Unit 1 Flashcards

1
Q
A distributed Denial-of-Service (DDoS) attack hit CloudFlare, a major global CDN service provider from June 18, 2020 to June 21, 2020. The attackers responsible sent over 754 million packets per second during the peak. If service providers do not properly protect against DDoS attacks, many websites that use CDN services will stop serving ordinary users because of exhaustion of network resources (such as bandwidth, CPU power, and so on). Which security principle does a successful DDoS attack  violate?
Accountability
Availability
Integrity
Confidentiality
A

Availability - A successful DDoS attack will degrade the service level of victim services, making victim services unable to serve their intended users. This will lead to degraded availability of the services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In cybersecurity, defenses can be harder than attacks. There are many possible explanations for this phenomenon. Which explanation is the most plausible?

Defenses are always more expensive than attacks.
Defenders must know more than attackers do.
Defense must protect “all links on the chain” while attackers only need to successfully attack the “weakest link.”
Defenders must first be experienced attackers themselves so that they understand attacks better.

A

Defense must protect “all links on the chain” while attackers only need to successfully attack the “weakest link.”

Defenses must protect all aspects where things can potentially be broken. If security is a chain, the chain will be broken if the one of the links, oftentimes the weakest link, breaks. Attackers usually focus on attacking the weakest link. This is why defenses can be more difficult than attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Risks are everywhere. Identifying risks, assessing their impact, and finding measures to control and maintain a level of tolerable risks are important for a company or an organization. What process best describes this procedure?

Life-cycle management
Risk management
Cost effectiveness
Access control

A

Risk management - Risk management is the process of identifying and analyzing risks to assess their impact, as well as proposing measures to maintain a certain level of tolerable risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Given a piece of software that uses an encryption algorithm with an encryption key, which scenario is an application of the security by obscurity strategy?

Keeping the encryption key secret, but releasing the encryption algorithm.
Keeping the encryption algorithm secret.
Making both the encryption algorithm and the encryption key public.
Making the encryption algorithm, the encryption key, and all clear data public.

A

Keeping the encryption algorithm secret.
Correct! The security by obscurity strategy secures an information system by hiding the details of security mechanisms to attackers. In this example, the encryption algorithm is a detail of the security mechanism of the software. Hiding it applies the security by obscurity strategy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Perimeter defense refers to defense mechanisms that focus on controlling information flow between an organization’s internal trusted network and untrusted external network, such as the Internet. What is Perimeter Defense vulnerable to?

Internet threats
Insider threats
Malware threats
Outsider threats

A

Insider threats
Correct! Perimeter defense usually involves the use of firewalls and security access keys to defend against threats coming from the outside. In traditional perimeter defense, little or no effort is spared in protecting against attacks initiated by insiders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a threat and what is a vulnerability?

A threat is a potential negative event that may affect the successful operation of a system; a vulnerability is a weakness that enables a threat.
A threat is a potential occurrence that can have an undesirable effect on a system; a vulnerability is a weakness that enables a threat.
A threat is a potential occurrence that can have an undesirable effect on a system; a vulnerability is a threat.
A threat is a potential occurrence that can have an undesirable effect on a system; a vulnerability is a potential negative event that may affect the successful operation of a system.

A

A threat is a potential occurrence that can have an undesirable effect on a system; a vulnerability is a weakness that enables a threat.
Correct! A threat is a potential occurrence that can have an undesirable effect on the system assets or resources. A vulnerability is a weakness that makes it possible for a threat to occur.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In information assurance, what are the categories that we use to classify common vulnerabilities?

Design, implementation, and testing
Implementation, deployment, and human
Design, testing, and deployment
Design, implementation, and deployment

A

Design, implementation, and deployment
Correct! In information systems, vulnerabilities can be categorized into design vulnerabilities, implementation vulnerabilities, and deployment vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
int var = 0, buffer[50];
scanf("%d", &var);
int index = abs(a);
if (index < 50) {
    return buffer[index];
}
Review  Codeblock: C Code Snippet. This piece of code is vulnerable because abs() may potentially return a negative number. What type of vulnerability is it?

Deployment vulnerability
Design vulnerability
Implementation vulnerability
Human vulnerability

A

Implementation vulnerability
Correct! abs() will return a negative number in certain cases, and using the return value without checking if it is greater than zero will lead to the use of an incorrect index inside the buffer variable. This is an implementation error.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Deployment vulnerabilities may significantly reduce the level of security of a service. Which vulnerability is a deployment vulnerability?

Not filtering user input
Using weak passwords to protect the server on which the service is deployed
Lack of authentication checks in an administration web service
Incorrectly handling unexpected input values in a program

A

Using weak passwords to protect the server on which the service is deployed
Correct! Setting passwords with proper strength is part of the deployment process of software or a service. Using weak passwords is generally considered as a deployment vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which vulnerability is a design vulnerability?
A public web service trusts any users whose original IP addresses are within the 192.168.0.0/16 subnet
Incorrectly handling unexpected input values in a program
Giving a calculator app on Bob’s Android phone all permissions, including the permission to access the contact book and taking photos
Not filtering user input

A

A public web service trusts any users whose original IP addresses are within the 192.168.0.0/16 subnet
Correct! Trusting internal network users on an IP-based trust mechanism is a design vulnerability. In certain cases, the original IP addresses can be forged by providing fake HTTP header fields (such as X-Forwarded-For), which will allow an attacker to bypass IP-based trust mechanisms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Security applies to not only information systems but also services in real life. Hijacking and reading other people’s mail without altering their content clearly violates security principles. Which security principle does this action violate?

Accountability
Availability
Confidentiality
Integrity

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Some people argue that the jobs of attackers are usually easier than the jobs of defenders. Which reason can support this argument?

Defenders must defend all aspects that can potentially be attacked while attackers only need to successfully break the “weakest link.”
Defenders must first be experienced attackers themselves so that they understand attacks better.
Defenses are always more expensive than attacks.
Defenders must spend more time at work than attackers do.

A

Defenders must defend all aspects that can potentially be attacked while attackers only need to successfully break the “weakest link.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which scenario is an application of the security by obscurity strategy?

Keeping the blueprint of a prison secret
Open-sourcing the blueprint of a prison, but not allowing visitors to access the prison
Open-sourcing some portion of a blueprint of a prison
Open-sourcing the blueprint of a prison

A

Keeping the blueprint of a prison secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Perimeter defense refers to defense mechanisms that focus on controlling information flow between an organization’s internal trusted network and untrusted external network, such as the Internet. Which weakness does Perimeter Defense have?
Vulnerable to outsider threats
Vulnerable to Internet threats
Vulnerable to potential failures of defense mechanisms
Vulnerable to computer viruses

A

Vulnerable to potential failures of defense mechanisms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In information assurance, what is a vulnerability?

A vulnerability is a potential occurrence that can have an undesirable effect on a system.
A vulnerability is a potential negative event that may affect the successful operation of a system.
A vulnerability is a weakness that enables a threat.
A vulnerability is a threat.

A

A vulnerability is a weakness that enables a threat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In information assurance, what categories are common vulnerabilities organized into?

Software, hardware, and network
Design, human, and deployment
Concrete, symbolic, and mixed
Design, implementation, and deployment

A

Design, implementation, and deployment

17
Q

Deployment vulnerabilities may significantly reduce the level of security of a service. Which vulnerability is a deployment vulnerability?

Incorrectly handling unexpected input values in a program
Lack of authentication checks in an administration web service
Making a file with users’ unencrypted passwords publicly accessible
A program uses a user’s input directly as a shell command without filtering the input

A

Making a file with users’ unencrypted passwords publicly accessible

18
Q

Which vulnerability is a design vulnerability?

A web application allows attackers to read arbitrary data out of its database due to lack of input sanitization.
An SMB server trusts any users whose original IP addresses are within the 172.16.0.0/16 subnet.
Assigning an alarm clock app on Alice’s Android phone all permissions, including the permission to read from the contact book and taking photos.
A program crashes when the user uses non-English characters as their username.

A

An SMB server trusts any users whose original IP addresses are within the 172.16.0.0/16 subnet.