Tenta Flashcards

(541 cards)

1
Q

What are the two steps in password authentication?

A

Identification (announcing who you are) and Authentication (proving who you are).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the four means of user authentication?

A

1) Something you know (e.g., password), 2) Something you possess (e.g., token), 3) Something you are (e.g., biometric), 4) Something you do (e.g., behavior-based).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is multi-factor authentication (MFA)?

A

A method that combines two or more authentication factors to verify identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What role does a username/login ID play in password authentication?

A

It determines the user’s authorization and privileges in the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What role does a password play in password authentication?

A

It confirms the user’s identity and establishes trust for access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a hash function?

A

A one-way function that’s easy to compute but hard to reverse.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why is a salt added to a password before hashing?

A

To ensure unique hashes even for identical passwords, preventing rainbow table attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a rainbow table?

A

A precomputed table for reversing cryptographic hash functions, used in password cracking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the three main password cracking strategies?

A

Exhaustive search (brute force), intelligent search (e.g., dictionary attack), and using dedicated cracking servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a password spoofing attack?

A

An attack where a fake interface captures user credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is shoulder surfing?

A

Observing a user enter a password over their shoulder.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a key logger?

A

Software or hardware that records keystrokes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is proactive password checking?

A

Enforcing rules or using dictionaries to prevent weak passwords from being used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a Bloom filter used for in password checking?

A

To efficiently check if a password exists in a blacklist of weak passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the drawbacks of memory cards?

A

They require special readers, can be lost, and may cause user dissatisfaction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a smart card?

A

A card with an embedded microprocessor used for authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the three types of memory in smart cards?

A

ROM, EEPROM, and RAM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the smart card authentication protocols?

A

Static, dynamic password generation, and challenge-response.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is biometric authentication?

A

Authentication based on unique physical characteristics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the two types of biometric matching?

A

Verification (1:1 comparison) and Identification (1:n comparison).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the Equal Error Rate (EER)?

A

The point where False Match Rate (FMR) and False Non-Match Rate (FNMR) are equal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is FMR in biometric systems?

A

False Match Rate – the rate at which unauthorized users are incorrectly accepted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is FNMR in biometric systems?

A

False Non-Match Rate – the rate at which legitimate users are incorrectly rejected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What biometric method has superior performance?

A

Iris pattern recognition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What are fingerprint minutiae?
Features like ridge endings and bifurcations used for fingerprint recognition.
26
What is challenge-response protocol?
A method where the system issues a challenge that the user must respond to correctly.
27
What are major threats in remote user authentication?
DoS, eavesdropping, host attacks, replay, client attacks, and Trojan horses.
28
Why should default passwords be changed?
To prevent easy access by attackers who know factory-set credentials.
29
What is a trusted path?
A secure method of communication ensuring interaction with a legitimate system component.
30
What does a password policy typically enforce?
Rules on password length, complexity, and change frequency.
31
What is the function of password ageing?
To require users to change passwords regularly.
32
What is single sign-on (SSO)?
Authentication once to access multiple services.
33
How can failed logins help identify attacks?
They may indicate unauthorized attempts to access an account.
34
What were some of the top 10 passwords used by Adobe users in 2013?
'123456', '123456789', 'password', 'qwerty', 'picture1'
35
What is NIST SP 800-63-3?
A Digital Authentication Guideline defining confidence in user identities presented electronically.
36
What does Cisco Identity Services Engine (ISE) provide regarding authentication?
An example of an admin password policy.
37
What are some types of CAPTCHA used in challenge-response mechanisms?
Image CAPTCHA, Text CAPTCHA, FunCAPTCHA, Phone Prompt, Authenticator App.
38
What is the purpose of a CAPTCHA in authentication?
To verify the user is human and not a bot.
39
What are the three types of memory in a smart card?
Read-only memory (ROM), EEPROM, and RAM.
40
What is the role of the embedded microprocessor in a smart card?
To process data and support authentication protocols.
41
What are the types of interfaces used by smart tokens?
Manual interface (keypad/display) and electronic interface (contact/contactless).
42
What are fingerprint minutiae?
Features like ridge endings, bifurcations, cores, and deltas.
43
Why are multiple fingers often recorded in biometric systems?
To increase accuracy of fingerprint recognition.
44
What is False Match Rate (FMR)?
The rate at which unauthorized users are incorrectly accepted.
45
What is False Non-Match Rate (FNMR)?
The rate at which legitimate users are incorrectly rejected.
46
What is Equal Error Rate (EER)?
The point where FMR and FNMR are equal; used to evaluate biometric systems.
47
Which biometric method generally has the lowest EER?
Iris pattern recognition.
48
What are biometric systems used for in low-security applications?
Convenience, e.g., unlocking a smartphone with fingerprint or face.
49
Why might high-security applications use biometrics?
To reduce FMR and enhance difficulty of misuse.
50
How can combining biometrics improve security?
Using multiple biometrics lowers FMR but may increase FNMR.
51
What is a Replay Attack in authentication?
An adversary reuses a previously captured user response.
52
What is a Trojan Horse attack in authentication?
A malicious program or device mimicking a legitimate one to steal credentials.
53
What is a Client Attack?
An adversary attempts to authenticate without access to host or communication path, e.g., by guessing passwords.
54
What is a Host Attack?
Targeting the user file where credentials or biometric templates are stored.
55
What is Eavesdropping in authentication?
Observing the authentication process to steal credentials.
56
What is Denial of Service (DoS) in authentication?
Flooding the system with requests to disable the service.
57
What is a trusted path?
A secure mechanism ensuring communication with the operating system, not spoofed software.
58
How do browsers help prevent spoofing?
By displaying the real URL in a way that cannot be spoofed by web servers.
59
Why are characters often hidden during password entry?
To prevent shoulder surfing.
60
Why might showing characters during password entry be useful?
Improves usability, especially for long or complex passwords.
61
What is a threat in the context of information security?
A potential security harm to an asset.
62
When does a threat materialize?
When an attack successfully exploits a vulnerability.
63
Who or what is a threat agent?
The entity carrying out an attack, such as an attacker.
64
What motivates hackers as threat agents?
Curiosity, challenge, and reputation.
65
What tools do hackers typically use?
Viruses, worms, phishing.
66
What is the primary goal of thieves as threat agents?
Monetary gain.
67
What skill level is usually associated with hacktivists?
Apprentice.
68
What are nation state attackers often motivated by?
Cyberwarfare, counter-intelligence, strategic goals.
69
What skill level is typically associated with nation state actors?
Master.
70
Give an example of a tool used by organized crime groups.
Botnets, ransomware, inside information.
71
What are examples of tangible assets?
Servers, networking equipment, storage devices, workstations.
72
What are examples of intangible assets?
Brand reputation, data, software, encryption keys.
73
Why is identifying intangible assets challenging?
They are not readily discovered or documented like hardware or software.
74
Define a vulnerability in a system.
A weakness that could be exploited to damage assets.
75
What are the three categories of vulnerabilities?
Corrupted (integrity), Leaky (confidentiality), Unavailable (availability).
76
Give an example of a leaky vulnerability.
Insecure data transfer and storage.
77
Name a tool used to find vulnerabilities.
Nessus Vulnerability Scanner, NMAP.
78
What are the three steps in threat modeling?
1) Decompose the application, 2) Determine and rank threats, 3) Determine countermeasures.
79
What is the purpose of decomposing an application in threat modeling?
To understand how the application functions and identify vulnerabilities.
80
What are entry points in threat modeling?
Places where data enters the system.
81
What is an exit point in an application?
Places where data exits, such as output or session termination.
82
What is a trust level in threat modeling?
A defined access right assigned to entities interacting with the system.
83
What do data flow diagrams (DFDs) represent?
Visual representations of how data moves and is processed in the application.
84
What does a privilege boundary in a DFD signify?
A change in trust level.
85
What is the role of a data store in DFD?
To represent where data is stored without modifying it.
86
What does STRIDE stand for?
Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege.
87
What security property does Spoofing violate?
Authentication.
88
Give an example of Tampering.
Changing data in the backend to grant unauthorized privileges.
89
What is Repudiation in STRIDE?
Denial of an action to avoid responsibility.
90
What does Information Disclosure violate?
Confidentiality.
91
Give an example of a DoS attack.
Flooding the network with requests.
92
What does Elevation of Privilege entail?
Gaining more privileges than entitled.
93
What does DREAD stand for?
Damage, Reproducibility, Exploitability, Affected Users, Discoverability.
94
What is a limitation of the DREAD model?
Subjective scoring and lack of widespread adoption.
95
What is an alternative to DREAD for threat ranking?
Qualitative risk model (Low, Medium, High).
96
What is an attack surface?
Reachable and exploitable vulnerabilities in a system.
97
Name a category of attack surface.
Software, Network, Human.
98
What is attack surface analysis useful for?
Assessing the scale and severity of threats.
99
What is the root node in an attack tree?
The ultimate goal of the attacker.
100
What do leaf nodes in an attack tree represent?
Specific methods to initiate an attack.
101
How should credentials be protected?
With encryption in storage and transit.
102
What should passwords be stored with?
Salted hashes.
103
What is an effective authorization method?
Role-based access control.
104
What principle restricts access to only necessary resources?
Principle of least privilege.
105
What protocols are recommended for data protection in transit?
SSL/TLS.
106
What technique protects data integrity?
Hashed message authentication codes (HMACs).
107
What mitigates Spoofing?
Authentication and protecting secret data.
108
How to defend against Tampering?
Authorization, hashes, HMACs, digital signatures.
109
How to mitigate Repudiation?
Digital signatures, audit trails, timestamps.
110
What helps prevent Information Disclosure?
Encryption, privacy-enhanced protocols.
111
How to reduce Denial of Service risk?
Throttling, filtering, quality of service.
112
What helps against Elevation of Privilege?
Strong access control and least privilege.
113
Name a threat modeling tool from Microsoft.
Microsoft Threat Modeling Tool.
114
What is OWASP Threat Dragon?
An open-source tool for threat modeling.
115
What is malware?
A program covertly inserted into a system to compromise confidentiality, integrity, or availability.
116
What are the two main malware classification methods?
By propagation and by payload.
117
Name types of malware based on propagation.
Virus, worm, Trojan horse.
118
Name types of malware based on payload.
Ransomware, logic bomb, botnet, spyware, keylogger, phishing, backdoor, rootkit.
119
What was Creeper?
The first computer worm spreading via ARPANET; displayed a message but did no harm.
120
What was the significance of Reaper?
First antivirus created to remove Creeper.
121
What made WannaCry unique?
It was a global ransomware attack using Bitcoin for payment.
122
What is Stuxnet known for?
Infected USB drives; targeted Iranian nuclear facilities.
123
What is Mirai?
A botnet of IoT devices used in DDoS attacks.
124
What does Mozi target?
IoT devices using weak passwords and unpatched vulnerabilities.
125
How does a virus propagate?
By attaching itself to executable code and running with the host program.
126
What are boot sector infectors?
Viruses that infect the master boot record.
127
What are polymorphic viruses?
Viruses that replicate with different bit patterns to avoid detection.
128
What is a stealth virus?
A virus that hides its presence from antivirus programs.
129
What is a multipartite virus?
A virus that infects multiple file types for complex eradication.
130
How does a worm differ from a virus?
A worm replicates without attaching to a host file.
131
What was the Morris Worm?
An early worm targeting UNIX systems using multiple attack vectors.
132
What is a zero-day exploit in worms?
An attack that uses previously unknown vulnerabilities.
133
What is a Trojan horse?
Software that appears harmless but hides malicious functionality.
134
How is a Trojan typically installed?
By tricking users into copying and running the program.
135
What does ransomware do?
Encrypts data and demands ransom for decryption.
136
Give an example of ransomware.
Gpcode, WannaCry.
137
What is a logic bomb?
Malicious code triggered by specific events or conditions.
138
What is a botnet?
A network of infected machines used for malicious tasks.
139
Name some uses of bots.
DDoS, keylogging, spam, sniffing, manipulating polls.
140
What is spyware?
Malware that monitors user activity and redirects web traffic.
141
What is phishing?
Tricking users into revealing personal data through fake websites or emails.
142
What is a keylogger?
Malware that records keystrokes to steal sensitive info.
143
What is a backdoor?
A hidden way to access a system, often installed by developers.
144
What is a rootkit?
Software that hides the presence of malicious processes or programs.
145
What causes a buffer overflow?
Storing more data than a buffer's allocated space.
146
What is stack smashing?
A buffer overflow on the stack, used to alter control flow.
147
What are heap buffer overflows?
Overflows targeting the heap to redirect data or pointers.
148
Name a function vulnerable to buffer overflow.
gets(), strcpy(), strcat(), vsprintf().
149
What is SQL injection (SQLi)?
A vulnerability that allows attackers to interfere with database queries.
150
What is union-based SQLi?
Using UNION SELECT to extract additional data from a query.
151
What is Boolean-based SQLi?
Injecting conditions like 'OR 1=1' to bypass authentication.
152
What is command injection?
Injecting system commands via unvalidated input.
153
What is a cross-site scripting (XSS) attack?
Injecting script code into HTML output sent to other users.
154
What is Server-Side Request Forgery (SSRF)?
Tricking a server into making internal network requests.
155
What is XML External Entity (XXE) attack?
An attack exploiting XML parsers to access sensitive files or internal services.
156
What is Metasploit?
A framework for exploiting vulnerabilities and injecting payloads.
157
What does Kali Linux include?
A collection of tools for penetration testing.
158
What is Burp Suite used for?
Web vulnerability scanning and proxying.
159
What is the role of Wireshark?
Network traffic analysis.
160
What is OWASP ZAP?
Tool for fuzzing, spidering and proxying web apps.
161
What does Nmap do?
Scans networks and discovers devices.
162
What is Maltego used for?
Information gathering and analysis.
163
What does Fiddler do?
Analyzes web traffic and supports proxying.
164
What is cryptography?
The art and science of keeping messages secure using mathematical techniques.
165
What are the five key goals of cryptography?
Confidentiality, privacy preservation, authentication, data integrity, non-repudiation.
166
What is plaintext?
The original, unencrypted message or data.
167
What is ciphertext?
The scrambled message produced by encryption.
168
What is an encryption algorithm?
An algorithm that performs substitutions and transformations on plaintext.
169
What is a secret key?
Used in symmetric encryption for both encrypting and decrypting.
170
What is a public key?
Used in asymmetric encryption for encrypting data.
171
What is a private key?
Used in asymmetric encryption for decrypting data.
172
What is cryptanalysis?
The process of attempting to discover the plaintext or key.
173
What is a ciphertext-only attack?
The attacker only knows the ciphertext and attempts to decrypt it.
174
What is a known plaintext attack?
The attacker knows plaintext-ciphertext pairs encrypted with the same key.
175
What is a chosen plaintext attack?
The attacker chooses plaintexts and obtains their ciphertexts.
176
What is a chosen ciphertext attack?
The attacker chooses ciphertexts and gets corresponding plaintexts.
177
What is a chosen text attack?
Combination of chosen plaintext and chosen ciphertext attacks.
178
What is the difference between symmetric and asymmetric encryption?
Symmetric uses one key; asymmetric uses two keys (public/private).
179
What is a block cipher?
Processes input in fixed-size blocks, e.g., 128-bit blocks in AES.
180
What is a stream cipher?
Encrypts data one bit or byte at a time.
181
What is the Caesar cipher?
A substitution cipher that shifts letters a fixed number down the alphabet.
182
How is Caesar cipher represented mathematically?
ek(x) = (x + k) mod 26; dk(y) = (y - k) mod 26.
183
What is symmetric encryption?
Both sender and receiver use the same secret key.
184
What is asymmetric encryption?
Sender and receiver use different keys (public/private).
185
What problem does a digital certificate solve?
It helps verify public key authenticity.
186
What is a certificate authority (CA)?
A trusted third party that issues digital certificates.
187
What is in an X.509 certificate?
Subject's name, public key, and digital signature from CA.
188
What is a Feistel Cipher Structure?
A block cipher design dividing data into left/right halves with multiple rounds.
189
What is a Substitution-Permutation Network (SPN)?
A cipher structure used in AES combining S-boxes and P-boxes.
190
What cipher uses the SPN structure?
AES (Advanced Encryption Standard).
191
How many rounds does AES use?
10 for 128-bit keys, 12 for 192-bit, 14 for 256-bit keys.
192
What is AES?
A symmetric block cipher standard replacing DES.
193
What are the AES key sizes?
128, 192, or 256 bits.
194
Name applications of AES.
SSL/TLS, SFTP, WPA, IPSec, WhatsApp, BitLocker.
195
What is ECB mode?
Encrypts each block independently with the same key.
196
What is CBC mode?
Each block is XORed with the previous ciphertext block before encryption.
197
What are other cipher modes?
CFB, OFB, CTR.
198
What is a hash function?
A function that maps variable-length input to a fixed-length output.
199
What is preimage resistance?
It’s hard to find any input that hashes to a specific output.
200
What is second preimage resistance?
It’s hard to find a different input with the same hash.
201
What is collision resistance?
It’s hard to find two inputs with the same hash.
202
Name common hashing algorithms.
MD5, RIPEMD128, SHA-1, SHA-256.
203
What are hash functions used for?
Password verification, digital signatures, integrity checking, etc.
204
What is a MAC?
A short piece of information to authenticate a message using a shared key.
205
How is MAC generated?
Using encryption algorithms or hash functions (e.g., HMAC).
206
What is HMAC?
A keyed-hash message authentication code standard documented in RFC 2104.
207
What are HMAC's design goals?
Usability, replaceability of hash functions, and strong authentication.
208
What is AEAD?
Authenticated Encryption with Associated Data, ensures both confidentiality and integrity.
209
What is the role of 'Associated Data' in AEAD?
It is not encrypted but is authenticated for integrity protection.
210
What does IoT stand for?
Internet of Things.
211
Why is IoT security important?
Because IoT devices handle sensitive data and are increasingly integrated into critical infrastructure.
212
Name traditional physical security safeguards.
Fences, locks, and signatures.
213
Give examples of smart environments in IoT.
Smart lighting, connected cars, smart homes.
214
What is the 'headless' nature of IoT devices?
They often lack user interfaces, making them harder to monitor and secure.
215
Why are resource constraints an IoT security issue?
IoT devices often have limited processing power, memory, and energy, making strong security hard to implement.
216
What is the challenge posed by heterogenous protocols?
Different IoT devices use various communication protocols, making standardization and security more complex.
217
Why is dynamic communication a risk in IoT?
IoT devices often connect and disconnect dynamically, which complicates monitoring and control.
218
What is tamper resistance in IoT devices?
The ability of a device to resist physical access or modification.
219
What does 'longevity expectations' refer to in IoT?
IoT devices are expected to function for many years, often beyond their supported update cycles.
220
What are the three core information security goals?
Confidentiality, Integrity, and Availability.
221
What threats correspond to each security goal?
Disclosure (Confidentiality), Alteration (Integrity), Destruction (Availability).
222
How have cyber threats evolved over time?
From individual hackers to organized crime and nation state actors.
223
What is the impact of nation state threats?
High-level attacks for espionage, sabotage, and influence.
224
Who are the main threat actors in IoT security?
Hackers, nation states, and organized crime groups.
225
Name device-level IoT security measures.
Hardware encryption, secure platforms, enhanced algorithms.
226
Name network-level IoT security measures.
VPNs, firewalls, intrusion prevention and detection systems (IPS/IDS).
227
What are examples of service-level security strategies?
Security-by-design, privacy-by-design, and compliance with standards.
228
What are cybersecurity trust labels?
Certifications or marks indicating a device meets certain security standards.
229
What is the main concept of the Zero-Trust Model?
Never trust, always verify.
230
What does the Zero-Trust Model assume about users and devices?
They should not be trusted by default, even inside secure networks.
231
What is AI?
Artificial Intelligence – the ability of machines to mimic human intelligence.
232
How did Prof. Max Tegmark define intelligence?
The ability to accomplish complex goals.
233
When did modern Homo Sapiens emerge on the 'Earth-as-one-year' timeline?
11 minutes ago.
234
How recently did the internet emerge on the same timeline?
0.17 seconds ago.
235
What does intelligence require according to the lecture?
Computations to manage data and make decisions.
236
What is the theoretical processing power difference between machines and biological tissue?
A factor of 10^33.
237
How long could Moore’s Law potentially continue?
Another 200 years.
238
What is a requirement for intelligent behavior?
Not just computation, but the right computations (software).
239
Is there a single agreed-upon definition of AI?
No, the definition evolves with new research.
240
What is machine learning (ML)?
A subfield of AI where computers learn from past data.
241
What makes ML different from traditional programming?
ML learns from data without being explicitly programmed.
242
What are the three main components of a machine learning system?
Learning algorithm, input data, and the learned model.
243
What does the model produce from new data?
Predictions or decisions.
244
What is classification in ML?
Mapping observations into predefined categories using labeled data.
245
Give an example of classification.
Classifying emails as spam or not spam.
246
What is regression in ML?
Predicting a numerical value based on input features.
247
Give an example of regression.
Estimating a car’s price based on model, year, mileage, etc.
248
What is clustering in ML?
Grouping observations based on similarities without labeled data.
249
What algorithm is used for clustering?
k-Means.
250
What are the two main learning paradigms in ML?
Supervised and unsupervised learning.
251
What is required for supervised learning?
Labeled data.
252
What is reinforcement learning?
Learning actions through rewards to maximize outcomes.
253
What is deep learning?
An ML technique using neural networks to learn multiple abstraction levels.
254
What enabled deep learning advances?
Big data and high computational power.
255
Give two application examples of deep learning.
Speech recognition and image recognition.
256
List four current AI system examples.
Robotics, text-to-image generation, self-driving cars, conversation systems like ChatGPT.
257
What is AI ethics?
A field concerned with moral principles guiding AI behavior and impact.
258
Give an example of an ethical dilemma in AI.
Self-driving cars deciding between protecting passengers or pedestrians.
259
Why is training data in AI an ethical concern?
It may affect user privacy and introduce bias.
260
What are three focal points of AI ethics?
Prediction quality, outcome impact, and effect on humans.
261
What are the two main categories of attacks on ML models?
Adversarial input attacks and data poisoning attacks.
262
What is an adversarial input attack?
Slightly modifying input features to trick ML models into incorrect classification.
263
What is a real-world example of adversarial input?
A stop sign misclassified as a speed limit sign due to added stickers.
264
What is a data poisoning attack?
Injecting malicious data into the training set to mislead the model.
265
What are the two goals of poisoning attacks?
Affect availability (useless model) or integrity (add backdoor).
266
What is the black-box problem in AI?
AI models are often too complex to understand.
267
What does LIME stand for?
Local Interpretable Model-Agnostic Explanations.
268
What is the purpose of LIME?
To interpret and explain decisions made by AI models.
269
What is an Internet Security Protocol?
A framework of standards that ensures private and secure communications over IP networks using cryptographic services.
270
What is S/MIME?
Secure/Multipurpose Internet Mail Extension – a security enhancement to the MIME email format.
271
Which algorithms does S/MIME use by default?
AES (symmetric) and RSA (asymmetric).
272
What is 'Envelope data' in S/MIME?
Encrypted content and encryption keys for one or more recipients.
273
What is 'Signed data' in S/MIME?
A digital signature of the content created using the sender’s private key.
274
What is the process of secret key handling in S/MIME?
Message is encrypted with AES using a pseudorandom key; the key is encrypted with the recipient's RSA public key.
275
What are the components of the Internet Mail Architecture (RFC 5598)?
Message User Agent (MUA) and Message Handling Service (MHS: MSA, MTA, MDA).
276
What is TLS?
A cryptographic protocol ensuring secure transmission between users and servers.
277
What three functions does TLS provide?
Authentication, data integrity (via MAC), and confidentiality (via encryption).
278
What is a TLS session?
An association between a client and server created by the handshake protocol.
279
What is a TLS connection?
A peer-to-peer transport service linked to one session.
280
What does the TLS Handshake Protocol do?
Authenticates client and server, negotiates keys and algorithms.
281
Name some uses of TLS.
HTTPS, IMAP, SMTP, XMPP, MQTT (IoT), video conferencing.
282
Which TLS versions are deprecated?
TLS 1.0 and 1.1.
283
Which TLS version is most widely used?
TLS 1.2.
284
What makes TLS 1.3 different?
Simpler and stronger ciphers, single roundtrip, better performance.
285
What is the BEAST attack?
Targets block cipher vulnerabilities like DES to steal HTTPS cookies.
286
What is POODLE?
Forces downgrade to SSL 3.0 to exploit vulnerabilities.
287
What is SWEET32?
Targets older block and stream ciphers like DES and RC4.
288
What is the LUCKY13 attack?
Exploits timing side-channels in MAC padding.
289
What is HTTPS?
Hypertext Transfer Protocol Secure – an encrypted version of HTTP using SSL/TLS.
290
Which port does HTTPS use by default?
Port 443.
291
What data is encrypted in HTTPS?
URL, document content, form data, cookies, HTTP headers.
292
What is IPSec?
A protocol suite securing IP traffic with encryption, authentication, and key exchange.
293
At what level is IPSec implemented?
IP level (network layer).
294
Name IPSec's three functional areas.
Authentication, confidentiality, key management.
295
What are the two core components of IPSec?
Encapsulating Security Payload (ESP) and Internet Key Exchange (IKE).
296
Give examples of IPSec applications.
VoIP, LAN/WAN security, e-commerce, intranet/extranet communication.
297
What is Kerberos?
A TTP-based protocol for secure remote authentication.
298
What is a Ticket Granting Ticket (TGT)?
A token generated by the Kerberos server used to access application servers.
299
What does Kerberos prevent?
Password transmission over the network.
300
What does Kerberos support?
Single Sign-On (SSO) and mutual authentication.
301
What is a VPN?
A virtual private tunnel between a device and remote server that encrypts data and hides IP addresses.
302
What are the types of VPNs?
Remote access VPN, Site-to-site VPN, VPN apps.
303
Name two VPN disadvantages.
Potential speed reduction, possible logging by free VPNs.
304
What is SSH?
A cryptographic protocol for secure network services over insecure networks.
305
Which port does SSH use?
TCP port 22.
306
What encryption types are used in SSH?
Symmetric, asymmetric, and hashing.
307
What is SSH's encryption mode?
Encrypt-and-authenticate (E&A).
308
How do you generate a key pair for GitHub SSH access?
`ssh-keygen -t ed25519 -C 'email@example.com'` and copy the public key.
309
What is SFTP?
Secure File Transfer Protocol – secure version of FTP using SSH.
310
How is HTTPS different from SFTP?
HTTPS secures web traffic using SSL/TLS; SFTP secures file transfers using SSH.
311
What is OAuth2?
An authorization protocol that allows limited access to user data across services.
312
What is access control?
A security technique that regulates who or what can view or use resources in a computing environment.
313
What is a reference monitor?
A component that validates access requests and grants or denies access based on security policy.
314
In the filing cabinet analogy, what is the reference monitor?
The locked filing cabinets.
315
In the nightclub analogy, what is the reference monitor?
The security guard with the guest list.
316
What is a UID in UNIX?
A unique user identification number.
317
What is a GID in UNIX?
A group ID used to organize users.
318
What is an inode in UNIX?
A file-based data structure that holds metadata about files.
319
What do the permission bits rwx stand for?
Read (4), Write (2), Execute (1).
320
What does chmod 777 do?
Grants full read, write, execute permissions to owner, group, and others.
321
What command changes file ownership?
`sudo chown user file.txt`
322
What does 'd' at the beginning of a UNIX permission string indicate?
It indicates a directory.
323
What does 'r' mean for a directory?
Allows reading file names in the directory.
324
What does 'w' mean for a directory?
Allows modifying directory contents (create, delete, rename files).
325
What does 'x' mean for a directory?
Allows accessing files if their name is known (traverse permission).
326
What is Discretionary Access Control (DAC)?
Access based on user identity; users can delegate their privileges.
327
What is a key disadvantage of the access control matrix?
It becomes inefficient and hard to manage at scale.
328
What is an Access Control List (ACL)?
A list for each object specifying which subjects have what access.
329
What is a Capability List?
A list for each subject specifying access rights to various objects.
330
What is the structure of an Access Control Matrix?
Subjects in rows, objects in columns, access rights in entries.
331
What are three implementations of ACM?
Authorization table, ACLs, and Capability lists.
332
What is a disadvantage of ACLs?
Poor efficiency due to search overhead and large storage space needs.
333
What is a disadvantage of Capability Lists?
Hard to revoke/change rights and manage memory.
334
How is ACL like the nightclub analogy?
Focuses on the object (club), and who is allowed in.
335
How is a Capability List like the filing cabinet analogy?
Each user has a key ring (capabilities) for the cabinets they can access.
336
What is Role-Based Access Control (RBAC)?
Access based on user roles within an organization.
337
Why is RBAC convenient?
Roles are more stable than changing user-permission pairs.
338
Where is RBAC commonly used?
Active Directory, Oracle DB, Microsoft SQL Server, PostgreSQL.
339
What is Attribute-Based Access Control (ABAC)?
Access decisions based on attributes of subjects, objects, and environment.
340
Give an example of subject attributes in ABAC.
Age, department, role.
341
What are environment attributes in ABAC?
Context like location, time, or network condition.
342
Where is ABAC useful?
Firewalls, servers, APIs, databases.
343
What is Rule-Based Access Control (RuBAC)?
Uses predefined rules to allow/deny access, e.g., firewall policies.
344
What is Mandatory Access Control (MAC)?
Access decisions made by a central authority, often used in military/government.
345
What is vertical access control?
Restricts access based on user type (e.g., admin vs. regular user).
346
What is horizontal access control?
Restricts access based on ownership of resources.
347
What is context-dependent access control?
Restricts access based on system/user state or sequence of actions.
348
What is a security intrusion?
An event or series of events where an intruder gains or attempts to gain unauthorized access.
349
What is intrusion detection?
A service that monitors and analyzes system events for signs of unauthorized access.
350
What are the five stages of intruder behavior?
1. Target acquisition, 2. Initial access, 3. Privilege escalation, 4. System exploit & access maintenance, 5. Covering tracks.
351
What are the three main components of an IDS?
1. Sensors, 2. Analyzers, 3. User Interface.
352
What does a sensor do in IDS?
Collects data such as logs, packets, system calls.
353
What does an analyzer do in IDS?
Determines if an intrusion has occurred.
354
What does the user interface provide in IDS?
Guidance and control over the IDS output.
355
What is HIDS?
Host-based Intrusion Detection System – monitors individual host systems.
356
What is NIDS?
Network-based Intrusion Detection System – monitors network traffic.
357
What is a distributed IDS?
An IDS combining multiple sensors and data from across systems.
358
What is signature-based detection?
Uses known attack patterns or rules to detect intrusions.
359
What is anomaly detection?
Identifies deviations from normal behavior, useful for zero-day attacks.
360
What are the three IDS development methods?
1. Statistical, 2. Knowledge-based, 3. Machine Learning.
361
What can HIDS detect?
Changes to registry, critical files, failed logins, rootkits, backdoors.
362
List drawbacks of HIDS.
Resource use, tampering risk, false alarms, management difficulty.
363
Name HIDS best practices.
Deploy on critical systems, secure the HIDS, monitor alerts, update signatures.
364
Where can NIDS be deployed?
1. Between Internet and firewall, 2. Inside firewall, 3. On backbone, 4. On workstation networks.
365
What is the difference between inline and passive NIDS sensors?
Inline inspects live traffic; passive inspects copied traffic.
366
What layers does NIDS monitor?
Network, transport, and application.
367
What attacks are detected by signature-based NIDS?
DoS, scanning, worms.
368
What attacks are detected by anomaly-based NIDS?
Sudden behavior changes, policy violations.
369
What data can a NIDS sensor log?
Timestamp, protocols, IPs, ports, session ID, severity, and payload.
370
What is a honeypot?
A decoy system designed to attract attackers and log their behavior.
371
What are the types of honeypots?
Low interaction and high interaction honeypots.
372
What is a firewall?
A system that controls incoming and outgoing traffic based on rules.
373
List advantages of firewalls.
Blocks unauthorized access, monitors traffic, supports VPN/IPSec.
374
List disadvantages of firewalls.
Can't stop insider threats or attacks bypassing the firewall.
375
What is a packet filtering firewall?
Inspects IP header info to allow/deny packets based on rules.
376
What is a stateful inspection firewall?
Maintains a table of active connections to make decisions.
377
What is an application proxy firewall?
Acts as an intermediary for application traffic like FTP, Telnet.
378
What are some attacks against packet filtering firewalls?
IP spoofing, source routing, tiny fragment attacks.
379
What are weaknesses of packet filtering firewalls?
No application awareness, weak logging, vulnerable to config errors.
380
Name five places a firewall can be deployed.
Standalone device, router, LAN switch, server, personal device.
381
What is a host-based firewall?
Firewall software on individual devices like servers or workstations.
382
What is a DMZ in networking?
A separate network zone for publicly accessible services.
383
What is a distributed firewall?
A network of firewalls managed centrally across hosts.
384
What is an IPS?
An intrusion detection system that can block or prevent attacks.
385
What is a HIPS?
Host-based IPS – protects system resources and files.
386
What is a NIPS?
Network-based IPS – protects against network-level attacks.
387
What are four IPS techniques?
1. Pattern matching, 2. Stateful matching, 3. Traffic anomaly, 4. Statistical anomaly.
388
What attacks can HIPS/NIPS prevent?
Rootkits, privilege escalation, buffer overflow, directory traversal.
389
What is privacy?
The claim of individuals to control how, when, and to what extent information about them is communicated.
390
How does the UN define the right to privacy?
Protection against arbitrary interference with privacy, family, home, or correspondence.
391
What is Glancy’s interpretation of privacy?
Part of the fundamental right to life and enjoyment of life.
392
What is trust?
Belief in the reliability, truth, or ability of someone or something.
393
What is ethics?
The study of right and wrong and how people should act.
394
Who defined privacy as 'the right to be let alone'?
Warren and Brandeis (1890).
395
What is contextual integrity in privacy?
Adherence to informational norms of a context—what is appropriate sharing.
396
Who defined power as the ability to get someone to do something they wouldn’t otherwise do?
R. Dahl (1957).
397
What was Foucault’s view on power?
Power is not a possession but a dynamic force that exists everywhere.
398
What is surveillance according to David Lyon?
Systematic and routine attention to personal details for influence or control.
399
What is dataveillance?
Systematic use of personal data systems to monitor behavior.
400
What is sousveillance?
Bottom-up surveillance by individuals, often toward powerful institutions.
401
What is the chilling effect?
When people self-censor due to fear of surveillance or regulation.
402
What is consent under GDPR Article 4(11)?
Freely given, specific, informed and unambiguous indication of data subject's wishes.
403
What is Zero Trust?
A model where no user or system is inherently trusted – 'never trust, always verify'.
404
Name types of trust discussed in the lecture.
Institutional trust, trust in government, trust in self, business, citizens.
405
What is the freedom vs. security trade-off?
How much freedom one is willing to sacrifice in exchange for security.
406
What is 'function creep' in data usage?
When data collected for one purpose is used for another.
407
What is surveillance capitalism?
Business model that profits from the extraction and analysis of personal data.
408
Who coined 'Big Other'?
Shoshana Zuboff.
409
What does 'Big Other' refer to?
An information-driven structure of surveillance used for behavior prediction and control.
410
What is the purpose of whistleblowing?
To expose unethical or illegal conduct, often in the public interest.
411
What does SFS 2016:749 §4 protect?
Workers from reprisals for whistleblowing on serious misconduct.
412
What does SFS 2021:890 §2 define?
The conditions under which work-related reporting is protected under EU law.
413
What is deontology?
Ethics based on rules and duties.
414
What is consequentialism?
Ethics based on outcomes or consequences.
415
What is virtue ethics?
Ethics based on character and virtues.
416
What is intersectionality?
The way race, gender, class, etc., intersect to affect individuals’ experiences.
417
Who coined the term intersectionality?
Kimberlé Crenshaw (1989).
418
What is the difference between misinformation and disinformation?
Misinformation is false info spread unknowingly; disinformation is spread deliberately.
419
Who is Frances Haugen?
Facebook whistleblower who exposed the company’s harmful practices.
420
What is the 'stochastic parrot' critique?
Criticism of large language models generating text without understanding meaning.
421
Who coined the term 'stochastic parrot'?
Bender, Gebru, McMillan-Major, & Shmitchell (2021).
422
What is the Anthropocene?
A proposed epoch where human activity dominates Earth's systems.
423
What are key themes in environmental ethics?
Sustainable consumption, lifecycle management, intergenerational justice.
424
What is social engineering?
Psychological manipulation to trick users into giving up sensitive information.
425
Who was Kevin Mitnick?
A famous hacker who used social engineering; later became a security consultant.
426
What did Kevin Mitnick say about security threats?
The biggest threat is people, not technology.
427
What is Information Security Governance?
Strategic direction and oversight of security, risk, and resources.
428
What is COBIT?
A framework for developing, monitoring, and improving IT governance.
429
List two COBIT principles.
1. Meeting stakeholder needs, 2. Holistic approach to business.
430
Give an example of a COBIT control objective.
Use unique user IDs and conduct regular access rights reviews.
431
What is the difference between a policy and a procedure?
A policy is a broad statement; a procedure is detailed instructions.
432
What is a standard in security governance?
Mandatory specification for implementing a policy.
433
What is a guideline?
A non-mandatory recommendation related to a policy.
434
Give one sign of non-effective governance.
Board focuses only on profits and ignores security.
435
Give one sign of effective governance.
Executives participate in risk committees and set acceptable risk levels.
436
Name three types of organizational security policies.
Authentication policy, access control policy, business continuity policy.
437
What are the four steps of the policy lifecycle?
1. Plan, 2. Implement, 3. Monitor, 4. Evaluate.
438
What is the goal of IT security management?
To protect critical assets cost-effectively.
439
Name three responsibilities in IT security management.
Determine requirements, specify safeguards, monitor implementation.
440
Who is responsible for security?
Management, IT staff, users, third parties.
441
What is security awareness?
Informing employees about risks and responsibilities.
442
Name three common information security roles.
Chief Security Officer, Security Manager, Security Technician.
443
What is ISO/IEC 27001?
Standard for implementing and maintaining an ISMS.
444
What is ISO/IEC 27002?
Code of practice for security controls.
445
What does ISO 27005 cover?
Information security risk management.
446
How many controls are listed in ISO 27002:2022?
93 controls.
447
What is ISMS?
Information Security Management System.
448
Why are background checks important?
To reduce risks of fraud, theft, or misuse.
449
What is the purpose of employment agreements in security?
To define responsibilities, confidentiality, and policy compliance.
450
What is the goal during employment termination?
Ensure orderly exit and removal of access.
451
What is the principle of least privilege?
Users have only the access necessary for their role.
452
What is the principle of separation of duties?
Dividing tasks among people to prevent abuse.
453
Why implement email and internet use policies?
To prevent malware, ensure productivity, and avoid misconduct.
454
Why is incident response important?
To minimize damage, recover quickly, and learn from incidents.
455
What are examples of physical security measures?
Fences, locked doors, access control to server rooms.
456
Why consider environmental factors?
To mitigate risks like flooding or natural disasters.
457
What is IT security operations?
All tasks and oversight to keep systems secure and running.
458
What is a SOC?
Security Operations Center – facility to monitor and protect systems.
459
What does access control cover?
Data, services, networks, remote access.
460
What is enforced via automated access control policies?
Who gets access, when, and how.
461
Why is security important in system development?
To ensure safe design, patching, and secure operations.
462
What is the aim of business continuity planning?
To ensure operations continue during major failures or disasters.
463
What is PCI-DSS?
Payment Card Industry Data Security Standard – for organizations handling card payments.
464
What is operational security?
The ongoing protection of assets, ensuring proper access, oversight, and controls.
465
What is a security incident?
An event where corporate assets are at risk or have been compromised.
466
How is risk calculated?
Risk = Likelihood × Impact or Risk = Threat × Vulnerability × Impact.
467
What are the four main steps of risk management?
Identification, Assessment, Prioritization, Mitigation.
468
What are the four risk handling strategies?
Avoidance, Mitigation, Transference, Acceptance.
469
What does a SOC do?
Detects, monitors, and manages security incidents and vulnerabilities.
470
List four key SOC functions.
Detection, incident handling, threat intelligence, vulnerability management.
471
What is threat hunting?
Investigating potential threats proactively, possibly based on CTI information.
472
What is forensics in SOC?
Evidence collection and management during incident investigation.
473
What is the difference between VM and Pentesting?
VM looks from the inside (authenticated), Pentesting simulates external attacks.
474
What is CVSS?
Common Vulnerability Scoring System – used in vulnerability management.
475
What is the process of penetration testing?
Reconnaissance → Scanning → Access → Exfiltration.
476
What are the 4 phases of incident management?
1) Preparation, 2) Detection and analysis, 3) Containment, eradication, recovery, 4) Post-incident activity.
477
What is the goal of containment?
To stop the attack as early as possible.
478
What is the goal of eradication?
To remove the threat from the system.
479
What happens in the post-incident phase?
Lessons learned are documented for future improvement.
480
What is threat intelligence?
Information about threats, their sources, capabilities, and intentions.
481
What are the phases of the intelligence cycle?
Direction, Collection, Analysis, Production, Dissemination & Feedback.
482
What are the levels of threat intelligence?
Strategic, Tactical, Operational.
483
What can trigger threat hunting?
CTI data such as IoCs (Indicators of Compromise) or TTPs (Tactics, Techniques, and Procedures).
484
What is SIEM?
Security Information and Event Management – aggregates and analyzes security data.
485
What is EDR?
Endpoint Detection and Response – monitors and responds to threats on endpoints.
486
What is SOAR?
Security Orchestration, Automation, and Response – enhances SIEM with automated workflows.
487
Name some SIEM tools.
Splunk, Qradar, Sentinel.
488
Name some EDR tools.
Microsoft Defender, Qualys.
489
What are typical conflicts between business and security?
Budget constraints, legacy systems, differing priorities.
490
Name three security risks related to AI tools.
Privacy issues, hallucinations, data poisoning.
491
What are examples of AI misuse in security?
Deepfakes, reconnaissance, payload crafting, anomaly detection evasion.
492
How can students engage with cybersecurity in practice?
Via thesis projects and internships.
493
What is risk in information security?
The expectation of loss from a threat exploiting a vulnerability with a harmful result.
494
What is the primary goal of risk management?
To reduce risk to an acceptable level.
495
Define asset in the context of risk management.
A system resource that has value to its owner and requires protection.
496
What is asset valuation (AV)?
Monetary and non-monetary value of an asset.
497
Define threat.
Potential for violation of security by exploiting a vulnerability.
498
Define vulnerability.
Flaw or weakness that could be exploited.
499
What is exposure?
Susceptibility to asset loss due to a threat.
500
What is a safeguard?
A countermeasure to reduce or remove vulnerabilities or threats.
501
What is quantitative risk analysis?
Uses mathematical models to calculate expected losses.
502
What is qualitative risk analysis?
Uses expert judgment, scenarios, and ratings to assess risk.
503
Give one advantage and one drawback of quantitative risk analysis.
Advantage: structured calculation; Drawback: inputs often imprecise.
504
What is the ALE formula?
ALE = SLE × ARO
505
What is SLE?
Single Loss Expectancy – the cost of one loss.
506
What is ARO?
Annual Rate of Occurrence – frequency of threat occurring per year.
507
What is the EF?
Exposure Factor – percent of asset lost in an incident.
508
Name methods used in qualitative risk analysis.
Brainstorming, Delphi, Storyboarding, Focus groups, Interviews.
509
What is a risk scenario?
A narrative that describes a potential major threat.
510
What are common risk consequence ratings?
Insignificant – Severe.
511
What are common risk likelihood ratings?
Rare – Almost Certain.
512
What are the 5 main risk treatment strategies?
Avoidance, Acceptance, Transference, Reduce likelihood, Reduce consequence.
513
How can you treat risk of stolen data?
Mitigate by encrypting data.
514
How can you treat data loss due to fire?
Transfer risk using insurance.
515
What is the baseline approach to risk?
Implementing standard controls for common threats without deep analysis.
516
When is the baseline approach recommended?
For small organizations with limited resources.
517
What are the three types of security controls?
Physical, Administrative, Technical.
518
Give two examples of physical controls.
Locks, security guards.
519
Give two examples of administrative controls.
Policies, awareness training.
520
Give two examples of technical controls.
Encryption, access control.
521
What is defense in depth?
A layered approach using multiple, diverse security measures.
522
Why is layered security beneficial?
Reduces risk of total failure from single point of weakness.
523
What are the three core security strategies?
Prevention, Detection, Reaction.
524
Give an example of a prevention measure.
Encrypt orders in e-commerce.
525
Give an example of a detection measure.
Check for unauthorized transactions.
526
Give an example of a reaction measure.
Report fraud and cancel the credit card.
527
What is host security?
Security that focuses on protecting individual devices.
528
What is network security?
Security focused on protecting the network and controlling access.
529
What is the ideal approach for mature organizations?
Combine host and network-level security.
530
List five key security goals.
Confidentiality, Integrity, Availability, Authenticity, Accountability.
531
What is confidentiality?
Preventing unauthorized disclosure of information.
532
What is integrity?
Preventing unauthorized modification of information.
533
What is availability?
Ensuring access to authorized users when needed.
534
What is authenticity?
Verifying identity of communication partners.
535
What is accountability?
Ensuring users are held responsible for actions.
536
What is non-repudiation?
Preventing denial of having performed an action.
537
Name a confidentiality control.
Encryption.
538
Name an integrity control.
Hashing.
539
Name an availability control.
Redundancy.
540
Name an accountability control.
Audit logs.
541
Name a non-repudiation control.
Digital signature.