SCC141: term 2 Flashcards

(87 cards)

1
Q

why is system security important?

A

-everyday life relies on digital systems
-attacks are costly
-data security, sensitive data may be being stored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what can system security weaknesses lead to?

A

-downtime
-data loss
-safety issues
-harassment- robotics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is the CIA triad?

A

-foundation for security requirements that aims to secure a system
-confidentiality
-integrity
-availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what does the confidentiality portion of CIA triad represent?

A

-makes sure data is only accessible by authorised users
-enacted through: encryption, access control and authentication methods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what does the integrity portion of the CIA triad represent?

A

-makes sure data can only be modified or removed by authorised users
-enacted through: checksums, hashing, digital signatures and version control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what does the availability portion of the CIA triad represent?

A

-makes sure resources/system is accessible when needed by authorised users
-prevented by denial of service/ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

why does the CIA triad matter?

A

-security fails if confidentiality/integrity/availability is compromised

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

list some security design principles:

A

-economy of mechanism
-fail-safe defaults
-complex mediation
-open design
-separation of privilege
-least privilege
-least common mechanism
-psychological acceptability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is the security design principle economy of mechanism?

A

-keeping designs simple reduces the risk of bugs/error
-encourages reusing quality components where possible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is the security design principle fail-safe defaults?

A

-denying access to resources, granting access if explicitly allowed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is the security design principle complete mediation?

A

-requests for resources must be authorised EVERY time
-no, ‘once you’re in, you’re in forever’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is the security design principle open design?

A

-transparency about system security
-peer reviews designs
-allows others the opportunity to find loopholes/bugs in the security that may be exploited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is the security design principle separation of privilege?

A

-dividing power over security across multiple parties
-means no single authority can compromise system security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is the security design principle defence in depth?

A

-multiple layers of security
-if one layer of security fails, the others should hold

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is the security design principle least privilege?

A

-a user or process should be granted the least privileges necessary for a task
-reducing access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is the security design principle least common mechanism?

A

-minimising shared resources or mechanisms being used by multiple components
-if one is compromised, they all are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what is the security design principle psychological acceptability?

A

-security should be user friendly
-could fail if users choose to bypass it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

what are the immutable laws of security?

A

10 security principles
-published by microsoft in 2001
-updated 2009/2023

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

why are privacy regulations needed ??

A

-to prevent data misuse
-to protect a user’s fundamental right to privacy
-help establish trust between user and service provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

what does the EU artificial intelligence act regulate?

A

-addresses unregulated AI applications
-categorises AI systems by risk
-high risk AI needs to be highly regulated
-proposed in April 2021
-enforcement expected by 2025

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

what is federated learning and how does it improve AI privacy?

A

-trains models locally on user’s device without transferring data to a centralised server
-protects sensitive data and reduces chance of data breaches during transmission.w

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

what is differential privacy?

A

-introducing statistical noise
-makes it impossible to trace data to its origin
-means data breaches are less damaging, as identities are hidden

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

what are some methods that can be used to increase privacy?

A

-federated learning: training AI locally
-differential privacy: noise in data sets to anonymize
-encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

what are some emerging privacy concerns with new technologies?

A

-generative AI and deepfakes
-biometric data: eg voice recognition
-neurotechnology: brain computer interfaces like neuralink
-consent fatigue: endless pop ups, users ignore and accept privacy agreements
-rapid tech evolution: can laws keep up with advancements?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
what is surveillance?
the systematic observation or data collection concerning people -usually with the aim of influencing or managing their behaviour
26
what is sousveillance?
surveilling those doing surveillance on others
27
give an example of covert mass surveillance
-USA patriot act 2001 -introduced under the guise of national security after 9/11 -any citizens' emails and phone records can be surveilled or monitored without a warrant
28
list some types of surveillance
-state surveillance -corporate surveillance -personal surveillance -self surveillance -covert/overt surveillance
29
what are the issues linked to surveillance?
-privacy violation -lack of consent -data monetisation -data security -over-monitoring -commercial exploitation
30
what are examples of digital censorship?
-automated systems filtering restricted content -blocking websites -preventing the expression of certain opinions in online spaces
31
what are some categories of digital censorship?
-network-level censorship: blocking websites/services -platform-level censorship: content moderation on social media/ removing flagged content -self-censorship: modifying behaviour due to knowledge of surveillance -algorithmic censorship: AI filters unintentionally removing content due to training bias/ suppression of videos or posts that contain certain content on social media
32
how can censorship actually be implemented?
-DPI: deep packet inspections (networks) -firewalls (networks): blocking IP addresses -AI moderators: natural language processing -Search engine filtering: prioritising or suppressing results based on political interests -social media echo chambers: algorithms amplifying/suppressing certain content
33
what is the principle of privacy by design?
-implementing privacy features early on in system development
34
what is malware?
-malicious software designed to harm or exploit a computer or network
35
list some types of malware
-ransomware -zombie -botnet -viruses -worms -trojans
36
what categorises a virus?
-malicious code attached to an executable file -infectious -can be prevented with anti-virus software
37
what categorises a worm?
-doesn't require a host file to spread to new devices -exploits security flaws on a network -disrupts networks and consumes bandwidth
38
what categorises a trojan?
-disguised as legitimate harmless software -spread through phishing -steals data and allows unauthorised access
39
what categorises ransomware?
-encrypts files and restricts owner's access to their files -spread through phishing/ infected websites -leads to data loss, financial extortion -backing up files important
40
what categorises a zombie?
-malicious software that allows host device to be controlled -created through any malware -monitor unusual activity on devices to recognise an attack
41
what is a botnet?
a network of zombies
42
what is a DDoS attack?
-distributed denial of service attack -like someone causing a traffic jam on a website or network to prevent user access
43
how can malware be spread?
-phishing emails -exploiting vulnerabilities -malicious websites or adverts -infected software being downloaded
44
what are some potential impacts of malware?
-data theft -system damage -loss of privacy -financial loss -device performance issues -reputation damage for service providers
45
describe the process of threat modelling
1. asset identification: what needs protecting? 2.threat analysis: potential attacks? 3. vulnerability analysis: how could attack occur? 4. risk assessment: likelihood of attacks
46
what is the malevolent practice social engineering?
-data collected through dumpster diving -e.g. looking through social media
47
what is the malevolent practice of grooming?
-gaining the trust of a potential victim -using their trust to access personal data
48
what are some potentially dangerous malevolent practices?
-online stalking -deepfakes and synthetic media
49
what are the two acronyms used as threat models?
-STRIDE and DREAD
50
how are risks quantified?
DREAD: --damage potential --reproducibility --exploitability --affected users --discoverability
51
how are threat categories classified?
STRIDE: -spoofing -tampering -repudiation -information disclosure -denial of service -elevation of privilege
52
what factors lead to digital exclusion?
-access -ability -affordability
53
what comes under the 'ability' factor of digital exclusion?
-digital literacy -physical and cognitive abilities -motivation and confidence
54
how can the ability factor of digital exclusion be mitigated?
-training and workshops -inclusive design -user friendly interfaces
55
what comes under the access factor of digital exclusion?
-infrastructure (broadband, networks) -devices and compatibility -reliability (stable connection)
56
how can the access factor of digital exclusion be mitigated?
-investment in infrastructure -community resources/devices -device donations
57
what comes under the affordability factor of digital exclusion?
-upfront costs -ongoing costs (access to networks/infrastructure) -maintenance costs
58
what are some methods of mitigating affordability issues in digital exclusion?
-subsidies and discounts -flexible payment -partnerships and grants
59
what are some factors that contribute to digital divide?
-age -income -geography -education -disability
60
what is the difference between digital exclusion and digital divide?
-digital exclusion: those who do not participate with technology despite access -digital divide: those who are unable to access technology.
61
what are the three layers to the digital divide?
-access divide: infrastructure -skills divide: knowing how to use -usage divide: who benefits from usage
62
what is the economic digital divide?
-low income communities or individuals that struggle to afford access to technology
63
what is the silver digital divide?
-older generations that struggle to adopt new technologies because of skill, understanding, mistrust etc
64
what is the geographical digital divide?
-often a divide between urban and rural areas with disparity of internet and physical infrastructure availability
65
what is the educational digital divide?
-disparity between students, some may have access to many devices and well connected where others may not be -is access to a device expected for work to be completed -children raised in schools with access to technologies
66
what is the disability digital divide?
-inaccessible devices/ websites for visually/hearing impaired -lack of assistive technology to support use -screen readers/braille displays/ eye tracking systems/ alternative input devices
67
what is the digital privacy divide?
the concept that certain groups may be more vulnerable to data theft and scams
68
what contributes to the gender digital divide?
-female representation in STEM remains lower which affects the amount of existing inclusive technology
69
what is data justice?
-ways in which big data systems can discriminate, discipline and control
70
what is predictive policing?
-using historic crime data to determine how to allocate police geographically
71
what is algorithmic auditing?
-a method to analyse AI models by repeatedly querying them -helps detect biases
72
what are methods involved in algorithmic auditing?
-data scraping -creation of synthetic user profiles
73
what is an LLM?
-large language model
74
why could large language models and AI be described as unintelligent?
-results or sentences outputted by AI are just the most likely word followed by the next most likely word. -there is no judgement done by the AI, is it intelligence? -they do not know why two words are related, just that they are.
75
how significant are IT emissions?
2.1-3.9% of global emissions, estimate made without considering AI
76
what are some processes that require electricity in computing?
-device manufacturing -water cooling in data centres -mining for minerals for device manufacturing -transporting goods
77
what is the police and criminal evidence act 1984?
-PACE -aims to find a balance between privacy and freedom of users with technology and the powers of the police (digital forensics)
78
what is the computer misuse act 1990
-makes hacking illegal -software misuse illegal -accessing/ helping others access protected files on another's computer
79
what are the NPCC guidelines?
-don't change data that may be relied on in court -be competent in finding data that is relied upon -keep an audit trail -SIO/OIC is in charge
80
81
What is a script kiddy?
- less skilled hacker using pre-made malware to gain attention or for fun
82
what security aspect is spoofing related to?
-authentication
83
what security aspect is related to tampering?
-integrity
84
what is repudiation?
denying a process or access due to lack of authority
85
what security control does information disclosure violate?
confidentiality
86
what security control does denial of service violate?
availability
87
what security principle does elevation of privilege violate?
authorisation