Session 25 (Security and Online Privacy) Flashcards

1
Q

risk vs vulnerability vs exposure?

A

risk: likelihood that threat will occur
vulnerability: likelihood that threat will harm the system
exposure: (potential harm if threat breaks the controls and comprises the resources)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what are the components of internet security (CIA)?

A

Confidentiality: The information is secret. No
one can read that information without your
permission.

 Integrity: The information remains unaltered.
No one can change that information without
your knowledge.

 Availability: The information is available
upon your request. When you need it, that
information must be available

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what are the two things we need to ensure confidentiality?

A
  1. we need to make sure that our data
    cannot be read by anyone except the
    intended recipient.
     We do this through Cryptography.
  2. we need to make sure that the
    intended recipient is really the one who says
    he is.
     We do this though Access Control.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is Caesar’s cipher?

A

The most basic substitution cipher
 Encryption given a key K: each letter in the
plaintext P is replaced with the K’th letter
following corresponding number (shift right)
 Decryption given K: shift left

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Symmetric vs Asymmetric cryptography?

A
Symmetric
 Easy to use
 Faster
 Key management is hard
(especially when number
of users is high)
 Need key distribution
 Cannot provide digital
signature
Asymmetric
 More complicated
 Much slower
 Simpler Key
management system
 No need for Key
distribution
 Can provide digital
signature
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what are the three components to control access?

A
  1. Authentication: to confirm that you are who
    you say you are.
  2. Authorization: to make sure that you can read
    what you are able to read.
  3. Accounting: to keep track of what you do.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is the simplest authentication method?

A

password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what’s a way to add additional security?

A

multi-factor authentication (something you know, have, are)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what are the two main access control systems?

A
  1. physical

2. digital (Firewall, Intrusion Prevention System)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is malware?

A

any software with malicious intent against your

computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what can malware do?

A

– disrupt computer operation
– gain access to private systems
– steal personal information
– or even display advertisements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

examples of types of malware

A
  • Virus
  • Worm
  • Trojan Horses
  • Ransomware
  • Spyware
  • Adware
  • Scareware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

describe phishing

A

– Lure victim via Email / URL Link
– To a fake website that look absolutely similar to
the original
– Trick user to enter personal details and/or
password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

describe spear-phishing

A

– Phishing that intend to use against specific person
– More sophisticated and customized
– More promising to the victim

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is denial of service?

A

Attack that makes a machine or network
resource unavailable to the users.
 Called Distributed Denial-of-Service (DDoS) if
the attacks occur from multiple sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what are some threats to privacy?

A
- Data aggregators, profiling, and digital
dossiers
- Electronic Surveillance
- Personal Information in Databases
- Information on Internet
17
Q

what are 4 ethical issues to do with online privacy?

A

Privacy Issues
– Is personal information kept private?

 Accuracy Issues
– Who is responsible for information being accurate
and complete? Accountability.

 Property Issues
– Who owns the information and intellectual
property rights?

 Accessibility Issues
– Who can access, store and process the
information?