• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/131

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

131 Cards in this Set

  • Front
  • Back

Define information security.

It is about maintaining integrity, confidentiality, and availability.

Describe integrity

Integrity is about ensuring that the data is protected from modification by unauthorized users. only trustworthy data can be considered valuable. an example is a student hacking into a database and changing grades.

Describe confidentiality

confidentiality is about ensuring that the data is only visible to people with the appropriate security access. it is the principle of restricting access to information. examples of confidentiality breach are the loss of disk containing sensitive information.

Describe availability

Availability is about ensuring that the data is always accessible for when required by a stakeholder. Concerned with keeping systems containing the data running. example is a system taken out by a disaster.

What is a threat?

A threat is a potential danger to an asset.

What is an attack?

an attack is an action that exploits a vulnerability.

what is a vulnerability?

A vulnerability is a weakness in a system that enables an attack.

Give an example of threats, vulnerabilities, and attacks.

consider a database system. A threat is an unauthorised person that could access the database. a vulnerability would be an unremoved test account with a default password. an attack is an actual intrusion trying to download the data of the database.

What are security controls?

Security controls are processes or mechanisms put into place to ensure the integrity, confidentiality, and availability of an asset.

Name three types of security controls.

Administrative(which includes staff training policies etc.), technological(fire walls, encryption algorithms, and antivirus programs) and physical controls(alarms, security guards etc.)

What is the purpose of the security officer(SO)

A security officer is a person who is responsible for handling the information security in an organisation. might be a team in larger companies and just an added responsibility in smaller companies.

What are the responsibilities of a security officer

Defines the corporate security policies. Defines the specific system security policies. trains the staff on security matters. creates and maintains a plan for implementing controls. appoints auditors.

How does an SO fit into the hierarchy of company.

An SO should be reporting to the CEO or board of directors of the company and might even be a member of the board. an so is like an intermediary between management and the users. It is important for an SO to have support from the board as they might otherwise be questioning financial costs of controls and ignore potential risks. Board members might also be afraid of increased responsibility for unknown risks.

What is risk assessment?

It is a tool to help understand what is at risk at a company(identifying assets), how much is at risk(values), where are the risks coming from(threats and vulnerabilities),how can the risk be reduced(identifying counter meassures) and what is the cost of such a reduction.

Describe SLE

Single loss expectancy(SLE) is a way of calculating the impact of a specific threat occurring from a cost perspective.




It is calculated as SLE = AV * EF
where AV is asset value and ef is the exposure factor which is the factor of the asset that is lost when a threat actually occurs. SLE is usually measured on an annual basis.

What is EF?

EF is the exposure factor which meassures what factor of an asset that is lost when a threat occurs. usually in the range between 0-1


where 1 is the value completely lost.

What is Av

AV is the asset value which is the total value of an asset under threat.

What is ARO

The annual rate of occurrence. This represents the frequency at which a threat occur per year.

How is ALE calculated

ALE = SLE * ARO
i.e. The annual loss expectancy is the single loss expectancy times the annual rate of occurrence.

How do you calculate the effect of a counter measure on the ALE?

We calculate the reduced risk by taking ALE(before) - ALE(after) and then we subtract the cost of the countermeasure:
ALE(before) - ALE(after) = -AC(control) where AC is accumulated cost.

How does risk assessment apply to information security?

We need to analyse a few aspects, the value of the information system and its assets, the possible threats to the system, vulnerabilities of the systems and the cost of the counter measures.

How do we measure risk?

Risk is a function of the threat, vulnerability and the asset value. this risk can be reduced using controls.

give an example of reducing a threat.

do a background check on employees.

give an example on how to reduce a vulnerability

keep systems up to date by installing patches and firewalls etc.

give an example of how to reduce asset value

encrypting the data so that it is worthless to an observer.

Detail the stages of the overall assessment process

It starts with asset valuation. from there either a threat assessment, vulnerability assessment or risk determination can be applied. from the risk determination, safeguards are assessed which lead to a decision support analysis which can either lead to a re-evaluation of the assets or the introduction of another safeguard assessment.

Detail two types of assets

Intangible assets(software and information)
Tangible assets(hardware, buildings etc.)

How can we evaluate intangible information assets?

The delphi method can be applied. It starts with experts being questioned on the value of an asset and the reasoning for their valuation. after a round of questioning has been completed, a facilitator summarises the answers from the experts. The summary is then given back to the experts anonymously and a new round of questioning is started where the experts review their answers.

What is Zareer pavris method for measuring the value of information assets?

To use either a cost based and/or an income generating approach to arrive at concreate numbers.




The cost approach tries to put a fair market value on the assets.




the income approach tries to measure the income stream generated by the products/services associated with the information asset.




Can not be considered an exact science.

Detail two types of threats

Accidental - threats caused by whether or accidents

intentional - caused by entities with an intention of exploiting a threat.

Why can it be difficult to perform a threat analysis?

because it can be very easy to overlook some of the threats.

What is a vulnerability analysis?

it is an attempt at identifying the vulnerabilities of a system or organisation. Some people argue that vulnerability analysis should be done before threat analysis since if there are no vulnerabilities then there are no threats but this is often impractical as many vulnerabilities might not be identified during an analysis.

How can one start a vulnerability analysis?

it can be very tedious and time consuming to perform such a process however there are databases that provide examples of documented vulnerabilities.

how do we perform risk assessment?

we need to find vulnerabilities and map these to threats and what assets are affected by these threats.

What is risk modelling?

risk modelling aims to answer a few questions: what could happen(threat/vulnerability), how bad could it be(impact), how often might it occur(frequency and probability), how certain can these answers be(uncertainty)




the first question is answered through threat and vulnerability analysis)




the second through asset valuation




uncertainty can be modelled as bounded distribution





What kind of data is often relied upon when performing risk modelling?

statistical data from internal sources, employees, customers and risk assessment tools etc.

What is quantitative risk assessment?

It is when trying to put a number on everything in the assessment process. ALE is an example of a quantitative risk assessment. it relies on reliable data and the application of appropriate tools to produce usable results.




If care is not taken, quantitative assessment can lead to false security.

What is a qualititative assessment?

it is when rankings of the risks are used instead of numbers. Threats may have various levels and assets can be valued based on importance.

It is easier to understand for most people but can easily be subjective and results of cost/benefits can be harder to determine.

What is important when looking for accreditation?

concrete methodology is important, i.e performed by a knowledgeable person and in a systematic way

What are hybrid approaches?

Hybrid approaches are when a mix of quantitative and qualitative processes are used to perform the risk assessment.

What is CRAMM?

Cramm is a tool for performing risk assessment. it uses a risk matrix and is a qualitative approach to risk assessment which are mapped to different levels of ALE. It allows you to apply controls from a data base.

what is a penetration study?

it is when an organisation bring in experts that try to exploit vulnerabilities.

What is the flaw hypothesis methodology?

it is a framework for conducting penetration studies and have the following steps:

vulnerabilities are identified through information gathering.

flaws are hypothesised,

flaws are tested.

flaws are generalised,

and finally flaws are eliminated.


What are common criticism of penetration studies?

they are used by security companies to improve their rep.

What is an important and commonly overlooked part of implementing information security?

putting sensible procedures and practices in place.

what is a security policy?

it is a set of documents stating an organisation's philosophy, strategy and practices with regards to confidentiality, integrity and availability of information.

Why is it important to apply policies as well as technology to ensure security?

They help tieing in upper management, it allows for a paper trail for detailing how a company complies with its obligations. it also helps defining a strategy with regards to what to protect and to what cost. it also helps as a guide for employees.

how do one create a security policy?

First find out about the risk, the policy should then cover control mechanisms to cover the risks found in the risk assessment, in order to get risk down to an acceptable level.



Detail important aspects of security policies.

Classification and access control models.

What is Discretionary access control(DAC)

it is where each data object is own by a user and the user decides which other users will have access to the data object.

This is commonly used in operating systems

What is Mandatory Access control(MAC)

It is when access control is mandated using an entire system(system-wide) policy with no user control. often used by military.

What is an access control matrix?

an access control matrix is used to describe the protection state of information or a system.

It has objects (o) which need protection.

there are subjects(s) which wants access to the objects.

an there are rights(r(o,s)) which define which type of rights a subject have to access to an object.




This can be organized in a matrix.




It specifies permissions on an abstract level and limits the damage certain subjects can cause.

What are problems with access control matrices?

they dont scale well, i.e. they require a large number of entries for representation.




many entries may also be empty taking up unused memory space.


What are capability lists and what are their drawbacks?

It is when storing access control as a list for each user. this uses less memory than the access control matrices however they are costly to look up as each list need to be traversed to find several users access rights.

What are access control lists?

this is when storing the access control matric column wide where each asset is a row and all users access rights are stored in that row. easier to look up multiple users rights compared to capability lists but still doesn't scale well.

How can access control lists be improved?

One can utilize groups and tracking which members are part of a group. This is often used by operating systems.

Ownership of a file is still controlled by a user which can delegate rights.


this might not be scalable for larger organizations.

What is the belll la padula model?(BLP)

In the BLP, every document has a security classification.




More sensitive information has a higher security level.




Every user has a clearance(level).




The classification and clearance is not done by users, instead by some authoritative entity.




Had military origin.

Detail the Bell la padula model.

Assume objects(o) and subjects(s)




let c(o) be the classification of the object and c(s) be the clearance of the subject.

s may have access to o only if c(o) <= c(s)




s only has write access if c(o) <= c(p) which seems counter intuitive but is designed to avoid sensitive information becoming accessible to users with lower clearance.



How can the Bell la padula model be extended through categories?

each data object can be assigned different categories which will provide an additional filter level that would allow for subjects to only view information that they really need.

How can categories be visualized?

as a lattice with all categories and 0 representing data objects with no category.

Describe the Clark-wilson integrity model.

The CW model is concerned with protecting the integrity of data as well as the user access.




It uses two important mechanisms

well-formed transactions which are constraints users in how they can manipulate the data.




And separation of duty, which separates the processes of an action over multiple entities

What are constrained and unconstrained data in the Clark-Wilson model?

these are data objects that either can be modified or cannot which would uphold the integrity of the data.

How is the integrity policy defined in the CW model.

Using integrity verification procedures(IPV) and transformation procedures.

IPVs check all the constrained data items(CDI) in a system to conform to integrity and confirms upon completion that the integrity was maintained. An example of this might be that an auditor confirms that the change to a book is reconciled and accurate.

Transformation procedures(TP) correspont to a well-formed transaction that does not violate the format of the CDI.

How does CW work?

FIrst we start in a valid state, and we only manipulate CDIs with TPs. thus we will always be in a valid state.

Why do IVPs and TPS in the CW model need certification?

because we need to ensure that CDIs are only manipulated by TPs and that IVPs and TPs are well behaved.

How are IVPs and TPs certified in the CW model

through the security officer or similar agent. This process is rarely automated.

How is integrity assured in the CW model?

through enforcement (by a system)
and through certification which is done by a human.

The rules used for such certification is done through E rules and C rules.

What are the basic framework rules of the CW model?

C1: IVP verification, successful execution confirms that all CDIs are in a valid state.
C2: TP verification, agent specifies which TPs that apply for which CDI

E1: TP enforcement, the system maintains a list of CDIs that only allows manipulation of CDIs through the validated TPs

What is a role based access control?

it is a mandatory access control model that does not have secrecy levels like Bell la Padula.
It is a slightly more strict version of the ACL model where certified entitry grants and revokes access rather than users.

users are put in different groups referred to as roles.

users can access data objects based on their roles.

An example is a hospital where doctors have different rights compared to nurses.


Detail the formal definition of the RBAC

subject s
role r
transition t
object o
mode x

AR(s) active role of the subject
RA(s) roles that s is allowed to performed
TA(r) transactions that a role is allowed to do

A subject s may execute a transaction t if exec (t,s) is true

exec(t,s) is defined as
if t is in TA(AR(s))

List the rules of RBAC

1 rule assignment: all subjects must have a role to be allowed to perform an action


2 rule authorisation: for all s : AR(s) is in RA(s)
3 transaction authorization:
for all S:t : exec(t,s) is true only if t is in TA(RA(s))
4 Options on access

How can role relationships be visualised?

user1->role1->object1
user2->role1->object2


Think of the doctor example where two doctors can prescribe and diagnose tow different objects through their role.

Summarize RBAC

MAC is usually for military applicaiton
DAC not as strict
RBAC finds a middleground

List ideal characteristics of a policy for an organisation.

1. ligth, should not cover many pages.


2. simple and practical


3.easy to manage and maintain.


4.accessible, easy to find for members of the org.

how should a policy be organised?

in a hierarchical fashion:
the security framework paper which detail things such as the organisations commitment to information security, classification system, make clear that administrators are kept accountable, state clear responsibilities of individuals.

below in the hierarchy are the position papers that address specific aspects of the security policy. these should be kept focused and short.

List common categories of a position paper:

scope, ownership, validity over time, responsibilities, compliance, supporting documentation, position statements and review.

What is social engineering and what is it about?

social engineers bypass technical defences by targeting people. it is to manipulate people to aquire confidential information or perform fraudulent actions

Give some examples of social engineering

posing as an employee, vendor, partner company or somebody with authority. uses internal lingo to gain trust, offers help if problems occurr and then causes them. sending trojans and viruses, asking receptionist to forward faxes and emails,

Describe the social engineering lifecycle

1. research, where the attackers try to find as much information as possible on from online, seminars, dumpster diving etc.


2. Developing trust, uses insider infromation, identity misinterpretation, need or help from authority.


3. Exploiting trust, ask or manipulate victim in form of help to get access to information.


4. Utilise information and recycle through the previous stages if necessary

List a set of reasons why social engineering works

It exploits tendencies of human nature such as:
Authority: people tend to comply with other people with authority
Liking: people generally complies with a person when they like them.
Reciprocation: People feel obliged if they have received favours.


Consistency: people feel they need to honour any pledges or commitments done in public.
Social validation: people tend to perform actions similar to what other people around are doing.


Scarcity: people behave differently when a set of resources they depend on are limited.

List some common warning signs of social engineering

Unusual requests, refusal to give callback number, claim of authority, stresses urgency, shows discomfort when questioned or challenged, compliments or flattering and flirting.

How can social engineering be prevented?

By having procedures in place for handling unusual requests, training staff, explanation of the need for certain procedure.

Name a few items that are important to teach when training staff

Make sure that employees verifies the identity of visitors and callers, by for instance asking for id, supervisors contact details, and having trusted employees vouch for the person.

Staff also need to ask "need-to-know" questions to understand why the person need the information.

Ensuring that the staff holding on to sensitive information are aware of the consequences of sharing the information.

Staff should be trained to challenge authority when dealing with sensitive situations.

Ensure that everyone is part of the training.

The items should not be taught in long time consuming seminars, instead, they should be done through hands on exercises that simulate the real situation. such as staging fake attacks
to then debrief the trainees on how to improve their behaviour without using punitive actions.

What is crytography?

It is the art and science of keeping information secure.

What is cryptoanalysis?

the art and science of breaking a code

what is cryptology?

it is the branch of math needed to for cryptography and cryptoanalysis.

How can cryptography help information security?

It can help with confidentiality by only allowing authorised personel decrypt information

Authentification: a receiver of a message should be able to ascertain the origin of the message

integrity: the receiver should be able to validate that the information was not modified before received.


Non-repudiation: a sender should not be able to deny that they sent a message.

What is plain text or clear text?

it is the original message

what is encryption?

the process of disguising the contents of a message

What is a ciphertext?

it is an encrypted message.

what is decryption?

it is the process of turning ciphertext back in to plaintext.

list the basic definitions of cryptography

Plaintext P or M
Ciphertext C (usually binary data)
Encryption function E

E(M) = C

Decryption function D

D(C) = M

What is a cryptographic algorithm? (sometimes referred to as a cipher.

it is a mathematical function used for encryption or decryption.

Often two functions, one for encryption and one for decryption.

What is a restricted algorithm?

It is an algorithm which security is based on the algorithm being secret. This is usually not a useful approach as the algorithm would have to change everytime someone leaves the group.


A group might not have the knowledge to create a new cipher all the time.

What is a key?

A key is a value taken from a large set of possible values(key space) which is used as input to either the encrypt of decrypt function.

i.e. Eke(M) =C, Dkd(C) = M, Dkd(Ekd(M))=M

What is a symmetric algorithm?

A symmetric algorithm, sometimes called a conventional algorithm is when a key is identical for both decryption and encryption. anyone who has the key can encrypt the message. however two people need to agree on the key for it to work.

What is an asymmetric key?

Asymmetric algorithms are often called public key algorithms. They use a public key for encrypting and a private key for decrypting. public keys can be published so that anybody can encrypt messages. the private key is only used by the receiver. only works if the private key cannot be calculated from the public key in reasonable time. A good analogy is a padlock.

What is the benefit of using a key?

The security is stored in the key rather than in the algorithm.

The advantages of this are that the software for the algorithm can be mass-produced, eavesdroppers won't be able to read the information even if they know the algorithm and the algorithms can be analysed by experts for flaws.

What is a cryptosystem?

A cryptosystem consists of the algorithm, the keys and all possible plaintexts and cypher texts.

List the 4 most important encryption techniques.

substitution ciphers
Transposition ciphers
stream ciphers
block ciphers

What is a substitution cipher?

it is when each character in the plain text is substituted or mapped to another character.

What is the caesar cipher?

it is when all character in the text are shifter three characters in the original cipher.

What are the natural numbers

they are the positive integers.

what is factorisation?

it is the process of breaking up a number into smaller factors.

what is a prime number

it is a number that it only divisible with itself and 1

What is prime factorisation?

it is when a number is expressed as factors of prime numbers.

Define modulus

In computing, mod returns the remainder.


in number theory a=b mod n
or a is congruent to b modulo n

i.e. n is a divisor of a -b

What are the three types of modular arithmetic?

modular addition, modular multipication and modular exponentiation

What is a multiplicative inverse?

it is the number multiplied by x mod n which yields 1

Describe xor encryption?

C = M xor K
m = C xor K

(A symmetrical algorithm)

What is another name for a simple substitution cipher?

monoalphabetic substitution cipher, it is when the alphabet is mapped to a random permutation of the alphabet.

Why are monoalphabetic substitution ciphers not very secure?

because they are easily solved statistically using the distribution of characters in an alphabet.

What is a homophonic substitution cipher?

it is an encoding that tries to obsure the mappings by applying multiple values to the same character. still not very secure and can also be solved statistically.

What is a polygram substitution cipher?

it is an encoding that encrypts groups of letters rather than single ones. not very secure either.

What is a polyalphabetic substitution cipher?

it is an encryption that uses multiple simple substitution ciphers.


An example of such an cipher is the vigenere substitution which adds the keys of multiple letters and performs a modulo to map it. C= M+K this can easily be solved perodically over longer sentences.

What is a rotor machine?

mechanical encryption device developed in the 1920s. implemented complex polyalphabetic substitution cipher. Enigma is an example of a rotor machine.

what is a transposition cipher?

it is an encoding where the characters stay the same but the order is changed.

What is a simple columnar transposition cipher?

it is a cipher where all the characters are written as a matrix where the ciphertext is read vertically from the columns.

What is double columnar transposition?

a slightly more difficult encryption than simple columnar transposition cipher which a second transposition is applied.,

What is a steam cipher

a type of symmetrical algorithm that operates on a single bit or character at a time.

what is a block cipher?

it is a symmetrical algorithm that operates on multiple characters . examples play fair.

What is confusion and diffusion?

Confusion adds a value to the plain text symbol to confuse the attacker

Diffusion spreads the plain text information through the cipher text.

What is an SP network?

it is a block cipher that uses a simple combination od substitution and permutation circuits to encode the data.

What is an S-Box

an sbox is a substitution box which is a look-up table of permutations of input data. S-boxes depend on 1-1 mappings to enable decryption. the output of an sbox is shuffled before fed to the next stage of permutations. each stages is referred to as a round.

How can a key be added to an SP network?

A key is applied after each round using an xor encryption.

What is the main reason of using an SP network?

it saves memory space when encrypting.

What is required to ensure security of an SP network?

The block size need to be large enough, there need to be enough rounds and sboxes need to be chosen carefully.

How can a small block size be decrypted

using a dictionary. the smaller the block size is the easier it is to build such a dictionary.

What is the avalanche effect?

it is when a slight change to input generates a large change in the output.

How can the avalanche effect be achieved in SP networks?

by having a large number of rounds.

What is important to consider when choosing s-boxes?

to ensure that there is as much randomness as possible.