Security Flashcards

(53 cards)

1
Q

Strategies to reduce risk of data confidentiality

A

Provider ensured data fully destroyed

Multiple encryption keys

Logical isolation of multiple customers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Federated identity management

A

Arrangement between two or more trust domains

Use same digital idenity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Security risks of user identity federation

A

Less control over use lifecycle

Single point of failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

____ Identity Server can act as a hub that connects multiple identity providers to authenticate users to a particular service provider

A

WSO2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The Google ____ 2.0 system supports server-to-server interactions such
as those between a web application and a Google service

A

0Auth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Difference between WSO2 and 0Auth

A

0Auth supports server to server interactions

WSO2 acts as a hub, “more frontend”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

RACI stands for

A

Responsible Accountable Consulted Informed Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Bussiness COntinuty

A

Activity performed to ensure bussiness continues in case of disaster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is it important contracts define froma bussienss continuity and resilience perspective

A

Recovery time

Objects

Monetary Penalty if downtime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

BS 259999

A

Now ISO 22301

International Standard for implementing and maintaining effective business continuity plans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Usage of data consideration

A
  • Personal died used without consent
  • Data sent across borders
  • No opt out features
  • Lack of individual control
  • Local law
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What can be done to data to make it be used for more general purposes?

A

De-identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Risks of multi-tenancy if managed uncorrectly

A
  • Inadequate local seperation
  • Co-mingled tenant data
  • Uncoordinated change controls
  • Performance risks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Visually descriobe a multi-tenant application

A

Ref img

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Multi-tennacy - keys

A

Per Tenant Key management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is important to manage risk

A

Third Party Assessments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

In the event of a security incident, applications and services hosted at a Cloud provider are

A

difficul to investgate

distributed logging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Infrastructure Security Architecture- Cloud

A

Tiered zones

Only allow required access in each zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Examples of third party audit lifecycle

A

Vulnerability identification

Results Analysis

Risk Assessment

Redmediation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Improving security of network and apps is referred to as

A

Hardening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Are non-prod enviroments immune to exposure?

A

No - even more at risk due to
generic authentication crdes
security flaws
then PIVOTING into production

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Use cloud for secret app?

23
Q

Security MEtric

A

Measurable value - how well company doing to reduce cyber security risks

24
Q

Types of security metrics

A

Process
Network
Software

25
What do process security metrics usually refer to?
Measure processes and procedures Compliance/Governance driven Generally support better security Actual impact hard to define
26
What type of security metric would be associated with the following: No. of policy violations % of systems with formal risk assessments % of system with tested security controls % of weak passwords No. of identified risks and their severity % of systems with contingency plans
Process Security Metric
27
Network Security Metric - common features
* Driven by products * Readily available * Widely used * Gives sense of control
28
Examples of network security metrics
* Succesfull/unsucceful logs * No of incidents * No of cirus blocked * No of virus inections * No of port probes * Traffic analysis
29
What type of security metric is associated with the following: Successful/unsuccessful logons No. of incidents No. of viruses blocked No. of patches applied No. of spam blocked No. of virus infections
Network Security Metric
30
Charateristics of software security metric
Complex Context sENSITIVE eNVIROMENT dEPENDENT
31
Levels of software seucrity metric
System Level Design level Code level
32
Follow are examples of what security metric? Size and complexity Defects over time Cost per defect Layers of security Design Flaws
Software Security Metric
33
Threat Modelling to do with
Explore vulnerabiles, threats and create strategies for these
34
Who released Bitcoin
Pen name Satoshi Nakamoto 2008
35
What type of blockchain is bitcoin
Distributed ledger
36
Three parts of a chain in a blockchain
Data Hash Previous Hash
37
What ensures the integrity of a proof of work blockchain?
The number of blocks in chain - to change one piece of data would require to rehash the entire change, impossible
38
Explain how a blockchain links up
Ref to img
39
Different blockchain consensus mechanism
Proof of Work Proof of Stake
40
Disadvantages of proof of work
Lack of speed Poor Scalability Inefficient Energy COnsumption
41
What consensus mechanism does Ethereum use
Proof of stake
42
Role of validators in Proof of Stake chain
no energy-intensive computational process to earn the right to validate. Instead of working to solve proofs of work, validators “stake” some of the blockchain’s native tokens to become eligible for selection as a validator node. The prospective validator will essentially stake crypto tokens native to the blockchain to serve as collateral.
43
Distributed LEdger TEchnology (DLT) is often associated with what type of blochain
Consortium / Private blockchain
44
Is hashing alone enough to secure a block chain? If not, what else is used?>
No *Consensus Mechanism *Distributed peer-to-peer network
45
Proof of work conesus mechanism
achieving agreement on Blockchain network to confirm transactions and addnew blocks to the chain solve mathematical problem
46
How does adding proof of work increase bitcoin security?
Takes alot of time to recalculate each block
47
Centralized, Decentralized and Distributed Difference
Ref img
48
To succefully tamper with a proof of work blockchain you would have to
Temper with all blocks Redo proof of work for each block Take control of > 50% of peer-peer network to generate consensur
49
How can blochcain support confidentiality
encrypt block data
50
Future component of blocbhain
*Smart Contract - Get rid of need for intermedieries *Blockbhain Cloud Storage *IoT BLockchain
51
Smart Contract Use Cases
* Supply chain * REal estate * Insurnace * Personal Identity
52
Describe Blockchain Cloud Storage
1. Shard data 2. Encrypt shards 3. Distributed shards across nodes with synched ledger 4. Record transactions on blockhain ledger
53
What is this an example of?
Smart Contracts in a supply chain Each level validated it has received product and performed their respective process