Week 9 Flashcards

1
Q

When is a system secure?

A

A system can be considered secure if all resources are used and accessed as intended under all circumstances

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an intruder?

A

An intruder is a hacker that is attempting to breach security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a threat?

A

A threat is a potential security violation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an attack?

A

An attack is an attempt to breach security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the different categories of security violations?

A
  1. Breach of confidentiality - Unauthorised reading of data
  2. Breach of integrity - unauthorised modification of data
  3. Breach of availability - unauthorised destruction of data
  4. Theft of service - unauthorised use of resources
  5. Denial of service - prevention of legitimate use
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are some more different categories of security violations?

A
  1. Masquerading (breach authentication) - Pretending to be an authorized user to escalate privileges
  2. Replay attack - As is or with message modification
  3. Man-in-the-middle attack - Intruder sits in data flow, masquerading as sender to receiver and vice versa
  4. Session hijacking - Intercept an already-established session to bypass authentication
  5. Privilege escalation - Common attack type with access beyond what a user or resource is supposed to have
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the four different levels of security?

A
  1. Physical – Data centres, servers, connected terminals
  2. Network – Intercepted communications, interruption, DOS
  3. Application – Benign or malicious apps can cause security problems
  4. Operating System – Protection mechanisms, debugging
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is malware?

A

Malware is software that is designed to exploit, disable, or damage a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a trojan horse?

A

A trojan horse is a code segment that misuses its environment. Exploits mechanisms for allowing programs written by users to be executed by other users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is ransomware?

A

Ransomware is software that locks up data via encryption, demanding payment to unlock it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a trap door?

A

A trap door is a specific user identifier or password that circumvents normal security procedures. This could be included in a compiler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a code-injection attack?

A

A code injection attack occurs when system code is not malicious but has bugs allowing executable code to be added or modified. This is usually the result of poor or insecure programming paradigms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a virus?

A

A virus is a code fragment embedded in legitimate program. They are self-replicating and designed to infect other computers. They are very specific to CPU architecture, operating system, applications and are usually borne via email or as a macro

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are some types of virus?

A
  1. Standard virus - infects system by appending itself to a file
  2. Boot virus - infects the boot sector of a systema and executes every time the system is booted
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a denial of service attack?

A

A denial of service attack is where the targeted computer is overloaded preventing it from doing any useful work

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a distributed denial-of-service attack?

A

A distributed denial of service attack is launched from multiple sites at once towards a common target typically by zombies. They overload the target and prevent it from doing any useful work

17
Q

What is encryption?

A

Encryption constrains the set of possible receivers of a message. Encryption algorithm consists of:
- Set K of keys
- Set M of messages
- Set C of ciphertexts (encrypted messages)
A function E : K → (M→C). That is, for each k  K, Ek is a function for generatingciphertexts from messagesBoth E and Ek for any k should be efficiently computable functions A function D : K → (C → M). That is, for each k  K, Dk is a function for generatingmessages from ciphertextsBoth D and Dk for any k should be efficiently computable functions

18
Q

What is symmetric encryption?

A

Symmetric encryption is where the same key is used to encrypt and decrypt; therefore k must be kept secret. Data-encryption standard (DES)was most commonly used symmetric block-encryption algorithm (created by US Govt);encrypts a block of data at a time

19
Q

What is asymmetric encryption?

A

Asymmetric encryption is where public key encryption is used. Public key encryption is bade on each user having two keys:
- Public key - published key used to encrypt data
- Private key - key known only to individual user used to decrypt data

20
Q

What is authentication?

A

Authentication is a method used to constrain the set of potential senders of a message. Authentication is complementary to encryption and can also prove messages are unmodified.

21
Q

What is message authentication code?

A

A message authentication code (MAC) is a cryptographic checksum generated from a message using a secret key and is used to securely authenticate short values.

22
Q

What is a digital certificate?

A

A digital certificate is a certificate that proves who or what owns a public key

23
Q

What are certificate authority?

A

Certificate authority are a trusted party their public keys include with web browser distributions

24
Q

How can passwords be kept safe?

A

Passwords can be kept safe by:
- Frequent change of passwords
- History to avoid repeats
- Use of “non-guessable” passwords
- Log all invalid access attempts (but not the passwords themselves)
- Unauthorized transfer

25
Q

What is the goal of protection?

A

The goal of protection is to ensure that each object is accessed correctly and only by those processes that are allowed to do so