Information Security policies Flashcards

1
Q

What is cryptography?

A

Enabling technology that turns an insecure communication facility into a secure one by guarantees one or more of the following information security policies, confidentiality, integrity, availability, nonrepudiation, authentication, anonymity and unobservability

also the science of secret writing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is steganography?

A

the science of hiding messages inside other messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is cryptanalysis?

A

science of recovering the plaintext from the ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the CIA properties?

A

Confidentiality (Secrecy): No improper disclosure of information.
Integrity: No improper modification of information.
Availability: No improper impairment of functionality/service.

Confidentiality: No unauthorized access to information.
Integrity: No unauthorized modification of information.
Availability: No unauthorized impairment of functionality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is confidentiality?

A

information is not learnt by unauthorised principals
Attack against confidentiality - passive attack( listen or read )

Confidentiality is guaranteed when Charlie, who is not authorised to read the message Alice is sending to Bob, is not able to read the message

Confidentiality presumes a notion of authorized party, or more generally, a security policy saying who or what can access our data. The security policy is used for access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Example of confidentiality

A

Confidentiality can be achieved if you send a letter from A to B rather than an email (email is over the internet so everyone along the way can read it). To prevent this, encryption, access control and network security.

Email is not a letter but a postcard!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is privacy?

A
  1. You choose what information you want other people to know
  2. Confidentiality of information that you don’t want to share
    (confidentiality for individuals)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is anonymity?

A
  1. a condition where your true identity is not known.
  2. Confidentiality of your identity
  3. Hiding your activity amongst other similar activities.
  4. Charlie does not know the identity of the sender or the receiver.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Privacy and anonymity on public networks

A
  1. internet is designed on a public network
    - machines on your LAN can see your traffic
  2. Routing info is public
    - a passive observer can see who is talking to who
    - IP packet header - shows source and destination
    - packet route can be tracked (traffic analysis)
  3. Encryption
    - does not hide identities of sender and receiver
    - hides payload but not routing info
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an anonymity set?

A

a group in which your actions (sending, receiving, communication and relationships) cannot be distinguished from the actions of anyone else in the group - bigger the group, better

YOU CANNOT BE ANONYMOUS BY YOURSELF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the attacks on anonymity?

A
  1. Passive traffic analysis:
    - observing packet route to identify the sender and receiver
  2. Active traffic analysis:
    - injecting packets or putting a timing signature on packet flow
  3. Compromise of routers:
    - it is not obvious about what nodes have been compromised
    - assuming that some fraction of the nodes are good but not sure which ones (do not trust just one individual node only)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is unlinkability?

A
  1. This is the unlinkability of action (sending the email) and identity (identity of the sender)
  2. sender and his email are no more related after
    observing communication than they were before - once the sender sends the email, they are no longer related to each other.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is unobservability?

A

HARD TO ACHIEVE

an observer cannot tell if a certain action took place or not.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is integrity?

A

data has not been (maliciously) altered
Attack against integrity - active attack where Charlie modifies the message between Alice and Bob

Alice -> Charlie( modifies it) -> Bob
Integrity is guaranteed whenever Charlie, who is not authorised to alter the message, is not able to modify the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is availability?

A

data or services cannot be accessed by unauthorised principals
attack against availability - Charlie disrupts the communication between Alice and Bob (disrupts the service)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Threats to availability

A
  1. External environmental events
    - fire
    - pulling a server plug
  2. Accidental or malicious attacks in software
    - infecting a system with a debilitating virus
  3. DoS attacks or break-ins
    - prevent the Denial of Service attacks by using fire-walls, redundant hardware, backups, virus scanners…
    - difficult to cover all the threats and still have a usable system.
17
Q

What is accountability?

A

actions are recorded and therefore can traced to the responsible principals.
If Alice sends a message to Bob, then Bob can track who the message was from.

keeping a secure audit trail is important so that actions
affecting security can be traced back to the responsible party - however, the violation is that the audit trail can be modified or tampered.

18
Q

What is non-repudiation?

A

STRONGER FORM OF ACCOUNTABILITY
actions that have been done cannot be denied.

If Alice sends a message to Bob, then Alice cannot deny that she sent the message and Bob cannot deny that he received the message.

19
Q

What is authentication?

A

principals or data origin can be identified accurately.
data or services are only available to authorised identities.

attack against authentication: Masquerades - Charlie pretends to be Alice and communicates with Bob

20
Q

More on authentication - verification and methods

A

Authentication is verification of the identity of a person or a system (says that you are who you are claiming to be)

Methods for authentication are often characterised as:

  1. something you have, e.g. an entry card,
  2. something you know, e.g. a password or secret key, or
  3. something you are, e.g. a fingerprint, signature, biometric.
21
Q

Security is a whole system issue

A

protect the software, hardware, physical environment, personnel, corporate and legal structures

22
Q

What are the security mechanisms/ countermeasures?

A

Need to consider how different mechanisms can be used to achieve goals in the face of threats, and what some of the challenges are.

Challenge: employing adequate mechanisms and demonstrating that the resulting system is secure BUT Designing adequate mechanisms is challenging and careful “screening” is not enough.

23
Q

What are the protection countermeasures?

A
  1. Prevention - prevent security breaches by system design and employing appropriate security technologies as defences. For example, using a firewall to prevent external access to corporate
    intranets.

Prevention is the most important protection measure.

  1. Detection - In the event of a security breach, we try to ensure that it will be detected. Logging and MACs (file hashes to detect alteration) are
    primary methods of detection, although intrusion detection systems which actively watch for intruders are becoming more common.
  2. Response - In the event of a security breach, we should have some arrangement in place to respond or recover the assets. Responses range from restoring backups through to informing appropriate concerned parties or law-enforcement agencies.
24
Q

Key points on security

A

enabling technology
power
multi-disciplinary