1/67
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Security objectives
are goals and constraints that affect the confidentiality, integrity, and availability of your data and application
Confidentiality
Also known as data confidentiality
this property means that information is not made available or disclosed to unauthorized individuals, entities, or processes.
Data integrity
ensures that data (both stored and is transmitted packets) and programs are changed only in a specified and authorized manner.
A loss of confidentiality
is the unauthorized disclosure of information.
A loss of data integrity
is the unauthorized modification or destruction of information
System integrity
ensures that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system.
Availability
ensures that systems work promptly and the service is not denied to authorized users.
A loss of availability
is the disruption of access to or use of information or an information system.
Authenticity:
The property of being genuine and being able to be verified and trusted; confidence in the validity of a transmission, a message, or a message originator. This means verifying that users are who they say they are and that each input arriving at the system came from a trusted source.
Accountability
The security goal that generates the requirement for actions of an entity to be traced uniquely to that entity. Because truly secure systems are not yet an achievable goal, it must be possible to trace a security breach to a responsible party. Systems must keep records of their activities to permit later forensic analysis to trace security breaches or to aid in transaction disputes
Accountability2
This supports nonrepudiation, deterrence, fault isolation, intrusion detection and prevention, and after-action recovery and legal action.
Open Systems Interconnection (OSI)
defines a general security architecture that is useful to managers as a way of organizing the task of providing security
OSI
This standardized architecture defines security requirements.
Security attacks
are any action that compromises the security of information owned by an organization.
Security attack2
attempt to gain unauthorized access to information resources or services, or cause harm or damage to information systems.
Security mechanisms
are technical tools and techniques that are used to implement security services
process that is designed to detect, prevent, or recover from a security attack
Security service
is a processing or communication service that enhances the security of the data processing systems, and the information transfers of an organization.
Security service2
are intended to counter security attacks, and they make use of security mechanisms to provide the services.
Passive attacks
are like eavesdropping or monitoring transmissions. The goal of the attacker is to obtain information that is being transmitted.
Release of message contents:
In this type, an attacker will monitor an unprotected communication medium like unencrypted email or telephone call and intercept it for sensitive information.
Traffic analysis:
In this type, an attacker monitors communication channels to collect a range of information, including human and machine identities, locations of these identities, and types of encryption used, if applicable.
Passive attacks2
are very difficult to detect because they do not involve any alteration of the data.
using strong network encryption methods.
The best way to prevent a passive attack is by
This means that the original message should be well encrypted into an unintelligible language at the sender’s end and should be decoded into an understandable language at the receiver’s end.
Active attacks
involve some modification of stored or transmitted data or the creation of false data
masquerade
takes place when one entity pretends to be a different entity.
A ——— attack usually includes one of the other forms of active attack. For example, authentication sequences can be captured and replayed after a valid authentication sequence has taken place, thus enabling an authorized entity with few privileges to obtain extra privileges by impersonating an entity that has those privileges.
Replay
involves the passive capture of a data unit and its subsequent retransmission to produce an unauthorized effect.
Data modification
simply means that some portion of a legitimate message is altered or that messages are delayed or reordered to produce an unauthorized effect. For example, a message stating “Allow Kit Estrada to read confidential file Accounts” might be modified to say, “Allow Fred Brown to read confidential file, Accounts.”
denial-of-service attack
prevents or inhibits the normal use or management of communication facilities. Such an attack may have a specific target; for example, an entity may suppress all messages directed to a particular destination (e.g., the security audit service).
Another form of—— is the disruption of an entire network, either by disabling the network or by overloading it with messages to degrade performance.
Authentication service
is concerned with ensuring that communication is authentic. In the case of a single message, such as a warning or an alarm signal, the function of the ————- is to ensure the recipient that the message is from the source that it claims to be from.
Access control
is the ability to limit and control access to host systems and applications via communications links. To achieve this, each entity trying to gain access must first be identified or authenticated so that access rights can be tailored to the individual.
Data confidentiality
is the protection of transmitted data from passive attacks. Concerning the content of data transmission, several levels of protection can be identified. The broadest service protects all user data transmitted between two users over a period. For example, when a logical network connection is set up between two systems, this broad protection prevents the release of any user data transmitted over the connection
Data integrity
ensures that messages are received as sent, with no duplication, insertion, modification, reordering, or replays
Data integrity2
ensures that information is modified only in appropriate ways by persons authorized to change it.
Nonrepudiation prevents
either a sender or a receiver from denying a transmitted message. Thus, when a message is sent, the receiver can prove that the alleged sender sent the message. Similarly, when a message is received, the sender can prove that the alleged receiver received the message.
Availability service
means that a system or a system resource is accessible and usable upon demand by an authorized system entity, according to performance specifications for the system; that is, a system is available if it provides services according to the system design whenever users request them.
Online privacy
refers to privacy concerns related to user interaction with Internet services through web servers and mobile apps
Data collectors
collect information directly from their customers, audience, or other types of users of their services.
Data brokers
compile large amounts of personal data from several data collectors and other data brokers without having direct online contact with the individuals whose information is in the collected data.
data brokers
repackage and sell the collected information to various data users, typically without the permission or input of the individuals involved
Because consumers generally do not directly interact with data ——- , they have no means of knowing the extent and nature of the information that data brokers collect about them and share with others for their financial gain
Data brokersss
can collect information about consumers from various public and nonpublic sources, including courthouse records, website cookies, and loyalty card programs.
Typically, —— create profiles of individuals for marketing purposes and sell them to data users.
data users
category encompasses a broad range. One type of ——- is a business that wants to target its advertisements and special offers. Other uses are fraud prevention and credit risk assessment.
WWW
is fundamentally a client/server application running over the Internet
The use of the Web presents several security challenges:
o The Web is vulnerable to attacks on web servers over the Internet.
o Casual and untrained (in security matters) users are common clients for web-based services. Such users are not necessarily aware of the security risks that exist and do not have the tools or knowledge to take effective countermeasures.
o A web server can be exploited as a launching pad into a corporation’s or an agency’s entire computer complex. Once a web server is subverted, an attacker may be able to gain access to data and systems not part of the Web itself but connected to the server at the local site
Web server security and privacy
are concerned with the vulnerabilities and threats associated with the platform that hosts a website, including the operating system (OS), file and database systems, and network traffic.
Web application security and privacy
are concerned with web software, including any applications accessible via the Web.
Web browser security and privacy
are concerned with the browser used from a client system to access a web server.
Cellular and Wi-Fi infrastructure:
Modern mobile devices are typically equipped with the capability to use cellular and Wi-Fi networks to access the Internet and to place telephone calls. Cellular network cores also rely upon authentication servers to use and store customer authentication information.
Public application stores (public app stores)
these are digital distribution services operated and developed by mobile OS vendors. For Android, the official app store is Google Play, and for iOS, it is simply called the App Store. These stores invest considerable effort in detecting and thwarting malware and ensuring that the apps do not cause unwanted behavior on mobile devices. In addition, there are numerous third-party app stores. The danger with third-party stores is uncertainty about what level of trust the user or the enterprise should have that the apps are free of malware.
Device and OS vendor infrastructure:
Mobile device and OS vendors host servers to provide updates and patches to the OS and apps. Other cloud-based services may be offered, such as storing user data and wiping a missing device.
Enterprise mobility management systems (EMM)
is a general term that refers to everything involved in managing mobile devices and related components (e.g., wireless networks).
—- is much broader than just information security; it includes mobile application management, inventory management, and cost management. Although —— is not directly classified as a security technology, it can help in deploying policies to an enterprise’s device pool and monitoring a device’s state.
App Vetting Process
• The process of evaluation and approval or rejection of apps within an organization
begins when an app is acquired from a public or enterprise store or submitted by an in-house or third-party developer
administrator
is a member of the organization who is responsible for deploying, maintaining, and securing the organization’s mobile devices as well as ensuring that deployed devices and their installed apps conform to the organization’s security requirements.
app testing facility
in the organization that employs automated and/or human analyzers to evaluate the security characteristics of an app, including searching for malware, identifying vulnerabilities, and assessing risks. The resulting security report and risk assessment are conveyed to an auditor or auditors.
auditor
is to inspect reports and risk assessments from one or more analyzers to ensure that an app meets the security requirements of the organization.
The ——also evaluates additional criteria to determine if the app violates any organization-specific security requirements that could not be ascertained by the analyzers •
The —- then makes a recommendation to someone in the organization who has the authority to approve or reject an app for deployment on mobile devices. If the approver approves an app, the administrator can then deploy the app on the organization’s mobile devices.
to define the threats to online privacy
The first step in developing privacy by design and privacy engineering solutions for online privacy is
Web application vulnerabilities:
Failing to suitable design and implement an application, detect a problem, or promptly apply a fix (patch), which is likely to result in a privacy breach. Vulnerability is a key problem in any system that guards or operates on sensitive user data.
User-side data leakage:
Failing to prevent the leakage of any information containing or related to user data, or the data itself, to any unauthorized party resulting in loss of data confidentiality. Leakage may be introduced due to either intentional malicious breach or mistake (e.g., caused by insufficient access management controls, insecure storage, duplication of data, or a lack of awareness).
Insufficient data breach response:
Not informing the affected persons (data subjects) about a possible breach or data leak, resulting in either from intentional or unintentional events; failure to remedy the situation by fixing the cause; not attempting to limit the leaks.
Insufficient deletion of personal data:
Failing to delete personal data effectively and/or in a timely fashion after the termination of the specified purpose or upon request.
Non-transparent policies, terms, and conditions:
Not providing sufficient information describing how data are processed, such as their collection, storage, and processing. Failure to make this information easily accessible and understandable for non-lawyers.
Collection of data not required for the primary purpose:
Collecting descriptive, demographic, or any other user-related data that are not needed for the system. Applies also to data for which the user did not provide consent
Sharing of data with a third party:
Providing user data to a third party without obtaining the user’s consent. Sharing results either due to transfer or exchanging for monetary compensation or otherwise due to inappropriate use of third-party resources included in websites, such as widgets ((e.g., maps, social networking buttons), analytics, or web bugs.
Outdated personal data:
Using outdated, incorrect, or bogus user data and failing to update or correct the data
Missing or insufficient session expiration:
Failing to effectively enforce session termination. May result in the collection of additional user data without the user’s consent or awareness
Insecure data transfer:
failing to provide data transfers over encrypted and secured channels, excluding the possibility of data leakage. Failing to enforce mechanisms that limit the leaking surface (e.g., allowing to infer any user data out of the mechanics of web application operation).
Mobile app privacy:
Legitimate mobile apps may be vulnerable to several privacy and security threats, typically due to poor coding practices used in app development or underlying vulnerabilities in the mobile device operating system
Insecure network communications:
Network traffic needs to be securely encrypted to prevent an adversary from eavesdropping. Apps need to properly authenticate the remote server when connecting to prevent man-inthe-middle attacks and connection to malicious servers.
Web browser vulnerabilities
: Adversaries can exploit vulnerabilities in mobile device web browser applications as an entry point to gain access to a mobile device.
Vulnerabilities in third-party libraries:
Third-party software libraries are reusable components that may be distributed freely or offered for a fee to other software vendors. Software development by component or modules may be more efficient, and third-party libraries are routinely used across the industry. However, a flawed library can introduce vulnerabilities in any app that includes or makes use of that library. Depending on the pervasiveness of the library, its use can potentially affect thousands of apps and millions of users.