Exam Flashcards

1
Q

ISO27000 INFORMATION SECurity

A

Preservation of confidentiality, integrity and availability of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What determines a good hash function?

A

Fast
Not possible to revert
No collisions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

3 stages of security control

A

Storage, transmission and processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Application of hash functions

A

MAC
Check if a download is correct (no byte tampering)
Storing information such as password (compare the hashes to eachother)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does TLS achieve?

A

Encryption, authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

PORT for HTTPS and HTTP?

A

HTTPS: 443
HTTP: 80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Confidentiality

A

The property that information is not made available or
disclosed to unauthorized individuals, entities, or
processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Availability

A

The property of being accessible and usable

upon demand by an authorized entity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Integrity

A

The property of accuracy and completeness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ISO27001

A

Information Security Management System

It describes a framework setting up and managing an ISMS,
i.e. establishing and operating a security program within an organisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ISO27005

A

risk management process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ISO27002

A

Code of practice for information security management

It provides a checklist of security controls that organisations
can consider using and implementing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Risk treatment strategies

A

– Reduce,
share,
retain/accept,
avoid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Authorization

A

Authorization is to specify access and usage permissions for entities, roles or
processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

biometric requierment

A

Universality:
Each person should have the characteristic;
Distinctiveness:
Any two persons should be sufficiently different in
terms of the characteristic;
Permanence:
The characteristic should be sufficiently invariant
(with respect to the matching criterion) over a period
of time;
Collectability:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Threat scenario modelling:

A

– Attacker centric, architecture centric, and asset centric

17
Q

TPM

A

TRustedf platform module
-Sealed storage/encryption
Authenticated boot
-Remote attestation

18
Q

Phases in incident response

A

analysis
– containment
– eradictation
– normalization

19
Q

Parameters (block and key size) of AES

A

Block: 128
Key: 128, 192, 256

20
Q

3 categories of security controls

A

physcial: lock
administrative: polciies
, technologiaal: encryption

21
Q

3 functional sec

A

Preventive: Encryption
detective: Intrusion detection system
corrective security: REstore to backup

22
Q

Type 1 and type 2 virtualization architecture

A

Type1: Hyeprvisoper -1, OS 0
Type2: OS 0: Rest is 3 (including hypervisor)

23
Q

Type 1 and type 2 virtualization architecture

A

Type1 (No hostOS between): Hyeprvisoper -1, OS 0

Type2: OS 0: Rest is 3 (including hypervisor)

24
Q

phases in incident response

A

analysis
– containment
– eradictation
– normalization

25
Q

Risk assessment process

A

Identification: Assets, threats
Analysis: Value of assets, likelyhood
Evaluation: Rank risk, compare with criteria

26
Q

Elkement of ISMS cycle

A

Planning, Risk assessment, security controlls, evaluation, reporting

27
Q

entity

A

A person, organisation, agent, system, session, process, etc

28
Q

identity

A

A set of names / attributes of entity in a specific domain
An entity may have identities in multiple domains
An entity may have multiple identities in one domain

29
Q

DAC

A

Discretionary access control

Linux, r,w,x

30
Q

tls dh

A

Client and server perform Diffie-Hellman-Exchange (DH)
Server signs his DH value with server private key (RSA)
Client validates signature with server public key (RSA)

31
Q

tls pic

A

see pic pohne