2201 Flashcards

(72 cards)

1
Q

Data

A

The building block of information, usually unorganized and unprocessed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Information

A

Processed organized data to offer meaning and context

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Assets

A

Resource. this can be hardware or software of people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Security

A

Protecting assets from attackers, viruses worms natural disasters, power failures or vandalism.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Information System (is)

A

A system for collecting, processings storing,and distributing information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Information Security (infosec)

A

Practice of preventing or reducing to Chance of unauthorized access, use, disclosure, disruption, modification or destruction of information and information systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Security plan

A

Find a balance between protection usability and cost the cost should not outweigh the value of the assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CIA triad

A

Confidentiality integrity and availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

D A D

A

Disclosure, alteration and denial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Confidentiality

A

Ability to protect information from those who are not authorized to view it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

confidentiality breach

A

When someone gets access to information that they were not suppose to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Privacy

A

Data or information is accessible to one authorized source this is different from confidentiality which is accessed by many authorized ppl.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Integrity

A

Ability to prevent data from being changed in an unauthorized and undesirable manner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Integrity violation

A

Modification of data in an undesirable manner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Availability

A

’ When an authorized person can access information when required

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Unavailability

A

Attacking availability may occur when attacker o fails to attack integrity or breach confidentiality

Eg creating too much traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How to offer CIA triad

A

Confidentiality: using encryption l

Integrity: Using encryption and hash

Availability: Using backup & redundancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Identification

A

The claim of WHAT someone or some thing is

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Identification

A

Claim of what something or someone is

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Authentication

A

Establishes whether this claim is true(identification)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Identification vs authentication

A

Identification → public statement of identity
Authentication - private response to challenge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Identification verification

A

We can verify usingadditional documents (step between identification & authentication)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Five authentication factors

A

Something You know, have, are, do and somewhere you are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which 3 things must be balanced in authentication implementation

A

Protection usability and cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Mutual authentication
Implemented using a digital certificate can be used in combination with MFA
26
Password capture attack
Video recordings of entries phishing keylog
27
Two branches of biometric characteristics
Physiologica &l biological
28
5 physiological characteristics of biometric identification
' Fingerprints, iris scan, hand geometry, facial I'd DNA
29
Four behavioural characteristics of biometrics
Voice pitch, voice Cadence, typing style, signature
30
Biometric characteristics
Performance uniqueness permanence universality collectability acceptability circumvention
31
Universality (biom)
The chosen biometric is possessed by most
32
Uniqueness (biom)
The given trait is unique to those who possess it
33
Permanence
How well a given characteristicevades change over time
34
Acceptability
Acceptability notes how feasible and reasonable the request is
35
Performance
A set of metrics to judge the robustness of the system and now well it functions
36
Collectability
How convenient and reasonable collection is
37
Circumvention
How easily the System can b fooled
38
Measuring biometric performance
Far → false acceptance rate FRR → false rejection rate EER → equal error rate
39
Bell la Padula model -
Combines dad and MAC to support confidentiality (exclusively) The simple security property: a subject with a given security level can not read an object to a higher security level. • no read up • The * property: a subject with a given security level cannot write to an object at a lower security level. • no write down - No stealing of secrets no divulging of secrets
40
Biba model
Implements MAC to protect integrity - (exclusively) The simple integrity axiom: a subject with a given integrity must not read data at lower integrity level. • no read down • The * integrity axiom: a subject with a given integrity must not write data at higher integrity level. • no write up - Does not offer confidentiality Think of baby example
41
Chinese wall model
Designed to prevent conflicts of interest Can implement rbac Think of the lawyer who is between two companies
42
DQ The Bell-LaPadula and Biba models each has its own primary security focus (confidentiality or integrity). If we combine these two models, what will happen?
43
Auditing vs accountability
Accountability is accomplished through conducting auditing in the monitored environment
44
How do we achieve accountability through auditing?
In analyzing the data we have collected in auditing
45
Accountability
Using appropriate logging and ,monitoring keep track of activities following security, business conduct ethics etc
46
Security benefits of accountability
Nonrepudiation Who/what misused out resources Detect and prevent intrusions Prepare materials for legal proceedings
47
Nonrepudiation
A situation that uses sufficient evidence to prevent the individual from denying that they did something
48
How can we enforce Nonrepudiation?
Getting a signature from a package delivery, Using a system or network of logs Using digital forensics Digital signature Etc
49
Deterrence (accountability)
Accountability can be a great deterrent against misbehaviour, can warn offended to keep the away from the offence Eg) badge access time, internet usage at work
50
Admissibility of records
A regular and consistent tracking system must be productive admissible evidence! We need to be able to show where evidence was, how it was passed from one person to another and how it was protected Must have a hash proving that it is original and not been modified —> hash function
51
Hash function
An algorithm that analyzes the data and produces a code or hash. This can be used to prove the originality of evidence e
52
Hash mismatch
When data that a hash algorithm had documented is then modified
53
Cryptographic hash function (CHF)
An algorithm that matches arbitrary length input with a fixed length string. Think of this as an address The arbitrary length input is labelled as a message and the fixed length output is labelled as digest Used for integrity, authentication and Nonrepudiation
54
5 properties of chf
Cryptographic hash function 1 deterministic - same method always produces the same hash 2 one way function - given a hash it it infeasible to produce the original method 3 collision resistance - there is no way to find hash that represents two distinct messages, one digest per message 4 avalanche effect - any chance (even minor) generates a new and entirely different digest 5 computationally efficient- algorithm does not take a long time to compute
55
Dr. Haque wants to implement a new lab accommodation policy for her research students. Her students should be present in her lab during the weekdays from 9 am to 5 pm. Which of the following approach can she use to implement the new policy? Why? Hint: students use an access card to get into the lab, then use lab workstations. a) Deterrence b) Record admissibility
In using deterrence. Eg having students key in with their time of arrival, dr haque can ensure that she has time evidence, thus deterring misbehaviour and implementing record admissibility through a clock in timing system
56
Intrusion detection System (IDS)
IDS is a device or software that monitors a system or network for malicious activity or policy violation Usually reports any such activity or violation to the admin Can detect the following: Denial of service attacks Buffer overflow Protocol attacks Password cracking Malicious codes such as virus or worm Impersonation attack Illegal data manipulation Unauthorized file access
57
DISCUSS the difference between authentication and accountability
AuthenticatIon is a matter of identification and verification, whereas accountability comes after authentication and authorization and access control. It is the next step in security that ensures the appropriate use of a system
58
Order: access control, identification, Accountability, authorization, verification
Identification then verification then authentication the. Authorization then access control and then accountability
59
What are the two types of IDS systems
Network intrusion detection system Host intrusion detection system Both posses the same two working principles,et: signature based detection and anomaly based detection
60
Host vs network intrusion system detection HIDS VS NIDS
Host ids monitors malicious activities as traffic in a single device Network ids monitors traffic flow In A network These two can works together
61
HIDS
Host-based intrusion detection system - takes snapshot of existing systems file and compares with previous/normal state - adds much more granularity
62
NIDS
Network intrusion detection system Monitoring ongoing traffic of a system without overwhelming it Should ideally combined with other security measures such as a firewall Can inspect traffic on and offline (offline occurs with collected traffic data)
63
Signature based IDS
works similar to an antivirus attack. Maintain database of signatures that signal particular type of attack comparing oncoming traffic to those signatures
64
Signatures (in context if ids)
Subject lines and attachments on emails known to carry viruses, re,one logins and other malicious byte sequences
65
Drawbacks of a signature based ids system
Usually precise IF the signature database is up to date Fails to detect new or specially crafted packets —> attackers can also created these databases This means attackers can test these packets to bypass this ids Searching overhead can become timely and inefficient as the number of signatures increases
66
Anomaly based IDS
Uses a baseline of regular traffic and activity on a network. Form of machine learning this way it can identify the deviation from baseline traffic/activity
67
Downsides to anomaly/machine based IDs
Higher rate of false positives compared to the signature based IDS
68
Intrusion Prevention System (IPS)
Identifies suspicious activity Logs security events Attempts to block intrusions or limit data Reports intrusion attempts
69
Intrusion Prevention System (PS) types and methods
Similar to IDs there can be both host and network (hips and nips)
70
IPS vs IDs system
IDs will only defect, where's IPs can take action Traffic needs to flow though lPS Traffic does not need to flow through IDs Packet processing overload is higher in IPS than IDs
71
If you place a NIDS in your network, why do you still need a HIDS?
An hids will provide a more granular level of security. it will use a more real time analysis of what is occurring in a specific device
72
What are the differences between signature and anomaly-based IDS?
Pattern matching vs machine learning