Security Principles Flashcards

(31 cards)

1
Q

What are the terms for the security triad?

A

CIA:

Confidentiality
Integrity
Avaliability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does C in CIA stand for, and what does it mean?

A

Confidentiality

It ensures that only the intended persons or recipients can access the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does I in CIA stand for, and what does it mean?

A

Integrity

It aims to ensure that the data cannot be altered; moreover, we can detect any alteration if it occurs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does A in CIA stand for, and what does it mean?

A

Avaliability

It aims to ensure that the system or service is available when needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are two other terms that can be used beyond CIA?

A

Authenticity

Nonrepudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does Authenticity mean?

A

Authentic means not fraudulent or counterfeit. Authenticity is about ensuring that the document/file/data is from the claimed source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does Nonrepudiation mean?

A

Repudiate means refusing to recognize the validity of something. Nonrepudiation ensures that the original source cannot deny that they are the source of a particular document/file/data. This characteristic is indispensable for various domains, such as shopping, patient diagnosis, and banking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the terms of the triad for attacking a system?

A

DAD

Disclosure
Alteration
Destruction/Denial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does the first D in DAD stand for, and mean?

A

Disclosure

It is the opposite of confidentiality. In other words, disclosure of confidential data would be an attack on confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does the A in DAD stand for, and mean?

A

Alteration

It is the opposite of Integrity. For example, the integrity of a cheque is indispensable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does the second D in DAD stand for, and mean?

A

Destruction/Denial

It is the opposite of Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does the Bell-LaPadula Model aim to achieve, and what are its three rules?

A

Confidentiality

Simple Security Property
Star Security Property
Discretionary-Security Property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the Simple Security Property of the Bell-LaPadula Model?

A

This property is referred to as “no read up”; it states that a subject at a lower security level cannot read an object at a higher security level. This rule prevents access to sensitive information above the authorized level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the Star Security Property of the Bell-LaPadula Model?

A

This property is referred to as “no write down”; it states that a subject at a higher security level cannot write to an object at a lower security level. This rule prevents the disclosure of sensitive information to a subject of lower security level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the Discretionary-Security Property of the Bell-LaPadula Model?

A

This property uses an access matrix to allow read and write operations. An example access matrix is shown in the table below and used in conjunction with the first two properties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does the Biba Model aim to achieve, and what are the two rules?

A

Integrity

Simple Integrity Property
Star Integrity Property

17
Q

What is the Simple Security Property of the Biba Model?

A

This property is referred to as “no read down”; a higher integrity subject should not read from a lower integrity object

18
Q

What is the Star Security Property of the Biba Model?

A

This property is referred to as “no write up”; a lower integrity subject should not write to a higher integrity object

19
Q

What does the Clark-Wilson Model aim to achieve and what are the following concepts?

A

Integrity

Constrained Data Item (CDI)
Unconstrained Data Item (UDI)
Transformation Procedures (TPs)
Integrity Verification Procedures (IVPs)

20
Q

What is the Constrained Data Item (CDI) of the Clark-Wilson Model?

A

This refers to the data type whose integrity we want to preserve

21
Q

What is the Unconstrained Data Item (UDI) of the Clark-Wilson Model?

A

This refers to all data types beyond CDI, such as user and system input

22
Q

What is the Transformation Procedures (TPs) of the Clark-Wilson Model?

A

These procedures are programmed operations, such as read and write, and should maintain the integrity of CDIs

23
Q

What is the Integrity Verification Procedures (IVPs) of the Clark-Wilson Model?

A

These procedures check and ensure the validity of CDIs

24
Q

What does Defence-in-Depth refer to?

A

It refers to creating a security system of multiple levels

It is also called Multi-Level Security

25
What are the five Architectural principles of ISO/IEC 19249?
Domain Separation Layering Encapsulation Redundancy Virtulization
26
What are the five Design principles of ISO/IEC 19249?
Least Privilege Attack Surface Minimisation Centralized Parameter Validation Centralized General Security Services Preparing for Error and Exception Handling
27
What is Trust But Verify?
This principle teaches us that we should always verify even if we trust an entity and it's behavior, an entity being a user or system.
28
What is Zero Trust?
This principle treats trust as a vulnerability, and after considering it as such, zero trust tries to eliminate it. It indirectly teaches, "never trust, always verfy". In other words, every entity is considered adversarial until proven otherwise.
29
What is a Vulnerability?
Vulnerable means susceptible to attack or damage. In information security, a vulnerability is a weakness
30
What is Risk?
The risk is concerned with the likelihood of a threat actor exploiting a vulnerability and the consequent impact on the business
31
What is Threat?
A threat is a potential danger associated with this weakness or vulnerability