Mid-term exam part 2 study Flashcards
(33 cards)
what is the Fraud and Abuse Triangle?
3 aspects of motivation before mis-behavior occurs.
1-opportunity: without opportunity or if the attacker thinks they will get caught then they prob wont do it.
2-pressure: financial, greed, desire to perform or hide under achievements- psychology of perpetrator
3-Rationalization: convinces themselves they are good people in their own mind. may say to self ‘my employer expects too much of us’’, etc.
what is the Coso framework?
a type of security planning framework for corporations with 4 main objectives: 1- strategic: high lvl goals, 2- operations: efficient use of resources, 3- Reporting: reliability and 4- Compliance: compliance with laws.
what is the Cobi framework?
a type of IT security control planning that offers a framework as follows:
1- planning and organizing
2- acquisition and implementation (information systems)
3-delivery and support (implementation of IT security)
4- monitoring
what is plain text?
the original message (images, text, sounds ,etc) . used in cryptography
cyphertext?
the end result of encryption.
-the plain text is encrypted and turned into ‘random bits’ called Cyphertext.
Cipher?
the mathematical operation to encrypt and decrypt data.
key?
random string of ones and zeros. the cipher and key are needed to encrypt and decrypt a message.
what is Kerckhoof’s law?
states that for encryption to work: only the key needs to be kept secret not the cipher.
what is symmetric encryption?
symmetric encryption: single key is used for encryption and decryption in both directions. keys must be shard ahead of transmissions securely.
what is Asymmetric encryption?
also called public key encryption: 2 keys are used, one is private and one is public. the public key is used to encapsulate the message and each user has their own private key used to decrypt messages.
what is exhaustive search and how is it mitigated?
exhaustive search: brute force: try every key until password is cracked. the longer the key the harder and longer it takes to crack. each additional bit used in the key doubles the time it will take to crack the key. 100 bits req. today
what number of bits in a key do some countries require so the authorities can crack it?
40 bits or less.
what is exhaustive search?
brute forcing a password.
out of the 4 following types of encryption, which type is viable/ secure today? RC4 DES 3DES AES
AES
what are RC4 encryption strengths and weaknesses?
RC4 is extremely fast and uses little Ram- makes attractive for low end mobile devices. encryption of 40 bits or more. very weak and is easy to crack.
what is DES & what is its strength/weakness?
DES: Data Encryption Standard- 56 key bit length, weak to brute force, uses moderate ram, often used by resident devices as supported by many devices.
what is DES3?
DES3: Triple DES- much longer key lengths up to 128 bits. uses lots of Ram, applies 2-3 keys by multiplying DES for added security. high processing power. Very strong.
what is AES?
AES: Advanced Encryption Security: standard for today. low ram use, low processing use, long keys up to 256 bits. very strong and hard to break “gold standard”
what is it and how does it work: Handshake?
when 2 parties communicate a standard cyptographic system must be agreed appon.
1-Negotiation: the type of crytography used
2-initial authentication: test the identity of one another. *mutual authentication, or single if just authenticating a user to a server.
3-Keying: sending of keys or secrets to one another before communication takes place.
what is electronic signature?
a code is added to each message so that the receiver can verify the message is sent from a reliable and authenticated source and has not been tampered with.
what is MbM authentication?
MbM: Message by Message Authentication- each message is authenticated by the receiver because the sender has sent it with an electronic signature.
what is message integrity ?
integrity: the authentication process rejects any messages that have been altered while in transit. this is done through the use of electronic signatures and MbM authentication.
what is Hashing? examples of it?
Hashing: a large bit number divided by a smaller number gives a remainder… is the Hash value that can not be reversed but can be repeated. It is Irreversible! 128-512 bits long. examples of Hashing: MD5 & SHA
what is SHA and should it be used?
SHA: Secure Hash algorithm- a type of hashing that should only be used if it is one of the stronger versions like SHA-256. produces 160 bits for SHA and 256 for the SHA-256