CyberSecurity Exam 1

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Attacks may exploit weak points of _____ beyond just technical weak points.

"Business model"

Not every member in an organisation has to become a security expert, but all members should know

-Why security is important for themselves and for the organisation. -What is expected of each member. -Which good practices they should follow.

First electronic computers (year)

1940s

Possible dangers for countries

Cyber Warfare Cyber Vandalism Cyber Espionage Cyber Terrorism

Threat

Possible danger

______________________ should be part of the general security strategy.

Security awareness programs

a threat to confidentiality

Unauthorized disclosure

The NIST Computer Security handbook defines computer security as

"The protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability and confidentiality of information system resources" (includes hardware, software, firmware, information/data, and telecommunications).

Start of computer industry (year)

1950s

Software comes into its own. Multi user systems emerged, needing mechanisms to protects systems from users (year)

1960s

Age of the mainframe. Needing sensitive data protection, access control, encryption (year)

1970s

Age of the PC. Multi Level Security (MLS), information flow, security research, viruses and worms (year)

1980s

Age of the internet. Increased exposure to Hostile environments (year)

1990s

Age of the web. The paradise of hackers Communication security, network security, web security. (year)

2000's

Security Charter

A crisp document explaining general rules

What is Cyber Security?

A necessary science for protecting people and their values from security threats over the internet

Denial of Service Case Study (2004)

A worm spread through email and Kazza P2P File Sharing platform. Looked like a genuine error message. When opened created a denial of service attack on sco.com

attempt to alter system resources or affect their operation

Active attack

An entity that attacks, or is a threat to, a system.

Adversary (Threat Agent)

Starting point of computer security in 1972 dealing with the Air Force.

Anderson report.

Is this system secure?

Asking the wrong question. Need to be more specific about protection requirements... ie: -Protect PC from virus and worm attacks? -No unauthorized access to corporate LAN? -Keep sensitive documents secret? -Verify identity of partners in a business transaction?

An assault on system security that derives from an intelligent threat; that is, an intelligent act that is a deliberate attempt (especially in the sense of a method or technique) to evade security services and violate the security policy of a system.

Attack

Used to analyse how an attack is executed in detail. To get a clear picture of potential threats, attack trees can be constructed.

Attack trees

Possible dangers monetary dangers

Computer Fraud Phishing Vishing Identity theft Theft of information Theft of assets

The CIA triad

Confidentiality, Integrity, Availability

An action, device, procedure, or technique that reduces a threat, a vulnerability, or an attack by eliminating or preventing it, by minimizing the harm it can cause, or by discovering and reporting it so that corrective action can be taken.

Countermeasure

Possible dangers for organizations (Companies, banks, etc)

Cyber Piracy Denial of Service Intrusion Unauthorized access Disclosure of information Modification of data

Possible dangers for people

Cyber trolling Cyber stalking Cyber harassment Cyber bullying Cyber extortion

Reliability

Deals with accidental failures

Masquerade (an attempt by an unauthorized user to gain access to a system by posing as an authorized user; ), falsification (a student may alter his or her grades on a school database), and repudiation(., a user denies sending or receiving data.) are threat actions that cause __________ threat consequences.

Deception

a threat to system integrity

Deception

Damages can include:

Disclosure of information Modification of data Being unable to do your job because required resources are not available Identity spoofing (identity "theft") Unauthorised access to services Lost revenue Damaged reputation Theft of equipment ...

Security problems can rarely be ______ but they can be ______.

Eliminated, managed.

Availability (As Key security concept)

Ensuring timely and reliable access to and use of information

Telecommunication Fraud

First gen cell phones' user identifiers transmitted unprotected and were easy to intercept, used by hackers to make long distance calls, charged to the user

Integrity (As Key security concept)

Guarding against improper information modification or destruction, including ensuring information nonrepudiation and authenticity

Assets of a computer system

Hardware, Software, Data, Communication facilities and networks

Assets can include

Hardware, software, Data & Information, Services & revenue,Reputation of enterprise, trust, brand name, Employees' time

initiated by an entity inside the security perimeter

Insider attack

Incapacitation (physical destruction of a system hardware), corruption (Malicious software operates in such a way that system resources or services function in an unintended manner), obstruction (disabling communication links or altering communication control information. ) are threat actions that cause _____ threat consequences

Obstruction

initiated from outside the perimeter

Outsider attack

attempt to learn or make use of information from the system that does not affect system resources

Passive Attack

Confidentiality (As Key security concept)

Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information

Means used to deal with security attacks

Prevent Detect Respond Recover

Insider Fraud Case Study (1966)

Programmer for bank wrote code to ignore overdrafts in his bank account. Discovered when computer went down and account balances were processed manually.

An expectation of loss expressed as the probability that a particular threat will exploit a particular vulnerability with a particular harmful result

Risk

A set of rules and practices that specify or regulate how a system or organization provides security services to protect sensitive and critical system resources

Security Policy

Security

Security deals with intentional failures: there is at some stage a decision by a person do something he is not supposed to do.

Computer security strategy consists of

Security policy, Security implementation, Assurance, Evaluation

Password Sniffing Case Study (1978)

Student wrote program for "time sharing" and left on flash drive sitting out for curious students to pick up. Upon execution, program would "crash" and then ask for username and password, obtaining users login information.

Data contained in an information system; or a service provided by a system; or a sysem capability;

System Resource (Asset)

SMS Fraud

Text sent to number asking them to call back a number and they were then redirected to a long distance number and charged for it.

Levels of Impact - Low

The loss could be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals

Levels of Impact - Moderate

The loss could be expected to have a serious adverse effect on organizational operations, organizational assets, or individuals

Levels of Impact - High

The loss could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals

A potential violation of security; which exists when there is a circumstance capability, action, or event that could breach security and cause harm.

Threat

Identity Fraud Case Study (1971)

Two competing companies with mutual customer. One company's employee obtains customers number that he uses to call companies. Calls competitor using that number pretending to be customer and requests codes and punch cards to be sent. Discovered when company asks customer about these things and customer has no idea about it.

Possible Dangers for Computer systems

Viruses Worms Trojan Horses Spyware Adware Backdoors Logic bombs others

Human Attack Surface

Vulnerabilities created by personnel or outsiders, such as social engineering, human error, and trusted insiders

Software Attack Surface

Vulnerabilities in application, utility, or operating system code

Network Attack Surface

Vulnerabilities over an enterprise network, wide-area network, or the Internet

Attack=

a threat carried out

Usability

addresses problems arising from operating mistakes made by users.

Software (as an asset) includes:

applications, operating systems, database systems, source code, object code

a threat to availability to system integrity

disruption

Data & Information (as an asset) includes:

essential data for running and planning your business, design plans, digital content, data about customers, ...

Hardware (As an asset) includes:

laptops, servers, routers, PDAs, mobile phones, smart cards

Some thing is Unavailable or very slow (Category of vulnerability)

loss of availability

Some thing is Leaky (Category of vulnerability)

loss of confidentiality

Some thing is Corrupted(Category of vulnerability) =

loss of integrity

Protection of the assets of an organisation is the responsibility of

management.

Attacker only needs to find ________ while developers must find __________

one single weakness / all possible weaknesses

Security requires ______________ monitoring

regular and constant

To decide what to protect you should perform some kind of

risk analysis

Security policies formulate

security objectives

Price paid for security should not exceed

the value of the assets you want to protect.

To be effective, security policies must be supported by ________. They should issue a ________.

top management, security charter

Exposure (intentional releases of sensitive information), interception (a determined hacker can gain access to communication traffic and other data transfers between two persons or entities. ) , interference (adversary gains information from analyzing the network traffic. ), intrusion(adversary gaining unauthorized access to sensitive data information.) cause

unauthorized disclosure

Users and system managers tend to not see the benefits of security

until a failure occurs

Misappropriation (a distributed denial of service attack,) and misuse (disabling or thwarting security functions of a service) are threat actions that cause ______ threat consequences

usurpation

a threat to system integrity

usurpation

A flaw or weakness in a systems design

vulnerability


Ensembles d'études connexes

CJUS 3610 FINAL EXAM REVIEW(Juvenile Justice)

View Set

Chapter 10 Smartbook Questions -- Finance

View Set

51 Physician Assistant School Interview Questions (The Physician Assistant Life)

View Set

Microbiology Chapter 1 Questions

View Set

Physiological Psychology: Vision

View Set

Human Biology___McGraw Hill___SmartBook 8

View Set

Ch. 14- Exercise for Health and Fitness

View Set