Prelim Flashcards

(83 cards)

1
Q

What is E-commerce?

A

Any transaction online, including online banking, software services, remote service providers, or online course platforms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the key specifications of Real-world Security?

A
  • Specifications/policy : What is the system supposed to do
  • Implementation mechanism : How does it do it?
  • Correctness/assurance : Does it really work?
  • Human Nature : Can the system survive “clever users”?
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What you might want in a software?

A

*Privacy
*Protection against phishing, vishing
*Integrity
*Authentication
*Authorization
*Confidentiality
*Non-repudiation
*Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

It is the protection against unauthorized modification or destruction of information.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ensures that information is not disclosed to unauthorized persons.

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The process of verifying the identity of a user, message, or originator.

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Provides proof of data delivery and sender identity, so that neither party can later deny having processed the information.

A

Non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

It is the guarantee of timely, reliable access to data and information services for authorized users.

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does Availability refer to in information security?

A

Timely, reliable access to data and information services for authorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define Integrity in the context of information security.

A

Protection against unauthorized modification or destruction of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Confidentiality in information security?

A

Assurance that information is not disclosed to unauthorized persons.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Authentication?

A

Security measures to establish the validity of a transmission, message, or originator.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does Non-repudiation mean?

A

Assurance that the sender has proof of data delivery and the recipient has proof of the sender’s identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the types of assets in information security?

A
  • Physical assets: Devices, computers, people
  • Logical assets: Information, data, intellectual property
  • System Assets: Software, hardware, data, personnel resources
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is an attack in the context of information security?

A

An attempt to gain access, cause damage to, or otherwise compromise information and/or systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a Passive attack?

A

An attack in which the attacker observes interaction with the system but does not directly interact with the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Define an Active attack.

A

An attack in which the attacker directly interacts with the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is an Unintentional attack?

A

An attack where there is no deliberate goal of misuse.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is Exposure in information security?

A

An instance when the system is vulnerable to attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Characteristics of information to be useful

A

Accurate
Timely
Complete
Verifiable
Consistent
Available

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Aspects of Information Needing protection

A

Availability
Confidentiality
Authentication
Non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

is the resource being protected

A

Assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Physical assets

A

devices, computers, people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Logical assets

A

information, data (in transmission, storage, or processing), and intellectual property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
System assets
any software, hardware, data, administrative, physical, communications, or personnel resource within an information system
26
What does Compromise refer to?
A situation in which the attack has succeeded.
27
What is a consequence of an attack?
The outcome of an attack, which may include disruption, corruption, or exploitation.
28
What is meant by Disruption in the context of consequences?
Targets availability.
29
What is meant by Corruption in the context of consequences?
Targets integrity.
30
What is meant by Exploitation in the context of consequences?
Targets confidentiality.
31
is a type of consequence, involving accidental exposure of information to an agent not authorized access.
Inadvertent disclosure
32
Taxonomy of attacks with relation to security goals
Threat to Confidentiality Threat to integrity Threat to availability
33
# Taxonomy of attacks with relation to security goals Threat to Confidentiality
Snooping Traffic analysis
34
# Taxonomy of attacks with relation to security goals Threat to integrity
Modification Masquerading Replaying Repudiation
35
# Taxonomy of attacks with relation to security goals Threat to availability
Denial of service
36
What is the definition of Authentication?
The process of recognizing a user’s identity.
37
What is Authorization?
The process that determines what a user is able to do and see on a website.
38
What is Malware?
Malicious software designed to disrupt, damage, or gain unauthorized access to systems.
39
Malware Prevention Methods
Regular Software Updates Antivirus Software Network Segmentation Educate Users
40
Malware Prevention Tools and Strategies
Patch Management Systems Endpoint Detection and Response (EDR) Regular Backups Network Segmentation
41
List examples of Malware.
* Viruses * Worms * Ransomware * Trojans * Spyware * Adware
42
What is Phishing?
Tricking individuals into providing sensitive information by pretending to be a trusted entity.
43
What are common forms of Phishing?
* Emails * Fake websites * SMS ('smishing') * Voice calls ('vishing')
44
Phishing Prevention Tools and Strategies
1 . Email Security Gateways 2 . Phishing Simulations 3 . Zero Trust Access 4 . Threat Intelligence Feeds
45
Social Engineering Prevention Methods
Strict Access Control Verify Requests Awareness Programs Incident Reporting
46
Software Vulnerabilities
Flaws or weaknesses in code that attackers can exploit to compromise systems, steal data, or gain unauthorized access
47
Hardware Vulnerabilities
Weaknesses in network protocols, configurations, or infrastructure that can lead to unauthorized access or data interception
48
Common Vulnerabilities
* Weak or Default Credentials * Man-in-the-Middle (MITM) Attacks * Unsecured Network Devices * Denial of Service (DoS) and Distributed Denial of Service (DDos Attacks: * Outdated or Insecure Protocols
49
What is Social Engineering?
Exploiting human psychology to manipulate individuals into divulging confidential information.
50
What are examples of Social Engineering?
* Pretexting * Baiting * Tailgating * Quid pro quo attacks
51
What are Denial of Services (DoS) Attacks?
Overloading systems or networks to make them unavailable to legitimate users.
52
What are Man in the Middle (MITM) Attacks?
Intercepting communication between two parties to eavesdrop or alter data.
53
What are Password Attacks?
Cracking or stealing passwords through brute force, dictionary attacks, or keylogging.
54
What are Zero Day Exploits?
Exploiting software vulnerabilities before the vendor releases a patch.
55
Define Cryptology.
The process of making and using codes to secure the transmission of information.
56
Where did the word Cryptology came from?
Greek words Kryptos and Grahein “Kryptos” means hidden “Grahein” means to write
57
Code Breaking
Cryptanalysis
58
Code designing
Cryptography
59
What does Cryptanalysis refer to?
The process of obtaining the original message from the encrypted message.
60
What is cryptography?
The practice and study of encryption to prevent unauthorized reading of information.
61
What does a cryptographic system typically include?
* Private key cipher * Message integrity techniques * Secure identification/authentication techniques
62
What is a Private Key cipher?
A cipher where the secret key is shared between two parties.
63
What is a Public Key cipher?
A cipher where the secret key is not shared, allowing communication using public keys.
64
What is the operation principle of the Caesar Cipher?
Each letter is translated into the letter a fixed number of positions after the letter in the alphabet.
65
What is a Block Cipher?
* Are stronger but slower and often implemented in hardware * One or large block at a time * Substitution and transposition
66
What is the Electronic Codebook (ECB) mode?
Each block is encrypted with the same key—identical plaintext block created identical cipher block | Simplest Encryption mode
67
What is Cipher Block Chaining (CBC)?
Each plaintext block is XORed with the previous ciphertext block, adding randomization.
68
What is the Counter (CTR) mode?
Encrypting using the value of a counter. Plaintext can be any size - XOR 8 bits at a time instead of 128 bit block | Acts like a stream cipher
69
What is a Stream Cipher?
* Are fast and easy to implement in hardware * Encryption is performed 1 bit or 1 byte at a time * Mixes plaintext with key stream * Either using Symmetric Key or Public Key * The starting state should never be the same twice — uses initialization vector
70
What is Symmetric cipher?
involves using a single key to encrypt and decrypt data
71
What is Asymmetric Cipher?
encryption uses two keys - one public and one private - to encrypt and decrypt data
72
What is an assumption in information security?
It can help find underlying vulnerabilities.
73
Digest
can be used to check the integrity of a message: that the message has not been changed
74
Substitution cipher
replaces one symbol with another
75
Plaintext
* A message in its natural format readable by an attacker * Original message or data (also called cleartext
76
Ciphertext
Message altered to be unreadable by anyone except the intended recipients
77
Encryption
Transforming the plaintext under the control of the key
78
Key
Sequence that controls the operation and behavior of the cryptographic algorithm
79
Decryption
Transforming the ciphertext back to the original plaintext
80
Types of Cryptography
Stream Ciphers Block Ciphers
81
Confusion
Key to ciphertext relationship is very complicated Key cannot be determined on the ciphertext
82
Diffusion
Output should be different from the input Change 1 bit of the input, at least 50% of the output should change
83
Block Cipher Mode Operations
1. Electronic Codebook (ECB) 2. Cipher Block Chaining (CBC) 3. Counter (CTR)