4.8 Security Flashcards

(20 cards)

1
Q

Symmetric Encryption

A

Uses a single secret key for both encrypting plaintext into ciphertext and decyrpting it back. Its fast and efficient making it ideal for encypting large amounts of data. Examples include AES (Advanced Encryption Standard) and older less secure DES (Data Encryption Standard). Its hard to securly share the key a if compromised the encryption fails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Asymmetric Encryption

A

This technique uses a pair of linked keys, a public key for encryption and a private key for decryption. The public key is openly shared while the private is kept sharing enhancing security as its never transmitted (e.g someones sends a message thats been encrypted with public key, the recpietent can decyrpt with private when recieved ensuring secuirty even if the mesage has been intercepted). Algortihms like RSA (Rivest-Shamir-Adleman) and ECC (Elliptic Curve Cryptography) are used. Its vital for secure communcaition, digital signatures etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Biometrics

A

Biometric technologies identify or verify individuals based on unique physical or behavioral traits, enhancing security and convenience.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Biometrics

Uses

A

Fingerprint Scanners - capture unique ridge patterns for identify verification.

+ inexpensive and easy to implement
- accuracy can be affected by dirt or skin conditions

Facial Recogniton - analyses facial features by converting images into mathematical representations for matching.

+ fast and contact free
- poor accuracy with poor light, obsured faces and privacy concerns

Iris Scanning - capture unique patterns in iris using infrared light

+highly unique and stable patterns for secure idenitifaction
- can be expensive and senstive to environmental factors

Others to mention voice recogontion, vein recogintion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Complexities of Handling Biometric Data

A

Data capture - ensuring systems accurately read various biometrics under different conditions

Data storage - requiring secure storage, often with encryption to protect sensitive information

Data processing - needing quicj and accurate processing against stored profiles while maintaing data secuirty

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Viruses

A

Attach to legitimate programs, requiring user action to spread (repliacte by attaching to executable files which when run they actiavte and corrupt data)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Worms

A

Self-replicate without user intervention by exploiting network vulnerabilties. propagate through networks and can install backdoors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Trojans

A

Disguise themselves as legitimate software to trick users to install it. Once installed they can create backdoors and steal data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Ransomware

A

Encypts a victims data and demands ransom for decryption key. It can spread via phising emails or exploit kits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Drive-by Downlaods (Watering Hole)

Cyber attack vectors

A

Malware is downloaded inadvertenly from a compromised website, exploitig browse vulnerabilties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Domain Shadowing

Cyber attack vectors

A

Attackers compromise domain accounts to create malicous subdomains that divert users to bogus websites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Malvertising

Cyber attack vectors

A

Malicious ads placed on legitimate websites can infect system even if not clicked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

DDos

Cyber attack vectors

A

Floods a system with bogus requests to overload it making it unavailable and disrupt services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SQL Injection

Cyber attack vectors

A

Inserts malicious SQL statements into data driven applications to extract data to the hacker by exploting database vulnerabilties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Phising

Cyber attack vectors

A

Tricks user into revealing senstitive information or installing malware through decpetive emails or websites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Black Hat Hacking

A

People who engage in illegal and unethical activites to exploit vulnerabilties for personal gain or to cause harm.

16
Q

White Hat Hacking

A

Professionals who user their skills to help organisations improve secuirity by performing authroised pen testing to fin and fix vulnerabilites.

17
Q

Penetration Tesing

A

A simulated cyber attack against a system to identify and exploit weaknesses.

Black box - tester has no prior system knowledge

White box - the tester has full system knowledge

Gray - combines both black and white, partial knowledge

Internal Testing - assesses what a disgrunteld employee could access

External Pen Testing - evaluates vulnerability of external devices and servers to outside hackers

Blind Penetration Testing - an ethical hacker attempts to gain access without prior knowledge, mimicking a real attack

Doube Blind - similar to previous, but tests security teams respone time and effectivness

18
Q

Cyber attack vector

A

A cyber-attack vector is the path or means by which a hacker gains access to a computer for malicous intent.

19
Q

Cryptography

A

Cryptography ensures that sensitive data remains private, secure, and trustworthy, enabling the safe functioning of digital systems and networks in today’s world.