Terminology Flashcards

1
Q

System Resource/Asset

A

Software systems, data and network systems, personnel, equipment or a logically related group of systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Vulnerability

A

Weakness in the system that can be exploited or triggered by a threat source.
- Information system, procedures, internal controls or implementation.

Leaky system through the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Threat

A

Circumstance or event what impacts adversely the operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Attack

A

Threat carried out by through a vulnerability.
- Malicious activity that tries to collect, disrupt, deny, degrades or destroys information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Adversary (threat agent)

A

Individual who conducts or has the intention to conduct detrimental activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Countermeasure

A

Device or technique that reduces effectiveness of attacks (prevention). If it is not possible to prevent it the goal is to detect and recover form its effects.

Residual vulnerabilities may remain -> residual level of risk to assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Risk

A

Measure of the extent that an entity can be impacted by a threat, defined by level of impact or likelihood

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Security Policy

A

Criteria for the provision of security services in order to maintain a condition of security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Active attack

A

Attempt to alter resources or affect operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Passive attack

A

Learn or make use of information of the system, does not affect resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Origin of the attack

A

Inside -> entity inside the security perimeter, authorized to access but misuses in an unapproved way
Outside -> outside the perimeter by unauth or illegitimate user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Threats - Unauthorized disclosure

A

Entity gains access to data for which the entity is not authorized

To: Confidentiality
Consequence:
- Exposure: entity gains unauthorized knowledge of sensitive data
- Interception: shared LAN any device can get unauthorized access to data
- Inference: observing the pattern of traffic on a network
- Intrusion: Overcoming access control protections to get unauth data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Threats - Deception

A

Event where entity receives false data and will believe it to be true

To: Integrity
Consequence:
- Masquerade: posing as auth user (obtained credentials). Trojan horse appears to have a function but gains access and executes malicious logic
- Falsification: alter, replace valid data or introduce false data
- Repudiation: deny sending data or receiving/possessing data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Threats - Disruption

A

Event that interrupts or prevents the correct operation and functions

To: Availability or system integrity
- Incapacitation: limit system availability. Physical or damage of hardware. Trojan horse disabling services.
- Corruption: on system integrity. Resources or services function in an unintended manner. Like a backdoor
- Obstruction: interfere communications, disabling or altering communication control information. Overload the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Threats - Usurpation

A

Event that results in control of system services or functions by unauth entity

To: System integrity
- Misappropriation: theft of service. DDoS attacks, using machine resources to attack a target host.
- Misuse: disable security functions or thwarted sec functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Assets - Hardware

A

Most vulnerable and least susceptible to automated controls
Threats:
- Accidental and deliberate damage to equipment
- Theft (USB drives -> loss of confidentiality)

17
Q

Assets - Software

A

Key threat to sw is on availability. Easy to delete.
It can be altered or damaged to affect functioning.

Backups can increase availability and recovery.

Altering is a threat to integrity/authenticity.

18
Q

Assets - Data

A

Concerns: availability, secrecy and integrity.
Threats:
- Destroy data -> availability
- Unauthorized reading data or dbs -> secrecy
- Statistical databases (aggregate or summ information) -> secrecy. Data can be inferred by doing set operations and also the data is available during different stages of the processing of these data sets.
- Modification of data files -> data integrity

19
Q

Assets - Communication Lines and Networks - Passive attacks

A
  • Passive: obtain information being transmitted. Release of message contents and traffic analysis.
    Release of MC: prevent unauthorized reads or learning
    Traffic analysis: prevent inference from seeing the interaction (guessing the nature).

Difficult to catch emphasize prevention rather than detection

20
Q

Assets - Communication Lines and Networks - Active attacks

A

Modification or falsification of the data stream
- Replay: passive capture and retransmission
A masquerade: entity pretends to be a different entity. Replay authentication sequences to gain access.
- Modification of messages: altering portion, delaying or reordering of legitimate messages

Difficult to prevent emphasize detection and recovery

21
Q

List types of threat actions (attacks)

A

-> Confidentiality
Exposure & interception: attacker gets unauth access to data
Inference: does it by inferring
Intrusion: overcome access control
-> Availability
Incapacitation: limit availability
Obstruction: Interfere comms. overload system
-> Integrity
Corruption: service does not work as expected
Masquerade: pose as auth user
Falsification: alter valid data or create false data
Repudiation: deny sending or received/possess data
Misappropiation: theft of service or misuse of resources
Misuse: disabled sec functions or thwarting of functions

22
Q

List of threat consequences

A

-Unauthorized disclose
exposure, interception, inference, intrusion (Confidentiality)
-Disruption
incapacitation,obstruction (Availability)
corruption (Integrity)
-Deception
masquerade, falsification, repudiation (Integrity)
-Usurpation
misappropiation, misuse (Integrity)