09 Data Security - Threats Flashcards
1
Q
Which damage can occur with respect to IT attacks?
1.
2.
3.
4.
A
- computer (not itfelf but software changes, manipulation, deletion, …)
- data theft, deletion, manipulation, misuse -> loss of confidentality and loss of integrity
- embedded systems (devices with embedded IT - demolition of infrastructure)
- loss of common relality (societal danger, spread of misinformation when not agreeing on one reality)
2
Q
What are possible Motivations of Attackers?
1.
2.
3.
4.
5.
6.
A
- script kiddies (play instinct, curiosity, …)
- insider threats causes by lack of education and revenge
- non-commercial hacker with robin hood mentality, uncovering vulnerabilities
- proffesional hackers, theft of data, illegal transactions etc.
- terrorism - deployment of propaganda
- cyberwar - countries preparing techniques for protection against attacks
3
Q
Attacks nowadays….
1.
2.
3.
A
- are becoming more damaging
- are executed more often
- are executed more professionally (criminals -> security agencies)
4
Q
Definition of data security
A
- protects data against humans (attackers)
5
Q
Definition of data privacy
A
- protects humans against misuse of data
6
Q
How do Data Privacy and Data Security fit together?
A
Data privacy requires data security!
7
Q
What are the most important goals of data security?
A
- confidentality (vetraulichkeit)
- integrity (integrität)
- availability (verfügbarkeit)
- accountability (zurechenbarkeit)
CIAA
8
Q
What does confidentality mean?
1.
2.
3.
A
- protection against unauthorized usage of confidental data
- e.g. TAN, PIN, exam results
- challenge: communicating this data through the internet
9
Q
What does integrity mean?
1.
2.
3.
A
- data and messages must not be manipulated or changed (OR is has to be obvious data is changed)
- e.g. offer in Ebay
- accuracy is maintained and nothing leftout or changed!
10
Q
What does availability mean?
1.
2.
A
- authorized people should be able to access data and services from all defined places at all defined times (from anywhere at anytime!)
- e.g. server of FH
11
Q
What does accountability mean?
A
- creation or change of data can be assigned clrearly to a person (or service)
- e.g. who has accessed the webpage, who is the author of the e-mail
12
Q
What are the root causes for todays problems with data security?
A
- technical reasons
- organisational reasons
- human reasons
13
Q
Root cause technical reason
A
- internet started small and as a research activity
- people knew each other -> there was trust and security was thus not an issue (nobody should be able to control the internet anyway)
- result: open communication protocols, i.e. working wihtout encrypting the content or control the data
- BUT exponential growth in the 90´ties
- now also activities like E-banking, purchase
- billions of entry-points and interconnected networks
- more and more complexity and more open security problems (exploits)
- EACH SOFTWARE CONTAINS FAULTS -> more complexity, more number of faults
14
Q
Organisational Reasons
1.
2.
3.
4.
5.
6.
A
- unclear responsibility (who is responsible for data security?)
- no stringent idea or concepts often tumes
- insider threaths
- no rules means no user concept: everybody always access to all data
- often elderly senior management not aware of digital issues
- huge grey area with respect to data privacy and data security (law)
15
Q
Human Root cause
1.
2.
3.
4.
A
- curiosity
- interfaces always switched on on smartphone (WLAN bluetooth)
- Terms and condiitons (AGBs) not read and not taken seriously
- everything shared through social networks