Week 8 - Human Aspects Of Computer Security Flashcards

Security sometimes must be reduced to allow for end user usability. Learn about how humans are incorporated into computer security.

1
Q

What are some bad practices with password policy?

A

Making passwords need to be overly complicated

Not encrypting passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why could making a password overly complicated hinder security?

A

A user might write down a complicated password if they cannot remember it, making it less secure as someone else could find this physical password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When was the first usable security and privacy conference held?

A

2005

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When did the first publications and research outlining users as not the enemy come out? And by who?

A

Late 1990s by Adams and Sass.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does SOUPS stand for?

A

Symposium on usable security and privacy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are common mistakes that end users make to do with passwords?

A

Writing down passwords

Using easily guessed or common passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a productive task?

A

A task where you are trying to achieve an objective or goal. This will have a secindary/supporting task attached.
This task could be to send an email.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a secondary/supporting task?

A

A secondary task that you must complete in order to achieve a productive primary task. A secondary task will also have a productive primary task.
Seoncdary tasks are often authentication, an example of this could be logging into your email.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is human centered security.

A

When humans are considered as part of the security of a system. Their behaviour and motivations are factored into the security of the system, and the system is made to accommodate these needs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are Yee’s 9 guidelines for developing usable security systems?

A
  1. Path of least resistance
  2. Explicit authorisation
  3. Appropriate boundaries
  4. Revocability
  5. Expected ability
  6. Trusted path
  7. Identifiability
  8. Expressiveness
  9. Clarity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the path of least resistance guideline?

A

It says that the most likely path of steps to complete a task should be the most secure, meaning that extra security should be put in place there.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is explicit authorisation guideline?

A

When a end user must explicitly grant authorisation to another actor (e.g another end user or process).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is appropriate boundaries guideline?

A

When the interface should make it clear where you have distinct objects and actions that are relevant to only the user. E.g. The resources available to the user with their authorisation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is revocability guideline?

A

The interface should allow the user to revoke authorisation that they have granted in the past wherever possible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is expected ability guideline?

A

When the interface should not appear to provide functionality that it does not provide.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is trusted path guideline?

A

The interface must provide an authenticated and secure communication channel between the user and trusted entities on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is it the identifiability guideline?

A

The interface should make sure that all distinct objects/resources and actions are make clear to be distinct and are unspoofable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the expressiveness guideline?

A

The interface needs to be capable of describing a security policy with ease and allow users to easily implement their own security policies and rules to fit their goals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the clarity guideline?

A

If an action has a potential negative impact on the security of system, then the user should be clearly warned of the impact of this action before they attempt to take it.

20
Q

What is phishing?

A

When an attacker tries to trick a user into giving away login credentials, personal information or to download malware.

They use emails pretending to be a legitimate source, usually attaching a link that invites the user to click on it. The link is normally of a malicious but elgimate looking website (Often a recreation of a bank website) that asks the user to ‘confirm’ their details. The link could also be a download link for some malware.

21
Q

What type of attack is phishing?

A

A social engineering attack.

22
Q

How do you identify a phishing attacks?

A

Spelling errors
Lack of user identifiable information (Users name)
Wrong email address
Being asked to confirm login details over email
Non official website url

Advanced techniques):
Vieiwng original email source code

23
Q

How do you open the original source code for an email?

A

Open an email message, click the drop downs and click ‘Show original’.

24
Q

How do you get the from address if an email in the source code?

A

You need an SMTP server
The correct mailing software

You can use these to fill in the from email.

25
Q

What does SMTP stand for?

A

Simple Mail Transfer Protocol

26
Q

How do you verify an email is a valid email from that domain? E.g. That the IP address that send the email was authorised to do so on behalf of that domain

A

By using an SPF (Sender Policy Framework).

27
Q

How does SPF verify emails?

A

It compares the email of the sender to the IP address listed for that email in the SPF database record.

28
Q

What is spear phishing?

A

Phishing that is directly targeted at one user, most likely using some of their personal data like their name and such.

29
Q

What is spam phishing?

A

Phishing that targets many people at once by sending mass emails, hoping that some of these people will fall for the attack.

30
Q

What is a phishing website?

A

A website (Most likely linked in a phishing email) that looks like and imitates a legimate website, but it sends any data to the attacker. Commonly asks the user to enter their credentials for the website its disguised as.

31
Q

List some social engineering behavious/techniques.

A

Leveraging authority
Impersonation
Pressure and solution
Pretext

32
Q

What are the 3 personality traits that the dark triad associates with insider threats?

A

Machiavellianism
Narcissism
Psychopathy

33
Q

What does APT stand for?

A

Advanced Persistant Threat.

34
Q

What is an Advanced Persistant Threat?

A

A large, often well funded and organised campaign of attacks against a single organisation. APTs are long term continuous attacks (Can be upwards of years), and require a lot of research on the target organisation to begin.
APTs normally come from hacker/malicious organisation. Sometimes it can be funded by state actors (Governments).

35
Q

What is the most common attack technique/type that APTs use?

A

Social engineering against the end user.

36
Q

What are state actor?

A

Governments.

37
Q

Why are APTs dangerous?

A

APT are hard to detect as they are very inconspicuous. APTs try to disguise their attacks as much as possible, which is why they never include visible attacks like Ransomware. They use advanced techniques to mask attacks and malware traffic going into the organisation, and organisation have a very hard time identifying these as malicious.

APTs are long term. Meaning that the orginsation is constantly being attacked by a campaign that knows how to penetrate its security. Furthermore, if the APT is disguised well, it can be months or years before some attacks are even noticed.

38
Q

What are the stages of an APT?

A

Reconnaissance - researching the orginsational and their system, identifying members of staff for social engineering etc..

Inital Compromise - the first attack, used to get a foothold in the orginsations systems. They use this foothold to set up outbound traffic sending data from within the organisation to the attackers.

Maintain Access - attackers ensure they continue to have access to the system, and set up software to bypass the systems security mechanisms.

Lateral Movement - expansion further into the system, by spreading to another host or getting access to another network or system. They may also locate data for exfiltration.

Data Exfiltration - sending data back through the outbound traffic to the attackers.

Cover Tracks - covering their tracks and hiding evidence of the attack so that the attack goes unnoticed for as long as possible.

39
Q

How do we mitigate APT campaigns ?

A

Switch focus from perimeter security to internal security (Checking outbound traffic from the system for signs of APT outbound traffic). DO NOT replace perimeter with internal, implement both.

Doubling done on security like giving out permissions and authorisations to only those appropriate, patch management and updating security software, proper authentication for functionality.

Monitoring activities and behaviour of traffic let into the network to look for malicious behaviour.

Implementing measures to prevent social engineering like security awareness training. Training employees to spot social engineering attempts like phishing emails etc..

40
Q

What is perimeter security?

A

Security that protects a system/network from external sources and traffic. It can be achieved by software like Firewalls.

41
Q

What types of insider threats are there?

A

Turncloak
Pawn
Imposter

42
Q

What is a Turncloak insider?

A

An insider who abuses their access and misuses their privileges and permissions to perform malicious activities. They are charactirsed by malicious intent and common motivations for them and personal or financial gain. They often become an insider threat after they have joined the company.

43
Q

What is a Pawn insider?

A

An individual who unknowningly creates vulnerabilities and security risks. They are often tricked into aiding attackers using things like phishing, but can also mistakenly aid attackers themselves by carrying out insecure activities like sending sensitive data over email or losses a drive with sensitive information.

44
Q

What is an imposter insider?

A

An outsider that manages to get access to a system by claiming to be a legimate use for the company. They could be an end user, a contractor, partners or employees. They join the organisation with the intend to commit malicious activities. The incline towards corporate espionage.

45
Q

What is the most common type of insider?

A

A Pawn

46
Q

How do we mitigate against insider threats?

A

Training employees in security

Coordinating IT and HR e.g. Making sure IT knows about layoffs on time and when to revoke access and which employees to monitor

Monitoring and analysis employee behaviour e.g. Comparing past behaviour to current behaviour to search for abnormalities. Organisations can use UBA for this

Building a threat hunting team e.g. That monitor data and look for threats as they are happening

47
Q

What does UBA stand for?

A

Employ User Behavioral Analytics.