Ex 2 Flashcards

(79 cards)

1
Q

What does salt hashing do when hashing a password?

A

Salt makes every password unique and therefore making it harder to break

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is dynamic biometric authentication?

A

It is patterns that a person makes that are unique for that individual, such as speaking or writing patterns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is static biometric authentication?

A

It is something unique connected to someone’s body, such as a fingerprint or iris.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is token authentication?

A

It’s something that you posses, which means like microsoft authentication or an access card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Authentication?

A

Authentication is how you prove that you are someone you say you are, as an password to an account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Identification?

A

Thats is when you says who you are by providing an email or a username

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Multi-factor authentication?

A

MFA is when you are needed to provide more then one authentication to prove that you are you, as for instance you type in a password and then gets a code to your phone that you need to type in.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is reactive password checking?

A

Reactive password checking is when you look through DB with passwords to find bad ones, and then prompt the affected users to update their password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is proactive password checking?

A

Proactive password checking is when you force users to have a certain level of security when creating their password, for instance needing to have at least 8 characters, at least two numbers and a special character.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is exhausted search? (Attack)

A

Exhausted search is another word for brute force attacks, which is when a script is trying to break a password by testing certain combinations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is intelligent search? (Attack)

A

Intelligent search is when the hacker tries to narrow the search filead of the credentials they trie to get, such as if a hacker tries to get a Swedish users password, they would not try a Daish dictionary attack, they would use Swedish words.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does S in STRIDE stand for?

A

Spoofing, which is when a hacker or a program successfully identifies them selfs as someone or something else to get private information from a user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does T in STRIDE stand for?

A

Tampering, which is when a hacker or a program gain access to a file, db, hardrive or something similar and change or modifies it to cause damage or gain further access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does R in STRIDE stand for?

A

Repudiation, stands for when a hacker or program carries out an attack and then denies their involvement and leaving little to no digital evidence making it hard to prove their participation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does I in STRIDE stand for?

A

Information disclosure, is when private information is being leaked, this can occur because of poor error management or input handling.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does D in STRIDE stand for?

A

Denial of service, is when a hacker or program is targeting a service by making it unavailable for their users, a common user attack is DDoS when multiple requests is sent to a service trying to overload it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does E in STRIDE stand for?

A

Elevation of privilege, is when a hacker is trying to grant them self a higher privilege to gain more control of the system, this can be by trying to get admin access on a regular account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a social engineering attack?

A

Is when a hacker tries to trick a person to either give up information by social skills, so they can carry out some attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the name of establishing confidents in a users identity while trying to access a system?

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is False match rate?

A

FMR is the number of times an authentication system wrongfully gives access to a user that was not supposed to gain access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is FMR?

A

False match rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is FNMR?

A

False non match rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is False non match rate?

A

FNMR is the number of times an authentication system wrongfully does not give access to a person who was supposed to gain access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is attack surface?

A

Attack surface is all the reachable parts of a system where a hacker can try to gain access to the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is WannaCry? (Virus)
WannaCry is a malware that encrypts data and demands a ransom to give it back to the owner.
26
What is Melissa? (Virus)
Melissa is a Macro virus that spreads over email, it prompted users to open a file, and then sent out 50 emails to other users, this spread really fast and even overloaded email servers which caused them to crash.
27
What is Elk cloner? (Virus)
Elk cloner is a Macro virus which was spread by floppy discs between apple II computers
28
What is a Macro virus?
Macro virus is a Virus embedded in a program, file etc to hide the existens of it, and when the file or program is started it does what it is intended to do.
29
What is Creeper? (Virus)
Creeper was the first computer worm, it was not malicious, but it still self copied and spread by it self and when infecting a computer let users know it had been infected.
30
What is a plain text attack?
It is when the attacker has access to both plain text which is the unencrypted text and the cipher text version, which means the attacker knows the encryption algorithm.
31
What is IPSec?
IPSec is a protocol that encrypts data between two computers over internet, it is commonly used for VPNs.
32
What is SSL/TLS?
SSL/TLS is a protocol that provides security over a network and is most commonly used for HTTPS
33
What is S/MIME?
S/MIME is an encryption standard used for E-Mail and is similar to the SSL protocol.
34
What is HTTPS?
HTTPS or Hypertext Transfer protocol secure, is a encrypted version of HTTP which now is outdated and HTTPS is what is being used for the internet.
35
What is a Digital envelope?
Digital envelope is used for sending data without it being tampered with along the way. It works as the system encrypts the data that will be sent, then they ask the reciver for their public key and then encrypt the key for the data. Then they pass the message along and in theory only the receiver should be able to decrypt the key and then the message.
36
What does "ones" value mean in a UNIX system file permission 111222333 ?
It is the owners permission
37
What does "twos" value mean in a UNIX system file permission 111222333 ?
It is the group permission
38
What does "threes" value mean in a UNIX system file permission 111222333 ?
It is the others premission
39
What is a tangible asset?
It is an asset that is easy for a threat agent to target, such as a laptop or a storage device.
40
What are the different threat agents?
Nation states, Competitors and organized crime, Terrorists, Hacktivists, Thieves and people hacking for fun
41
What is a challenge response mechanism? (CRM)
It is the most common authentication process, it is when a user tries entering a system, then gets prompted with a challenge such as answaring a question, providing password or authentication with an app or email.
42
What is CAPTCHA?
Is an automatic test to tell people apart from computers?
43
What is a template in biometric authentication system?
Features extracted from a biometric trait is stored in a data baser to be abled to authenticate users
44
What numbers are connected to the different Linux permissions?
R = 4, W = 2, X = 1
45
What is a Polymorphic virus?
It is a virus that keeps it core function but every time it is executed it changes, it attaches it self to other files.
46
How to rename a file with a UNIX command?
mv filename.txt newfilename.txt
47
How to move a file with UNIX command?
mv filename.txt /home/user..
48
How do you print the current file path with a UNIX command?
pwd
49
How to make a directory with UNIX command?
mkdir lib
50
How to remove a directory with UNIX command?
rmdir lib
51
how to remove a file with UNIX command?
rm fil.txt
52
How to copy a file with UNIX command?
cp filename.txt copiedfile.txt
53
How do you show the content of a file with UNIX command?
cat filename.txt
54
How do you change permissions to a file using UNIX command?
chmod 765 filename.py (RWX RW WX)
55
How to change the owner of a file using UNIX command?
chown johnny:johnny2 filename.py (Johnny = Owner, Johny2 = group)
56
What is Dataveillance?
Dataveillance is when a threat agent uses a person data to surveillance them, as for instance they look at a targets pictures on instagram to try and find there location, what time they are online to se their timezone etc.
57
-rwxr-xr-x 1 root root 2957 Nov 9 2022 keychainjohnny2.py. What is the Owners permission?
RWX
58
-rwxr-xr-x 1 root root 2957 Nov 9 2022 keychainjohnny2.py What is the Groups permission?
r-x
59
-rwxr-xr-x 1 root root 2957 Nov 9 2022 keychainjohnny2.py What is the others permission?
r-x
60
-rwxr-xr-x 1 root root 2957 Nov 9 2022 keychainjohnny2.py What is owner and group owner?
Rooot - Root
61
What is Block cipher?
This is when encryption is done in pre-decided blocks and there by both the sender and receiver knows the block size and can therefore encrypt and decrypt.
62
What is a stream cipher?
It is a real time communication tool where a combination of receiver and senders keys ar combined to generate "random numbers" which are the used to encrypt a message and at the same time putting the numbers in the encryption by using XOR and can there by also be decrypted with XOR. It can be encrypt one bit at a time or one byte.
63
What is verifications vs identification in biometric system?
Verification is when the ratio is (1:1), which means that a user has provided some type of identification so that the biometric data works as a password to verify. Identification is when the ratio is (1:N), which means that a biometric is used to find if the database stores this persons data.
64
Mention an application that needs low FMR?
An application that needs low FMR is a highly secure application, the applications is handling data that could be dangerous if the wrong person got access to it, thats why its better if the right user is denied insted of a wrong person being approved.
65
Mention an application that needs low FNMR?
An application that needs low FNMR is where security is not that high and usability is prioritized higher, this could for instance be an iPhone where facial id sometimes works for twins etc.
66
What security property is violated by S in STRIDE?
Spoofing violates authentication
67
What security property is violated by T in STRIDE?
Tampering violates integrity
68
What security property is violated by I in STRIDE?
Information disclosure violates Confidentiality
69
What security property is violated by D in STRIDE?
Denial of service violates the availability
70
What security property is violated by E in STRIDE?
Elevation of privilege violates authorization
71
What is DREAD?
D = Damage R = Reproducibility E = Exploitability A = Affected user D = Discoverability
72
What is Cryptography?
Cryptography is the art of securing messages between a sender and receiver.
73
What is Attribute-Bases access control (ABAC)?
Access is granted based on attributes, such as subject (Who wants access?), Objects (What they want to access?) Environment (Where they want to access from). Example when you are a MAU employ and try to access the Intranet, you need to be an employ, you need to have access to to the part you are trying to reach and you need to either be at school or use a VPN configuration
74
What is Discretionary access control (DAC)?
Access is controlled by the owner of the resource.
75
What is Role-Based Access Control (RBAC)?
Access is given based on roles, it is a system where roles are what gives certain access to data, for instance a guest, user and admin have different privileges
76
What is Mandatory Access Control?
Access is being controlled by a central unit which is what military use to make papers classified so only certain people can get access, which is being controlled buy the central unit.
77
What is IDS?
IDS is intrusion detection system, which is a system that flags when a system is being attacked but does not stop it by default
78
What is IPS?
IPS is intrusion prevention system, which block the attacker as soon as the attack is being discovered.
79