CS2005 - Lecture 12 - Security Flashcards
(80 cards)
What defines a system as ‘secure’?
A system is secure if its resources are used and accessed as intended under all circumstances; However, total security cannot be guaranteed
What is a threat in cybersecurity?
A potential security violation; May or may not happen; Can lead to attacks on systems or networks
Who is an intruder in the context of system security?
Someone attempting to gain unauthorized access; May try to damage or disrupt data
What are the main types of security violations?
Breach of confidentiality; Breach of integrity; Breach of availability; Theft of service; Denial of service
What is a breach of confidentiality?
Unauthorized access to or theft of data (e.g., credit card data)
What is a breach of integrity?
Unauthorized modification of data (e.g., altering website content)
What is a breach of availability?
Destruction or disruption of data (e.g., website defacement)
What is denial of service (DoS)?
Preventing legitimate users from accessing system services by overwhelming them
What is masquerading in network security?
Pretending to be another user or system to gain unauthorized access
What is a replay attack?
Maliciously repeating a valid data transmission to gain advantage (e.g., money transfer)
What is session hijacking?
Taking over an active communication session to bypass authentication
What are the four levels of effective security measures?
Physical; Human; Operating System; Network
What is a Trojan Horse in cybersecurity?
A program disguised as something benign; May delete/modify data or install backdoors
What is a trap door in software?
A hidden access point (e.g., hardcoded credentials) left by the developer
What is a logic bomb?
Malicious code triggered under specific conditions (e.g., a date/time)
What is a worm?
A standalone, self-replicating program that spreads and consumes resources
How did the Morris Worm work?
Exploited UNIX vulnerabilities; Used a ‘grappling hook’ and main program; Conducted attacks via rsh, finger, and sendmail
What is the purpose of cryptography?
Ensure secure communication without trusting the network; Encode messages so only parties with the correct key can decode
Define: Cipher, Plaintext, Ciphertext.
Cipher: Algorithm for encryption/decryption; Plaintext: Original message; Ciphertext: Encrypted message
What is symmetric encryption?
Uses the same key for both encryption and decryption; Requires secure key sharing between sender and receiver
Name some symmetric encryption algorithms.
DES, Triple DES, AES (block ciphers); RC4 (stream cipher)
What is asymmetric encryption?
Uses different keys for encryption and decryption (public/private); Public key is shared openly; private key is secret
How does RSA encryption work?
Based on factoring large prime numbers; Public key for encrypting; private key for decrypting; Often used to securely share symmetric keys
What does the macro in the diagram do?
Runs a Visual Basic script that silently formats the C: drive; Exploits the FileSystemObject and Shell to execute the command