09 Data Security - Threats Flashcards

1
Q

Which damage can occur with respect to IT attacks?

1.
2.
3.
4.

A
  • computer (not itfelf but software changes, manipulation, deletion, …)
  • data theft, deletion, manipulation, misuse -> loss of confidentality and loss of integrity
  • embedded systems (devices with embedded IT - demolition of infrastructure)
  • loss of common relality (societal danger, spread of misinformation when not agreeing on one reality)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are possible Motivations of Attackers?

1.
2.
3.
4.
5.
6.

A
  • script kiddies (play instinct, curiosity, …)
  • insider threats causes by lack of education and revenge
  • non-commercial hacker with robin hood mentality, uncovering vulnerabilities
  • proffesional hackers, theft of data, illegal transactions etc.
  • terrorism - deployment of propaganda
  • cyberwar - countries preparing techniques for protection against attacks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Attacks nowadays….

1.
2.
3.

A
  • are becoming more damaging
  • are executed more often
  • are executed more professionally (criminals -> security agencies)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Definition of data security

A
  • protects data against humans (attackers)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Definition of data privacy

A
  • protects humans against misuse of data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How do Data Privacy and Data Security fit together?

A

Data privacy requires data security!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the most important goals of data security?

A
  • confidentality (vetraulichkeit)
  • integrity (integrität)
  • availability (verfügbarkeit)
  • accountability (zurechenbarkeit)

CIAA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does confidentality mean?

1.
2.
3.

A
  • protection against unauthorized usage of confidental data
  • e.g. TAN, PIN, exam results
  • challenge: communicating this data through the internet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does integrity mean?

1.
2.
3.

A
  • data and messages must not be manipulated or changed (OR is has to be obvious data is changed)
  • e.g. offer in Ebay
  • accuracy is maintained and nothing leftout or changed!
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does availability mean?

1.
2.

A
  • authorized people should be able to access data and services from all defined places at all defined times (from anywhere at anytime!)
  • e.g. server of FH
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does accountability mean?

A
  • creation or change of data can be assigned clrearly to a person (or service)
  • e.g. who has accessed the webpage, who is the author of the e-mail
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the root causes for todays problems with data security?

A
  • technical reasons
  • organisational reasons
  • human reasons
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Root cause technical reason

A
  • internet started small and as a research activity
  • people knew each other -> there was trust and security was thus not an issue (nobody should be able to control the internet anyway)
  • result: open communication protocols, i.e. working wihtout encrypting the content or control the data
  • BUT exponential growth in the 90´ties
  • now also activities like E-banking, purchase
  • billions of entry-points and interconnected networks
  • more and more complexity and more open security problems (exploits)
  • EACH SOFTWARE CONTAINS FAULTS -> more complexity, more number of faults
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Organisational Reasons

1.
2.
3.
4.
5.
6.

A
  • unclear responsibility (who is responsible for data security?)
  • no stringent idea or concepts often tumes
  • insider threaths
  • no rules means no user concept: everybody always access to all data
  • often elderly senior management not aware of digital issues
  • huge grey area with respect to data privacy and data security (law)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Human Root cause

1.
2.
3.
4.

A
  • curiosity
  • interfaces always switched on on smartphone (WLAN bluetooth)
  • Terms and condiitons (AGBs) not read and not taken seriously
  • everything shared through social networks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly