Domain 5 - Protection of Information Assets Flashcards
(42 cards)
What is the role of Certificate Authority (CA)?
1) A trusted third party that serves authentication infrastructures or organizations, and registers entities and issues them certificates
2) Maintains a directory of digital certificates for the reference of those receiving them
3) Manages the certificate life cycle, including certificate directory maintenance and certificate revocation list (CRL) maintenance and publication
What is the primary role of Certificate Authority (CA)?
Check the identity of the entity owning a certificate and to confirm the integrity of any certificate it issued.
What is the role of Registration Authority (CA)?
The individual institution that validates an entity’s proof of identity and ownership of a key pair
What is Certificate Revocation List (CRL)?
1) An instrument for checking validity of the certificates for which the CA has responsibility
2) Provide list of digital certificates that are no longer valid
What is Certificate Practice Statement (CPS)?
1) Document that outlines the policies and practices followed by a Certification Authority (CA) to issue and manage digital certificates (incl. policy on revoking certificates)
2) Designed to provide transparency and establish trust between the CA and its users
What is a Digital Certificate?
1) An electronic document that is used to verify the identity of a user, device, or organization
2) Contains information about the identity of the entity it is issued to, such as name, address, and public key
3) Issued by a trusted third party known as a Certificate Authority (CA)
How Digital Certificate is used?
Used to establish secure communications over the internet and other networks, by allowing parties to verify the identity of each other and encrypting data to protect it from unauthorized access.
When a digital certificate is issued, it is signed by the CA using their private key, providing assurance that the certificate is authentic and has not been tampered with.
The certificate can then be used to authenticate the identity of the certificate holder, typically through the use of digital signatures or other cryptographic protocols (e.g. IPSec, SSH, S/MIME, etc.).
What is the role of Directory Server in PKI?
Makes other users’ certificates available to applications
What is Secure Socket Layer (SSL)?
It is a protocol used to establish a secure and encrypted communication channel over the internet.
How SSL protects data?
1) User wants to access server, thus send request to the server to initiate secure connection using HTTPS protocol
2) Server responds by sending its digital certificate that contains the server’s public key & information about the certificate’s issuer
3) User checks the certificate to ensure it is valid by verifying the Certificate Authority’s digital signature contain in the certificate using the CA’s public key
4) Once verified, user generates symmetric session key & encrypts it with server’s public key
5) This is then send to server
6) An acknowledgement will be send after the server will decrypt with its private key to successfully receive the session key
7) The user & server can now use the session key to encrypt & decrypt all communication between them
Types of IDS
1) Network-based = Operate by analyzing network traffic as it passes through a particular point on the network, such as a switch or router
2) Host-based = Operate on individual machines, analyzing system logs, file changes, and other activity
Methods of detection used in Intrusion Detection System (IDS)
1) Statistical (Anomaly)= looks for deviations from normal patterns of behavior, which may indicate an attack
2) Signature-based = uses a database of known attack patterns, or signatures, to compare against network or system activity
3) Neural-based = Combines both statistical & signature-based IDS to create hybrid & better system
Why Statistical-based IDS most likely generate false alarm?
This IDS relies on definition of known & expected behavior of systems. Because normal network activity may at times include unexpected behavior (e.g. sudden massive downloads), these will be flagged as suspicious.
Categories of Power Failures/ Interruption
1) Total failure (blackout)
2) Severely reduced voltage (brownout)
3) Sags, Spikes & Surges
4) Electromagnetic Interference (EMI)
What is blackout?
Complete loss of electrical power which often caused by weather conditions (e.g. storm, earthquake) or inability of an electrical utility company to meet user demands
What is brownout?
Failure of electrical utility company to supply power within acceptable range which places strain on electronic equipment & may limit operational life or permanent damage
What is Sags, Spikes & Surge?
Temporary & rapid decreases (sags) or increases (spikes & surges) in voltage levels which can cause loss of data, network transmission errors or hardware damages
What is Electromagnetic Interference (EMI)?
Caused by electrical storms or noisy electrical equipment (e.g. motors, fluorescent lighting, radio transmitters) which may cause systems to hang or crash as well as damages similar to those by sags, spikes & surges
Types of Power Interruption & how to control it?
1) Short-term: Those that last few seconds such as Sags, Spikes & Surges can be prevented using surge protector (e.g. power line conditioners)
2) Intermediate-term: Those that lasts from few seconds to 30 mins, can be controlled by Uninterruptible Power Supply (UPS) devices which provide constant power even if main power is lost
3) Long-term: Those that lasts few hours to several days, can be prevented using alternate power generators
Types of Performance Indicators of Biometric System
1) False Acceptance Rate (FAR) = frequency of accepting an unauthorized person as authorized
2) False Rejection Rate (FRR) = frequency of rejecting an authorized person
3) Equal Error Rate (EER) = FAR equals FRR which measure the optimal accuracy of the Biometric
What is the 2 sub-protocols in IPSec?
1) Encapsulating Security Payload (ESP) protocol
2) Authentication Header (AH) protocol
What is Encapsulating Security Payload (ESP) protocol?
1) Encrypts the entire IP packet (including the original IP header) and encapsulates it with a new IP header
2) The new IP header has a destination IP address that is the ultimate destination of the packet, while the source IP address is the IP address of the device that is performing the encryption.
3) Provides confidentiality by encrypting the payload of the IP packet, as well as the original IP header.
4) Provides integrity and authentication by using a cryptographic hash function to compute a message authentication code (MAC) that is appended to the encrypted payload. The MAC ensures the payload has not been tampered or modified during transmission.
What is Authentication Header (AH) protocol?
1) provides authentication & integrity of IP packets without encryption
2) sender computes a message digest (a hash) of the IP packet header & payload & adds it to the end of the packet.
3) receiver then performs the same calculation & compares the results to verify the integrity of the packet.
4) provides source authentication by adding an integrity check value (ICV) to the original IP packet header and payload
5) once received, ICV is recalculated using the same algorithm and the same secret key. If matches, then proves the packet was not tampered & the sender who they claimed to be.
What is the 2 encryption modes in IPSec?
1) Transport mode = only the payload (data that is transferring) is encrypted. The IP packet header is not encrypted.
2) Tunnel mode = Both payload & packet header is encrypted.