Computer and Information Security Basics

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Why is it essential to define security with precision?

  • To ensure that the system is aesthetically pleasing.
  • To avoid under-defined questions that lack clear solutions. (correct)
  • To make the system more complex and harder to understand.
  • To confuse potential attackers.

Why is achieving 'perfect security' considered practically impossible?

  • Because perfect security is only possible with expensive hardware.
  • Because attackers always have more resources than defenders.
  • Because defenders need to ensure every aspect is secure, while attackers only need to find a single vulnerability. (correct)
  • Because security is solely the responsibility of end-users.

According to the content, what is crucial for flawed humans to avoid missing security considerations?

  • Ignoring simple security measures.
  • Adopting security models and systematic thinking. (correct)
  • Relying on intuition and gut feelings.
  • Taking mental shortcuts for efficiency.

What does the CIA triad primarily aim to ensure?

<p>Confidentiality, integrity, and availability of information. (D)</p>
Signup and view all the answers

According to the material, what does 'integrity' in the CIA triad specifically guard against?

<p>Improper modification or destruction of information. (C)</p>
Signup and view all the answers

In the context of computer security, what is the main purpose of 'countermeasures'?

<p>To provide general defenses for an asset. (A)</p>
Signup and view all the answers

How do threats typically function in the context of computer security?

<p>They exploit one or more vulnerabilities of an asset. (C)</p>
Signup and view all the answers

Why should the concept of 'reducing risk' be approached with caution?

<p>Because it implies that achieving complete security is possible. (C)</p>
Signup and view all the answers

What is the critical difference between something being 'more secure' versus 'fully secure'?

<p>More secure reduces the probability of an exploitable vulnerability but never eliminates it, while fully secure is a fallacy. (A)</p>
Signup and view all the answers

How does 'inference' constitute a class of threat related to unauthorized disclosure?

<p>By deducing sensitive information from public data. (D)</p>
Signup and view all the answers

What type of threat involves manipulating data, such as altering grades in a database?

<p>Falsification. (A)</p>
Signup and view all the answers

Which option illustrates a 'disruption' threat?

<p>Launching a denial-of-service attack to incapacitate a system. (C)</p>
Signup and view all the answers

What is an example of a 'misappropriation of service' that constitutes a usurpation threat?

<p>Using telephone services without authorization. (B)</p>
Signup and view all the answers

In the context of asset availability, what scenario exemplifies a threat against hardware?

<p>Physical theft or disabling of equipment. (A)</p>
Signup and view all the answers

What exemplifies a breach of confidentiality concerning data assets?

<p>Unauthorized reading of user data. (A)</p>
Signup and view all the answers

According to FIPS 200, what is the purpose of 'access control'?

<p>To limit who gets in and what they can do. (D)</p>
Signup and view all the answers

Why is 'awareness and training' a key security requirement under FIPS 200?

<p>To prevent uninformed users from unintentionally aiding attacks. (A)</p>
Signup and view all the answers

What does 'contingency management' entail according to FIPS 200?

<p>Having plans ready for emergencies. (A)</p>
Signup and view all the answers

How does 'media protection' contribute to security, as defined by FIPS 200?

<p>By keeping storage devices safe, even when discarding them. (C)</p>
Signup and view all the answers

What makes a 'good model of security' effective?

<p>It integrates security considerations throughout every part of the organization. (C)</p>
Signup and view all the answers

What is the definition of 'attack surface'?

<p>The number of ways an attacker could interact with a system. (C)</p>
Signup and view all the answers

Which of the following practices helps reduce the potential attack surface of a system?

<p>Finding ways to reduce the points of interaction an attacker could use. (A)</p>
Signup and view all the answers

What is a critical aspect of the 'evaluation' stage in a security strategy?

<p>Proving that the implemented security measures are actually effective. (C)</p>
Signup and view all the answers

When developing defenses, why is critical to define assets at risk, vulnerabilities, and attacker's capabilities?

<p>To allow for a systematic approach to prevent attacks. (B)</p>
Signup and view all the answers

In the context of threat modeling, what is the benefit of systematic thinking?

<p>It identifies specific guarantees by defenses. (C)</p>
Signup and view all the answers

What is the ultimate goal of threat modeling?

<p>To compare techniques in terms of cost/benefit tradeoffs. (C)</p>
Signup and view all the answers

In the context of HTTPS, why is encrypting communications using negotiated keys an effective defense?

<p>Because attackers cannot deduce the key or decrypt communications. (B)</p>
Signup and view all the answers

Why is constant vigilance required to maintain a strong security posture?

<p>Because attacker's only have to find a single flaw. (A)</p>
Signup and view all the answers

According to the conclusion, which of the following should be applied to ensure the best security?

<p>Applying systematic thinking guided by models. (A)</p>
Signup and view all the answers

Flashcards

Information Security

The protection of information and systems from unauthorized access, use, disclosure, disruption, modification, or destruction.

Confidentiality

Preserving authorized restrictions on information access and disclosure.

Integrity

Guarding against improper information modification or destruction.

Availability

Ensuring timely and reliable access to and use of information.

Signup and view all the flashcards

Assets

Valued hardware, software, data, and communications.

Signup and view all the flashcards

Threats

Specific attacks against an asset.

Signup and view all the flashcards

Countermeasures

General defenses for an asset.

Signup and view all the flashcards

Risk

Our perception of exposure to threats.

Signup and view all the flashcards

Vulnerability

A weakness in the asset that can be exploited.

Signup and view all the flashcards

Attack

A threat that is carried out leading to a violation of CIA triad.

Signup and view all the flashcards

Unauthorized disclosure

Preserving the privacy of sensitive information.

Signup and view all the flashcards

Deception

Manipulating data to be untrue or misleading.

Signup and view all the flashcards

Disruption

Interruption of operations or systems.

Signup and view all the flashcards

Usurpation

Unauthorized use of services or systems.

Signup and view all the flashcards

Access control

Limiting who can access what resources.

Signup and view all the flashcards

Awareness and training

Informing users about security risks and best practices.

Signup and view all the flashcards

Auditing and accountability

Monitoring and recording system activities.

Signup and view all the flashcards

Certification and assessment

Reviewing security measures to ensure effectiveness.

Signup and view all the flashcards

Config management

Tracking and managing how systems are set up.

Signup and view all the flashcards

Contingency management

Having plans ready for emergencies and disasters.

Signup and view all the flashcards

Identification/authorization

Verifying and validating user identities.

Signup and view all the flashcards

Incident response

Steps to take when a security breach occurs.

Signup and view all the flashcards

Maintenance

Actively maintaining systems.

Signup and view all the flashcards

Media protection

Keeping storage devices secure, even when discarded.

Signup and view all the flashcards

Physical/environmental protection

Securing physical access to systems and facilities.

Signup and view all the flashcards

Planning

All activities are planned before execution.

Signup and view all the flashcards

Personnel security

Screening and vetting personnel with access.

Signup and view all the flashcards

Risk assessment

Analysis to determine investments in proportion to risk.

Signup and view all the flashcards

Attack surface

How available an asset is in relation to threats.

Signup and view all the flashcards

Implementation

Identifying mechanisms of prevention, detection, response, and recovery.

Signup and view all the flashcards

Study Notes

Computer Security Overview

  • Precision of thought is an important lesson in computer security.
  • If a circle is drawn with imperfect pixels then a flood fill can penetrate it.
  • A defender needs perfect pixels, but an attacker only needs one flaw.
  • Perfect security is usually impossible to prove.
  • Security models help humans avoid missing something.
  • Requires systematic thinking to avoid mistakes based on intuition.

Information Security

  • The protection of information and information systems against unauthorized access, use, disclosure, disruption, modification, or destruction.
  • Ensures confidentiality, integrity and availability.

The CIA Triad

  • Confidentiality: Preserving authorized restrictions on information access and disclosure, including protecting personal privacy and proprietary information.
  • Integrity: Guarding against improper information modification or destruction, and ensuring information non-repudiation and authenticity.
  • Data Integrity: The property that data has not been altered in an unauthorized manner, covering data in storage, processing, and transit.
  • System Integrity: The quality of a system performing its intended function unimpaired, free from unauthorized manipulation.
  • Availability: Ensuring timely and reliable access to and use of information.

Computer Security Model Components

  • Assets: The valued hardware, software, data, and communications.
  • Threats: Specific attacks against an asset.
  • Countermeasures: General defenses for an asset.
  • Risk: Summarized perception of exposure to threats.

How Threats Work

  • Threats exploit one or more vulnerabilities of an asset.
  • Vulnerability can be a design flaw or a resource constraint.
  • An attack is a threat carried out, leading to a violation of the CIA triad.
  • Types of attacks include information leakage which fails confidentiality.
  • Types of attacks include doing the wrong thing, or giving the wrong answer failing integrity.
  • Types of attacks include becoming unusable or inaccessible violating availability.
  • A Countermeasure deals with a particular class of attack, ideally preventing.
  • Ideally a Countermeasure is able to detect and recover from an attack if prevention fails.

Reducing Risk

  • Security of a system is boolean: vulnerable or not vulnerable.
  • Applying countermeasures reduces the probability of attacks succeeding.

Security Terminology

  • "More Secure" means countermeasures reduce the probability of an exploitable vulnerability being available to attackers, but this probability never reaches zero.
  • "Fully Secure" is a delusion, implying complete security is achievable.

Classes of Threats

  • Unauthorized disclosure includes exposure of sensitive information, and the interception of transit information via network sniffing.
  • Unauthorized disclosure includes inference of info from public data and intrusion into a system.
  • Deception includes masquerading, falsification of data and repudiation.
  • Disruption includes incapacitation of a system, corruption of data and obstructing communications.
  • Usurpation includes misappropriation of service and misuse of service.

CIA Triad Application

  • Hardware availability can be compromised by stolen or disabled equipment.
  • Hardware confidentiality can be compromised by stolen physical media.
  • Hardware integrity can be compromised by hardware modified with tracking or control mechanisms.
  • Software availability can be compromised by corrupting OS or program files.
  • Software confidentiality can be compromised by proprietary software theft.
  • Software integrity can be compromised by including tracking mechanisms or malicious control (e.g., malware).
  • Data availability can be compromised by deleted or corrupted files.
  • Data confidentiality can be compromised by unauthorized reading of data.
  • Data integrity can be compromised by malicious actor modifying files.
  • Communications availability can be compromised by blocked messages or damaged communication lines.
  • Communications confidentiality can be compromised by intercepted messages or traffic pattern analysis.
  • Communications integrity can be compromised by modified, duplicated, fabricated, or molested messages in transit.

FIPS 200 Requirements

  • Access control limits who gets in and what they can do.
  • Awareness and training prevent uninformed users from aiding attacks.
  • Auditing and accountability tracks who’s doing what.
  • Certification and assessment periodically reviews security posture.
  • Config management tracks configured items, noting changes.
  • Contingency management includes plans for emergencies.
  • Identification/authorization checks user identities.
  • Incident response plans for responding during/after a breach.
  • Maintenance actively maintains systems.
  • Media protection keeps storage safe.
  • Physical/environmental protection secures doors, walls, cameras, etc.
  • Planning involves thoughtful action, avoiding “cowboy IT".
  • Personnel security vets those working within the systems.
  • Risk assessment analyzes risk and invest proportionally.
  • Systems and services acquisition sources goods/services wisely.
  • System and communication protection encompasses good software engineering.
  • System and information integrity uses malware countermeasures.

Security Models

  • The Good security thread runs through everything.
  • The Bad security model involves a separate silo.

Attack Surface

  • Attack surface is how many ways an attacker can interact with a system.
  • Attack surface includes the software itself, the network, and humans.
  • Windows 95 has a large attack surface, listening for connections on several ports with various services.
  • Windows 10 has a smaller attack surface, listening on a few ports with a firewall blocking connections.
  • Ubuntu Linux 22.04 has a smaller attack surface, listening on no ports.
  • Reducing the attack surface is good practice.

Security Strategy

  • Specification/policy defines the goal, considering tradeoffs against ease of use and cost.
  • Implementation identifies mechanisms of prevention, detection, response, and recovery.
  • Evaluation proves it is working rather than assuming it is.

Threat Models

  • When designing a defense, the goal must be known.
  • Must define assets at risk.
  • Must define vulnerability which is being protected against.
  • Has to define attacker's capabilities/knowledge.

Threat Modeling Example: HTTPS

  • HTTPS is the encrypted form of HTTP for secure web traffic
  • Assets at risk include private user communications, including credentials.
  • The vulnerability is that packets may be intercepted in transit.
  • Attacker can intercept packets for a specific user or for the site as a whole
  • Negotiating a key in open communication known only to user and server; all content is encrypted with this key.
  • Attacker cannot deduce key and therefore cannot decrypt communications. They do know, however, that communication happened and roughly how much.

Why Threat Model?

  • Threat models help move from more secure to a specific guarantee.
  • Threat models promote systematic thinking about when a defense can and cannot do.
  • Threat models allow to compare techniques in terms of cost/benefit tradeoffs.
  • Threat models help understand what attacks are still on the table.

Conclusion

  • Perfect security is impossible.
  • The struggle is constant to ensure everything is correct.
  • An attacker has to find a single flaw.
  • Use systematic thinking guided by models is best practice.
  • The CIA triad is an example of best practice.
  • An information security model, security strategy and attack surface/threat modeling are best practice.
  • Reduce likelihood of missing something with design principles.
  • FIPS 200 security requirements are an example of best practice.
  • Design principles for security in software design is best practice.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

CIT114 Information Security Week 02
10 questions

CIT114 Information Security Week 02

RicherPrehistoricArt1837 avatar
RicherPrehistoricArt1837
Computer Security: CIA Triad
29 questions
Computer Security: Definition and CIA Triad
29 questions
Use Quizgecko on...
Browser
Browser