1/9
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No study sessions yet.
What does TARA stand for (as used in the lecture)?
Threat Agent Risk Assessment
List the 7 steps of the TARA process
Asset identification → Impact rating → Threat enumeration → Attack path analysis → Attack feasibility rating → Risk determination → Risk treatment decision
Name 3 security properties you consider when identifying assets
Confidentiality, Integrity, Availability
What are the impact rating levels used?
Severe, Major, Moderate, Negligible
What is “threat enumeration”?
Identifying and listing potential threats that could compromise security/integrity
What is an “attack path”?
A described sequence of steps an attacker could take to realise a threat scenario.
What are the 5 core parameters used to rate attack feasibility?
elapsed time, expertise, equipment, knowledge of the item/component, window of opportunity
What are the possible attack feasibility ratings?
High, Medium, Low, Very Low
What does risk treatment include (options)?
Avoid, Reduce, Share/transfer, Accept/retain
Give an example of security requirements derived in the OTA case study
Implement a secure protocol, use strong encryption, use resource exhaustion detection