L11 Security in Networks I Flashcards
(80 cards)
What defines a system as ‘secure’?
• A system is secure if its resources are used and accessed as intended under all circumstances
• However, total security cannot be guaranteed
What is a threat in cybersecurity?
• A potential security violation
• May or may not happen
• Can lead to attacks on systems or networks
Who is an intruder in the context of system security?
• Someone attempting to gain unauthorized access
• May try to damage or disrupt data
What are the main types of security violations?
• Breach of confidentiality
• Breach of integrity
• Breach of availability
• Theft of service
• Denial of service
What is a breach of confidentiality?
• Unauthorized access to or theft of data (e.g., credit card data)
What is a breach of integrity?
• Unauthorized modification of data (e.g., altering website content)
What is a breach of availability?
• Destruction or disruption of data (e.g., website defacement)
What is denial of service (DoS)?
• Preventing legitimate users from accessing system services by overwhelming them
What is masquerading in network security?
• Pretending to be another user or system to gain unauthorized access
What is a replay attack?
• Maliciously repeating a valid data transmission to gain advantage (e.g., money transfer)
What is session hijacking?
• Taking over an active communication session to bypass authentication
What are the four levels of effective security measures?
• Physical
• Human
• Operating System
• Network
What is a Trojan Horse in cybersecurity?
• A program disguised as something benign
• May delete/modify data or install backdoors
What is a trap door in software?
• A hidden access point (e.g., hardcoded credentials) left by the developer
What is a logic bomb?
• Malicious code triggered under specific conditions (e.g., a date/time)
What is a worm?
• A standalone, self-replicating program that spreads and consumes resources
How did the Morris Worm work?
• Exploited UNIX vulnerabilities
• Used a ‘grappling hook’ and main program
• Conducted attacks via rsh, finger, and sendmail
What is the purpose of cryptography?
• Ensure secure communication without trusting the network
• Encode messages so only parties with the correct key can decode
Define: Cipher, Plaintext, Ciphertext.
• Cipher: Algorithm for encryption/decryption
• Plaintext: Original message
• Ciphertext: Encrypted message
What is symmetric encryption?
• Uses the same key for both encryption and decryption
• Requires secure key sharing between sender and receiver
Name some symmetric encryption algorithms.
• DES, Triple DES, AES (block ciphers)
• RC4 (stream cipher)
What is asymmetric encryption?
• Uses different keys for encryption and decryption (public/private)
• Public key is shared openly; private key is secret
How does RSA encryption work?
• Based on factoring large prime numbers
• Public key for encrypting; private key for decrypting
• Often used to securely share symmetric keys
What does the macro in the diagram do?
- Runs a Visual Basic script that silently formats the C: drive
- Exploits the FileSystemObject and Shell to execute the command