Security Architecture Domain 4 Flashcards
Three risk analysis methods
OCTAVE
NIST 800-30
ISO/IEC27005
Quantitative Risk Analysis
This approach employs two fundamental elements;
the probability of an event
occurring and a value or measure for the loss should it occur.
Quantitative risk analysis makes use of a single figure produced from these elements. This is called the _____________________ or the ______________
‘Annual Loss Expectancy (ALE)’
‘Estimated Annual Cost (EAC)’.
Quantitative risk is calculated by multiplying
Single loss event SLE x annual rate of occurrence AR0
Most qualitative risk analysis methodologies make use of a number of interrelated elements:
THREATS
Things that can go wrong or attack the system
VULNERABILITIES
These weaknesses make a system more prone to attack by a threat or make an attack more likely to have some success or impact.
CONTROLS
These are the countermeasures for vulnerabilities.
Where is the attack vector in emails
there are potentially two, the email itself and the attachment to the email
What are the key differences between a worm and a virus
Worms can generally spread without needing human interaction.
Virus needs a host file, it attaches to an executable file, document or program
Most European countries data protection laws follow principles detailed in two EU directives, whether or not these countries are part of the European Union. These directives are
- Directive 95/46/EC of the European Parliament on the Protection
of Individuals with Regard to the Processing of Personal Data and
on the Free Movement of Such Data (commonly called the Data
Protection Directive) 20 and - Directive 2002/58/EC Concerning the Processing of Personal Data
and the Protection of Privacy in the Electronic Communications
Sector 21. The first directive applies to the collection, storage,
disclosure, and other uses of personal data. The second directive
The __________________ was born out of the necessity to expand product security assurance programs in the United States, Canada, United Kingdom, France, and Germany.
Common criteria CC
Product evaluations began in the United States with the ___________________, which was the criterion for evaluating secure systems and vendor products.
Orange Book TCSEC
The Orange Book had an assurance range from
D2 up to A-3. The
D class had the least amount of rigorous testing, and A class consisted of more formal evaluation methods.
The Orange Book only addressed
Confidentiality
The next evaluation criteria, _____________, was created by Canada, the United Kingdom, France, Spain, and Germany.
the ITSEC
ITSEC addressed
Confidentiality and Integrity
The Common Criteria is useful as a guide for the development, evaluation, or procurement of IT products with security functionality. It addresses
Confidentiality, Integrity and availability
The Common Criteria consists of three parts
Introduction and general model
Security functional requirements
Security Assurance requirements
Common criteria
Part 2 - Security Functional Requirements establish a set of functional components as a standard way of
expressing the functional requirements for the Target of Evaluation (TOE).
Common Critera
Part 3 - Security Assurance Requirements establish a set of assurance components as a standard way of
expressing the assurance requirements for the TOE.
The purpose of this arrangement is to advance those objectives by bringing about a situation in which IT products and protection profiles that earn a Common Criteria certificate can be procured or used without
the need for further evaluation.
When did Australia and New Zealand join the mutual recognition arrangement
October 1999
The Common Criteria evaluated products begin the process by being
evaluated in a
certified laboratory
The National Voluntary Laboratory Accreditation Program (NVLAP) provides third-party accreditation to
testing and calibration laboratories
Part 2 of the Common Criteria defines the
Security functional components.
What does TOE mean
Target of Evaluation