Podcast
Questions and Answers
What is the term for a circumstance or event that interrupts or prevents the correct operation of system services and functions?
What is the term for a circumstance or event that interrupts or prevents the correct operation of system services and functions?
What is the result of an entity assuming unauthorized logical or physical control of a system resource?
What is the result of an entity assuming unauthorized logical or physical control of a system resource?
What type of asset is an unencrypted USB drive an example of?
What type of asset is an unencrypted USB drive an example of?
What is the term for an action that causes a system component to perform a function or service that is detrimental to system security?
What is the term for an action that causes a system component to perform a function or service that is detrimental to system security?
Signup and view all the answers
What is the term for a threat that negatively modifies system functions or data?
What is the term for a threat that negatively modifies system functions or data?
Signup and view all the answers
What is the category of assets that includes programs and applications?
What is the category of assets that includes programs and applications?
Signup and view all the answers
What is the term for a threat action that interrupts the delivery of system services by hindering system operation?
What is the term for a threat action that interrupts the delivery of system services by hindering system operation?
Signup and view all the answers
What is the term for a threat that results in an unauthorized entity controlling system services or functions?
What is the term for a threat that results in an unauthorized entity controlling system services or functions?
Signup and view all the answers
What is the primary goal of isolating public access systems from critical resources?
What is the primary goal of isolating public access systems from critical resources?
Signup and view all the answers
How does encapsulation provide protection in object-oriented functionality?
How does encapsulation provide protection in object-oriented functionality?
Signup and view all the answers
What is the main advantage of a modular security design?
What is the main advantage of a modular security design?
Signup and view all the answers
What is the purpose of layering in security?
What is the purpose of layering in security?
Signup and view all the answers
What is the principle of least astonishment in program design?
What is the principle of least astonishment in program design?
Signup and view all the answers
What is the main benefit of isolating security mechanisms?
What is the main benefit of isolating security mechanisms?
Signup and view all the answers
What is the relationship between encapsulation and isolation?
What is the relationship between encapsulation and isolation?
Signup and view all the answers
What is the primary goal of isolating processes and files of individual users?
What is the primary goal of isolating processes and files of individual users?
Signup and view all the answers
What is the primary concern of the confidentiality aspect of the security triad?
What is the primary concern of the confidentiality aspect of the security triad?
Signup and view all the answers
What type of threat is the fabrication of new files?
What type of threat is the fabrication of new files?
Signup and view all the answers
Which security area is concerned with protecting information systems from physical damage or disruption?
Which security area is concerned with protecting information systems from physical damage or disruption?
Signup and view all the answers
What is the main purpose of Risk Assessment in the context of security requirements?
What is the main purpose of Risk Assessment in the context of security requirements?
Signup and view all the answers
What is the primary concern of the availability aspect of the security triad?
What is the primary concern of the availability aspect of the security triad?
Signup and view all the answers
Which standard enumerates 17 security-related areas about protecting the confidentiality, integrity, and availability of information systems?
Which standard enumerates 17 security-related areas about protecting the confidentiality, integrity, and availability of information systems?
Signup and view all the answers
What type of threat is the deletion of files, denying access to users?
What type of threat is the deletion of files, denying access to users?
Signup and view all the answers
Which area of security requirements involves protecting information systems from unauthorized access?
Which area of security requirements involves protecting information systems from unauthorized access?
Signup and view all the answers
What are the white boxes in an Attack Tree?
What are the white boxes in an Attack Tree?
Signup and view all the answers
What is the first step in devising security services and mechanisms?
What is the first step in devising security services and mechanisms?
Signup and view all the answers
What is the goal of prevention in security implementation?
What is the goal of prevention in security implementation?
Signup and view all the answers
What is an example of recovery in security implementation?
What is an example of recovery in security implementation?
Signup and view all the answers
What is the primary concern of consumers of computer security services and mechanisms?
What is the primary concern of consumers of computer security services and mechanisms?
Signup and view all the answers
What is the security aspect that involves ensuring that the security scheme really works?
What is the security aspect that involves ensuring that the security scheme really works?
Signup and view all the answers
What are the three aspects of a comprehensive security strategy?
What are the three aspects of a comprehensive security strategy?
Signup and view all the answers
What is a critical factor to consider when developing a security policy?
What is a critical factor to consider when developing a security policy?
Signup and view all the answers
What does an attack tree represent?
What does an attack tree represent?
Signup and view all the answers
What is the purpose of the root node in an attack tree?
What is the purpose of the root node in an attack tree?
Signup and view all the answers
What type of nodes are the final nodes on the paths outward from the root in an attack tree?
What type of nodes are the final nodes on the paths outward from the root in an attack tree?
Signup and view all the answers
What is the purpose of labeling branches with values in an attack tree?
What is the purpose of labeling branches with values in an attack tree?
Signup and view all the answers
What is the motivation for using attack trees?
What is the motivation for using attack trees?
Signup and view all the answers
What can security analysts use attack trees to document?
What can security analysts use attack trees to document?
Signup and view all the answers
What can an attack tree guide?
What can an attack tree guide?
Signup and view all the answers
What is represented by the shaded boxes in an attack tree example?
What is represented by the shaded boxes in an attack tree example?
Signup and view all the answers
Study Notes
Threats to Computer Systems
- Corruption: Alters system operation by modifying system functions or data
- Obstruction: Interrupts the delivery of system services by hindering system operation
- Usurpation: An unauthorized entity assumes control of system resources or services
- Disruption: A threat to availability or system integrity that interrupts system operation
Assets of a Computer System
- Hardware
- Software
- Data
- Communication lines and networks
Scope of Computer Security
- Confidentiality: Protection of unauthorized access to data
- Integrity: Protection of data from modification or deletion
- Availability: Protection of data and systems from disruptions
Threats to Computer System Assets
- Hardware: Theft or disablement of equipment
- Software: Unauthorized copies, modification, or deletion of software
- Data: Unauthorized read, modification, or deletion of data
- Communication lines and networks: Unauthorized access, modification, or disruption of communication
Security Functional Requirements
- 17 security-related areas defined in FIPS 200 for protecting confidentiality, integrity, and availability of information systems
- Areas include access control, awareness and training, audit and accountability, and more
Countermeasures
- Isolation: Isolating public access systems from critical resources and isolating security mechanisms
- Encapsulation: Protecting data and procedures by encapsulating them in a domain of their own
- Modularity: Developing security functions as separate, protected modules
- Layering: Using multiple, overlapping protection approaches
- Least astonishment: Designing user interfaces to respond in a way that is least likely to astonish the user
Attack Trees Mechanism
- A hierarchical data structure representing potential techniques for exploiting security vulnerabilities
- Root node represents the attack goal, and branches represent ways to achieve that goal
- Subnodes define subgoals, and each subgoal may have its own set of subgoals
Attack Trees Motivation
- Effective exploitation of information on attack patterns
- Documenting security attacks in a structured form that reveals key vulnerabilities
- Guiding system design and application, and choice and strength of countermeasures
Attack Trees Example
- Analysis for an Internet banking authentication application
- Root node is the objective of the attacker, and leaf nodes represent events that comprise the attacks
Computer Security Strategies
- Specification/policy: Defining what the security scheme is supposed to do
- Implementation/mechanisms: How the security scheme is implemented
- Correctness/assurance: Ensuring the security scheme works as intended
Security Policy
- Developing a security policy involves considering the value of assets, system vulnerabilities, and potential threats
- Trade-offs between ease of use, cost of security, and cost of failure and recovery must be considered
Security Implementation
- Prevention: Ideal security scheme with no successful attack
- Detection: Detecting security attacks when prevention is not feasible
- Response: Responding to detected attacks to prevent further damage
- Recovery: Recovering from security breaches by using backup systems or reloading correct data
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz covers different types of computer security threats, including corruption, obstruction, disruption, and usurpation. It explains how these threats can affect system operation and integrity.