Topic 1 - Introduction Flashcards

(33 cards)

1
Q

What is the formal definition of Security?

A

Security is the protection of assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the three main aspects of Security?

A

Prevention - Preventing access and damage to assets
Detection - Steps to detect the access or damage to assets
Recovery - Measures allowing people to recover from asset damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a Security Policy, and what does it outline?

A

It’s a concise document that explains the needs of the system in regards to security.
It outlines what should be protected and how it should be protected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does CIA stand for, and what do these areas mean?

A

Confidentiality, Integrity and Availability
Confidentiality - Prevention of unauthorised disclosure of information
Integrity - Prevention of unauthorised modification of information
Availability - Prevention of unauthorised withholding of information or resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are some examples of Confidentiality?

A

Medical records
Transfer of credit card details

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are some examples of Integrity?

A

Distributed bank transactions
Database records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Authenticity in the context of Computer Security?

A

Authenticity = Integrity + Freshness
Where Freshness represents the recency of data or messages, ensuring they are up to date and relevant at the time of use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are some examples of Availability?

A

Redundant power supplies
Firewall packet filtering
Backups of relevant data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Accountability in regards to Computer Security?

A

Users being held responsible for their actions
System should identify and authenticate users and ensure compliance
Audit trails must be kept

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Non-repudiation in Computer Security?

A

Provides un-forgeable evidence that someone did something
Usually verified by a trusted third-party

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the trade off between security and ease of use?

A

The easier the system is to use, the less security there is that’s been put in place - Interferes with working patterns
The more security in place, the harder it is to use - Increased resource demands.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are some of the principles that good security design focuses on?

A

Focus of control
Complexity VS Assurance
Centralised or Decentralised Controls
Layered Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does ‘Focus of Control’ mean in Computer Security?

A

In a given application, should the focus of protection mechanisms be: Data, Operations or Users?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does Complexity VS Assurance mean in Computer Security?

A

The discussion surrounding whether a company would prefer a simple approach with high assurance, or a feature-rich environment with less assurance?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does ‘Decentralised Controls’ mean in Computer Security?

A

The discussion surrounding whether the definition and enforcement of security be performed by a central entity, or be left to individual components in a system?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the properties of the two choices made with Decentralised Controls?

A

Central Entity - Possible bottleneck
Distributed Solution - More efficient, but harder to manage

17
Q

What are the 5 layers of Security? Specify the order of least secure to most secure

A

Applications
Services
OS
Kernel
Hardware

18
Q

What are the two types of Cryptography that are focused on in Computer Security?

A

Symmetric - Both the encryption and decryption algorithms use the same key
Asymmetric - Uses a pair of keys: One public, one private

19
Q

What are some of the main properties of Symmetric Cryptography?

A

Lightweight and Fast
Same key used to encrypt and decrypt data
Key management is difficult

20
Q

What is an example of Symmetric Cryptography?

A

General communications

21
Q

How does Symmetric Cryptography get implemented?

A

Implemented using block ciphers or stream ciphers

22
Q

How do Stream Ciphers work?

A

Stream ciphers use an initial seed key to generate an infinite keystream of random looking bits
Message and keystream are then XOR’ed together to form a single stream of ciphertext.

23
Q

What are some advantages of Stream Ciphers?

A

Encrypting long continuous streams, possibly of unknown length
Extremely fast with a low memory footprint, ideal for low-power devices
Can seek to any location in the stream

24
Q

What are some disadvantages of Stream Ciphers?

A

Keystream must appear statistically random
Stream ciphers do not protect the ciphertext

25
How do block ciphers work?
Block ciphers use a key to encrypt a fixed-size block of plaintext into a fixed-size block of ciphertext Different lengths of messages can be handled by splitting the message up, and padding
26
What are the main ways to attack a cryptographic algorithm?
In order of strength: Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext Related-key attacks
27
What are some properties of Asymmetric Cryptography?
Two keys - One private, one public Used key exchange and signatures Much more expensive Key management easier to handle
28
What is key exchange?
Diffie-Hellman Key Exchange allows two parties to mathematically agree a shared secret over an insecure channel
29
What are digital signatures?
The authenticity of signatures generated by the private key can be verified by the public key.
30
How do Public Key Certificates increase the security of key exchanges?
A different private key is used to produce the digital certificate, which is sent as a public key alongside the other two keys. This is so that the client machine can definitively know the transmission is from the machine they are talking to and nothing else.
31
What are Protocols defined as in Cryptography?
The application of cryptographic algorithms in secure systems
32
What does TLS stand for in Cryptography, and how does it work?
Transport Layer Security Handshake and record protocol that provides end-to-end encryption. It is used within HTTPS
33
What aspects of Security does TLS cover?
Confidentiality Integrity Server Authenticity