L11 Security in Networks I Flashcards

(80 cards)

1
Q

What defines a system as ‘secure’?

A

• A system is secure if its resources are used and accessed as intended under all circumstances
• However, total security cannot be guaranteed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a threat in cybersecurity?

A

• A potential security violation
• May or may not happen
• Can lead to attacks on systems or networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Who is an intruder in the context of system security?

A

• Someone attempting to gain unauthorized access
• May try to damage or disrupt data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the main types of security violations?

A

• Breach of confidentiality
• Breach of integrity
• Breach of availability
• Theft of service
• Denial of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a breach of confidentiality?

A

• Unauthorized access to or theft of data (e.g., credit card data)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a breach of integrity?

A

• Unauthorized modification of data (e.g., altering website content)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a breach of availability?

A

• Destruction or disruption of data (e.g., website defacement)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is denial of service (DoS)?

A

• Preventing legitimate users from accessing system services by overwhelming them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is masquerading in network security?

A

• Pretending to be another user or system to gain unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a replay attack?

A

• Maliciously repeating a valid data transmission to gain advantage (e.g., money transfer)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is session hijacking?

A

• Taking over an active communication session to bypass authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the four levels of effective security measures?

A

• Physical
• Human
• Operating System
• Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a Trojan Horse in cybersecurity?

A

• A program disguised as something benign
• May delete/modify data or install backdoors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a trap door in software?

A

• A hidden access point (e.g., hardcoded credentials) left by the developer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a logic bomb?

A

• Malicious code triggered under specific conditions (e.g., a date/time)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a worm?

A

• A standalone, self-replicating program that spreads and consumes resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How did the Morris Worm work?

A

• Exploited UNIX vulnerabilities
• Used a ‘grappling hook’ and main program
• Conducted attacks via rsh, finger, and sendmail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the purpose of cryptography?

A

• Ensure secure communication without trusting the network
• Encode messages so only parties with the correct key can decode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Define: Cipher, Plaintext, Ciphertext.

A

• Cipher: Algorithm for encryption/decryption
• Plaintext: Original message
• Ciphertext: Encrypted message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is symmetric encryption?

A

• Uses the same key for both encryption and decryption
• Requires secure key sharing between sender and receiver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Name some symmetric encryption algorithms.

A

• DES, Triple DES, AES (block ciphers)
• RC4 (stream cipher)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is asymmetric encryption?

A

• Uses different keys for encryption and decryption (public/private)
• Public key is shared openly; private key is secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

How does RSA encryption work?

A

• Based on factoring large prime numbers
• Public key for encrypting; private key for decrypting
• Often used to securely share symmetric keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What does the macro in the diagram do?

A
  • Runs a Visual Basic script that silently formats the C: drive
  • Exploits the FileSystemObject and Shell to execute the command
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Why is this script dangerous?
* It causes irreversible data loss by reformatting the hard drive * Can be embedded in a macro-enabled document for stealth execution
26
What does the 'Man-in-the-middle' diagram show?
* An attacker intercepting communication between sender and receiver * Appears legitimate to both ends
27
What does the 'Normal' communication diagram illustrate?
* Direct communication between sender and receiver without interception
28
How does a man-in-the-middle attack differ from session hijacking?
* Man-in-the-middle maintains ongoing interception * Session hijacking takes over after authentication has occurred
29
What security threat is depicted in the masquerading diagram?
* An attacker pretending to be a trusted sender to deceive the receiver
30
Why is masquerading considered a breach of authentication?
* It allows access to resources or privileges under false identity
31
What attack method is illustrated with the 'grappling hook' and 'worm'?
* The Morris Worm attack * Uses a grappling hook to exploit vulnerabilities (e.g., rsh, sendmail) and downloads the worm
32
What services were exploited in the Morris Worm?
* rsh, finger, sendmail
33
What does this encryption diagram represent?
* Symmetric key encryption over an insecure channel
34
What are the key components shown in the diagram?
* Key exchange * Encryption algorithm (E) and Decryption algorithm (D) * Attacker attempting to intercept ciphertext
35
How is secure communication maintained despite an insecure channel?
* Only the intended recipient with the correct key can decrypt the message
36
What is a breach of availability?
Unauthorized destruction or disabling of data or services, e.g., website defacement or DoS attacks.
37
How does theft of service occur in a system?
Unauthorized use of system resources like CPU or network bandwidth, often through rogue processes.
38
What is confidentiality in the context of security?
Ensuring that information is only accessible to those authorized to view it.
39
What example best illustrates a breach of integrity?
Modifying the content of a trusted website or falsifying database entries.
40
Why is a DoS attack considered a serious security violation?
It disrupts availability, preventing legitimate users from accessing system resources.
41
Why must physical security be part of cybersecurity?
Unauthorized physical access can bypass digital safeguards completely.
42
What are examples of human-level threats to security?
Phishing, social engineering, careless password handling.
43
Why is network-level security crucial?
Data in transit can be intercepted, spoofed, or altered.
44
What is the weakest link principle in security?
The overall system security is only as strong as its least protected component.
45
What is the goal of defense in depth?
To use multiple layers of security to protect against different types of threats.
46
What is a Trojan horse in cybersecurity?
A malicious program disguised as a useful one that grants unauthorized access.
47
How does a trap door threaten a system?
It provides a hidden way to access the system, often without authentication.
48
What is a logic bomb?
A code segment that triggers a malicious function when specific conditions are met.
49
What distinguishes a virus from a worm?
A virus requires a host file to propagate; a worm does not and can self-replicate.
50
How does buffer overflow pose a security risk?
It can overwrite memory, allowing attackers to execute arbitrary code.
51
What is port scanning used for by attackers?
To find open ports that may have exploitable services.
52
What are zombie systems in the context of network threats?
Compromised machines used to launch attacks like DDoS without the owner's knowledge.
53
How does a worm exploit network systems?
By self-replicating and spreading across connected devices, consuming resources.
54
What kind of services might be abused in a system attack?
Email servers, open ports, and default login credentials.
55
What is a hybrid threat involving both system and network vectors?
A worm that installs a Trojan horse through a network exploit.
56
What is the difference between encryption and cryptography?
Cryptography is the study of secure communication; encryption is one of its methods.
57
Define the term ‘cipher’.
An algorithm used for encryption and decryption.
58
What is plaintext in cryptography?
The original readable message before encryption.
59
What does ciphertext mean?
The encrypted, unreadable version of a message.
60
What is cryptanalysis?
The study of breaking or analyzing encryption to reveal plaintext without a key.
61
Why is encryption used in network communication?
To prevent unauthorized users from reading transmitted data.
62
What is the function of a decryption algorithm?
To transform ciphertext back into readable plaintext using a key.
63
What makes an encryption function secure?
Its output cannot be deciphered without the correct key.
64
What does key management involve in encryption?
Generating, distributing, and securely storing cryptographic keys.
65
What is a cryptosystem?
A suite of algorithms and keys used for secure communication.
66
Why is key secrecy fundamental to encryption?
If the key is compromised, the security of all encrypted data is lost.
67
What does it mean for decryption to be infeasible without a key?
It should not be computationally practical to decrypt data without knowing the key.
68
Why is public-key infrastructure needed in asymmetric encryption?
To ensure the authenticity and trustworthiness of shared public keys.
69
What ensures encryption resists brute-force attacks?
The key length and algorithm complexity.
70
Can encryption be secure if the algorithm is public? Why?
Yes, as long as the key remains secret, public algorithms can still be secure (Kerckhoffs's principle).
71
What is the main advantage of symmetric encryption?
It is computationally efficient and fast.
72
What is AES?
Advanced Encryption Standard — a widely used symmetric block cipher.
73
Why is secure key exchange a problem in symmetric encryption?
Both parties must already share a secret key, which is hard to do securely.
74
How does DES differ from Triple DES?
Triple DES applies the DES algorithm three times for improved security.
75
What is RC4?
A stream cipher previously used in SSL; now considered insecure.
76
What are the two keys used in asymmetric encryption called?
Public key (for encryption) and private key (for decryption).
77
What is RSA based on?
The difficulty of factoring large prime numbers.
78
Why is asymmetric encryption slower than symmetric?
It uses more complex mathematical operations and larger keys.
79
When is asymmetric encryption typically used?
For securely exchanging symmetric keys or in digital signatures.
80
How does a recipient know a message came from a trusted source in asymmetric encryption?
Using digital signatures verified by the sender’s public key.