Information Security Exam 1 Spring 2024 –
Panda
Security involves protection from ___ and ___ - Read violations, write (modification)
violations
Security - Securing both the computer and the network
Insider Threat - Can happen when only focused on securing the network aspect and not
the computer aspect.
Threat comes from inside the organization (same network).
Both 1) causes more damage and 2) harder to detect than Outsider Threat due to
privileges/greater access to system.
Outsider Threat - Threat comes from outside the organization (different network).
Social Engineering - Tricking people into disclosing information instead of hacking
hardware
Social Engineering Methods - Showing superiority (me smart, you dumb) or inferiority
(help me plz idk anything).
Phishing (clik dis link).
WWW - World Wide Web.
Document management system of connected hyperlinks.
Internet - Connects computers.
Vulnerability - A weakness in the system that can be exploited by a threat.
Risk - Possibility of the assets suffering damage.
Risk requires all of the following to be present: Vulnerability, Asset, Threat.
Of Vulnerability, Threat, and Asset, which of them can be minimized most
effectively/commonly so that Risk may be reduced? - Vulnerability
CIA Paradigm - Confidentiality (Read protection from UNauthorized users)
Integrity (Write protection from UNauthorized users)
Availability (legit users must be able to use the data as needed without being overly
burdened by safety measures)
- E.g., a vault with no key to maximize security
, How to measure availability? - 1) System Uptime
2) System Downtime
3) % Uptime (Uptime divided by TotalTime)
4) Mean (average) time to repair
- Low value is good. E.g., 1hr to repair per month
5) Mean (average) time to failure
- High value is good. Time it takes from system starting to system failing
Security Paradigm - Protect (e.g., firewall)
Detect (e.g., antivirus scan, honeypots, log files)
Recover/React (e.g., use backups)
- Must be fast (bc availability) and correct (bc integrity)
A chain is as strong as ___ - Its weakest link
What are the seven IT domains? - 1) User
2) Workstation (something that a user can use to login)
3) LAN (Local Area Network)
4) LAN-to-WAN
5) WAN (Wide Area Network)
6) (Main) System/Application (e.g., Google app)
7) Remote Access
What is the most insecure part of a system? - Users (humans)
What two terms are used when developing and implementing a set of rules for an entire
IT system?
Security ___ and Security ___ - Security Policies, Security Mechanisms
Security Policies - Set of statements that can be implemented to enforce security.
What we want done.
E.g., Prevent harmful URLs from being accessed on the server.
Security Mechanisms - Define how policies can be implemented.
How we want security done.
E.g., Don't allow xyz.com to be accessed on the server.
Secure State - State in which a system cannot have any security violations
What are the three states of a system, in reference to the Secure State? - Broad: An
insecure system state may be reached
Panda
Security involves protection from ___ and ___ - Read violations, write (modification)
violations
Security - Securing both the computer and the network
Insider Threat - Can happen when only focused on securing the network aspect and not
the computer aspect.
Threat comes from inside the organization (same network).
Both 1) causes more damage and 2) harder to detect than Outsider Threat due to
privileges/greater access to system.
Outsider Threat - Threat comes from outside the organization (different network).
Social Engineering - Tricking people into disclosing information instead of hacking
hardware
Social Engineering Methods - Showing superiority (me smart, you dumb) or inferiority
(help me plz idk anything).
Phishing (clik dis link).
WWW - World Wide Web.
Document management system of connected hyperlinks.
Internet - Connects computers.
Vulnerability - A weakness in the system that can be exploited by a threat.
Risk - Possibility of the assets suffering damage.
Risk requires all of the following to be present: Vulnerability, Asset, Threat.
Of Vulnerability, Threat, and Asset, which of them can be minimized most
effectively/commonly so that Risk may be reduced? - Vulnerability
CIA Paradigm - Confidentiality (Read protection from UNauthorized users)
Integrity (Write protection from UNauthorized users)
Availability (legit users must be able to use the data as needed without being overly
burdened by safety measures)
- E.g., a vault with no key to maximize security
, How to measure availability? - 1) System Uptime
2) System Downtime
3) % Uptime (Uptime divided by TotalTime)
4) Mean (average) time to repair
- Low value is good. E.g., 1hr to repair per month
5) Mean (average) time to failure
- High value is good. Time it takes from system starting to system failing
Security Paradigm - Protect (e.g., firewall)
Detect (e.g., antivirus scan, honeypots, log files)
Recover/React (e.g., use backups)
- Must be fast (bc availability) and correct (bc integrity)
A chain is as strong as ___ - Its weakest link
What are the seven IT domains? - 1) User
2) Workstation (something that a user can use to login)
3) LAN (Local Area Network)
4) LAN-to-WAN
5) WAN (Wide Area Network)
6) (Main) System/Application (e.g., Google app)
7) Remote Access
What is the most insecure part of a system? - Users (humans)
What two terms are used when developing and implementing a set of rules for an entire
IT system?
Security ___ and Security ___ - Security Policies, Security Mechanisms
Security Policies - Set of statements that can be implemented to enforce security.
What we want done.
E.g., Prevent harmful URLs from being accessed on the server.
Security Mechanisms - Define how policies can be implemented.
How we want security done.
E.g., Don't allow xyz.com to be accessed on the server.
Secure State - State in which a system cannot have any security violations
What are the three states of a system, in reference to the Secure State? - Broad: An
insecure system state may be reached