10 Data Security - Defense Flashcards

1
Q

What are the managements tasks for IT security?

1.
2.
3.
4.
5.

A
  • risk analysis
  • adoption of guidelines
  • sensitisation of employees
  • establishment of IT security management
  • identification and implementation of operational measures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are typical operational measures for IT security?

1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.

A
  • access controls (for hardware software and rooms, e.g. by passwort ,ID card, key, …)
  • restircted user rights (same as access controls but specifically for operating systems and user sofrtware)
  • restrictive configuration (i.e. restrictive as in doubt, restrict rights
  • keeping software up to date (hard to maintain up-to-dateness and security)
  • deleting outdated software (risk assessment should be carried out as to whether investment should be made in new software - cf. WannaCry Virus)
  • create backup cookies (regular checks; should be stored in a way that attack does not destroy; must not collide wirth data privacy)
  • anti-virus software (data from external sources will be checked)
  • additional: virus scan on computer
  • run firewalls
  • use sandboxes
  • disable active content
  • encrypt sensitive data (passwords, files, hard disks)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why is authentizitation with a password weak and what would be a higher security level?

1.
2.
3.
4.

A
  • safety is only based on knowledge of a password (could be guessed or intercepted)
  • higher security level: property or ohysical characteristic (USB key, EC-card / fingerprint, iris, voice)
  • strong authentizitation is based on not only one but several measures
  • e.g. two factor authentizitation is based on two measures (Smartcard as property and PIN as knowledge)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Should servers store your passwort?

A
  • ideally, the server should encrypt the password before storing it (with help of the Hash-algorithmns)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What would be a safe password?

1.
2.
3.
4.

A
  • consists of ~12 characters
  • numbers, letters and special characters
  • not party of any dictionary
  • no reuse of password for different digital identities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a systematic try-out when it comes to passwords?

A
  • dictionary attack: at the beginning words from dictionaries are used
  • brute force attack- first easy and short, then all combinations of characters are tried out
How well did you know this?
1
Not at all
2
3
4
5
Perfectly