Study Flashcards
(64 cards)
Give an example where increased security reduces usability, and suggest a balanced solution.
2FA with very complex password requirements. A solution is to have 2FA with normal requirements.
What does the CIA triad stand for?
Confidentiality, integrity and Availability
These tables store precomputed hash values and are used to speed up the process of reversing a hash to reveal a password?
Rainbow Tables
What are the three RBAC extensions beyond RBAC0 (RBAC1, RBAC2, RBAC3), and how do they enhance access control?
RBAC1 - Hierarchy
RBAC2 - Constraints
RBAC3- Combined
What is a Bloom filter, and how is it used in password security?
A Bloom filter is a data structure used to test whether an element is a member of a set. It is used in password security to efficiently check if a password is weak. However, it can produce false positives.
What is the ciphertext of:
01000001 01001001 (Plaintext)
XOR
01000100 01000001 (Key)
00000101 00001000
In Unix control what are the three types of user categories ?
Owner, group, world
What is the Weakness of ECB mode in block cipher encryption ?
ECB (Electronic Codebook) mode is insecure because identical plaintext blocks are encrypted to the same ciphertext, revealing patterns that can be exploited. Large inputs are potentially more vulnerable.
What is the difference between a threat and an attack?
A threat is a potential cause of harm, while an attack is an actual attempt to exploit a vulnerability.
What is the formula for risk analysis?
Likelihood * Impact
What does “psychological acceptability “ refer to in security design?
Psychological acceptability means designing security measures that do not unduly interfere with the user’s work.
What is an attack tree, and what are the different parts of it.
An attack tree is a diagram used to model the different ways an attack can occur. It has a root (objective), leaf nodes (comprise the attack), sub nodes (attack events)
What is the main difference between symmetric and asymmetric encryption?
Symmetric encryption uses the same key for both encryption and decryption, while asymmetric encryption uses a pair of keys (public and private)
What is a hash function in cryptography and what is it’s main purpose?
A hash function takes an input and returns a fixed-size string of characters, typically used for integrity verification
This code is used to verify the integrity and authenticity of a message.
What is a message authentication code (MAC)
What is the purpose of access control in security?
Access control determines who can access what resources and ensures that only authorized individuals can perform certain actions.
What are problems with passwords?
Passwords can be hard to remember, and can be cracked easier than other means.
What are biometric authentication methods, how do they enhance security, and what is a problem with it.
Biometric authentication uses unique physiological characteristics (e.g., fingerprints, facial recognition) to verify identity, providing a higher level of security and convenience. Problems could be if someone lacks the biometric, and it is hard to change if compromised.
In UNIX-based systems, this user has unrestricted access to all resources and can perform any administrative task.
Who is the superuser
What is the purpose of an access control list (ACL)?
It defines permissions for users or groups on specific resources, determining who can read, write, or execute files.
Explain the difference between identification, authentication, authorization, and auditing.
Identification is claiming an identity, authentication is verifying it, authorization determines what the authenticated user can do, and auditing tracks actions to ensure compliance.
What are the key differences between DAC, MAC, and RBAC?
DAC (Discretionary Access Control) allows owners to set permissions, MAC (Mandatory Access Control) is based on predefined policies(often security clearances), and RBAC (Role-Based Access Control) grants access based on user roles.
What is the difference between an insider and an outsider threat?
An insider threat comes from someone within the organization, while an outsider threat originates from someone external.
What is the ciphertext of hello, caesar cipher with a shift of 7.
Olssv