privilege spectrum e.g. Internet user or system administrator
- Add a new trust boundary each time a principal talks to another
What are entry and exist points in data flow diagrams?
Places where control or data cross a trust boundary
Why are data flow diagrams useful?
They delineate the attack surface between principals. Threats tend to cluster around entry/exit points on trust boundaries and often follow data flows. Therefore, we have a systematic way of where to look for threats.
What is STRIDE?
Used for classifying threats
Spoofing - masquerading for unauthorised access
Tampering - violating data integrity
Repudiation - denying a performing action
Info Disclosure - violating confidentiality
Denial of Service - preventing a system from working
Elevation of Privilege - gaining special status
What are the benefits of using STRDE?
- Acts as a useful checklist when considering threats
- Makes it easier to understand the effects of threats
- Helps to assign priority to threats
What is STRIDE-Per-Element?
Used in data flow diagrams to constrain STRIDE for particular data flow diagram elements
Are security requirements specified in terms of what must happen or must not happen?
Must not happen
What is a security policy?
The set of security requirements
A high-level specification of security properties a system should possess
What is DREAD?
Used for risk assessment
Damage Potential
Reproducibility
Exploitability
Affected Users
Discoverability
What are some issues with DREAD?
- Highly subjective to use integers
- Not all dimensions may be useful e.g. why assume discoverability isn’t always 100%
- All dimensions are weighted equally