2201 Flashcards

1
Q

Data

A

The building block of information, usually unorganized and unprocessed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Information

A

Processed organized data to offer meaning and context

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Assets

A

Resource. this can be hardware or software of people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Security

A

Protecting assets from attackers, viruses worms natural disasters, power failures or vandalism.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Information System (is)

A

A system for collecting, processings storing,and distributing information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Information Security (infosec)

A

Practice of preventing or reducing to Chance of unauthorized access, use, disclosure, disruption, modification or destruction of information and information systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Security plan

A

Find a balance between protection usability and cost the cost should not outweigh the value of the assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CIA triad

A

Confidentiality integrity and availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

D A D

A

Disclosure, alteration and denial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Confidentiality

A

Ability to protect information from those who are not authorized to view it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

confidentiality breach

A

When someone gets access to information that they were not suppose to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Privacy

A

Data or information is accessible to one authorized source this is different from confidentiality which is accessed by many authorized ppl.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Integrity

A

Ability to prevent data from being changed in an unauthorized and undesirable manner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Integrity violation

A

Modification of data in an undesirable manner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Availability

A

’ When an authorized person can access information when required

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Unavailability

A

Attacking availability may occur when attacker o fails to attack integrity or breach confidentiality

Eg creating too much traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How to offer CIA triad

A

Confidentiality: using encryption l

Integrity: Using encryption and hash

Availability: Using backup & redundancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Identification

A

The claim of WHAT someone or some thing is

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Identification

A

Claim of what something or someone is

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Authentication

A

Establishes whether this claim is true(identification)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Identification vs authentication

A

Identification → public statement of identity
Authentication - private response to challenge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Identification verification

A

We can verify usingadditional documents (step between identification & authentication)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Five authentication factors

A

Something You know, have, are, do and somewhere you are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which 3 things must be balanced in authentication implementation

A

Protection usability and cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Mutual authentication

A

Implemented using a digital certificate can be used in combination with MFA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Password capture attack

A

Video recordings of entries phishing keylog

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Two branches of biometric characteristics

A

Physiologica &l biological

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

5 physiological characteristics of biometric identification

A

’ Fingerprints, iris scan, hand geometry, facial I’d DNA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Four behavioural characteristics of biometrics

A

Voice pitch, voice Cadence, typing style, signature

30
Q

Biometric characteristics

A

Performance uniqueness permanence universality collectability acceptability circumvention

31
Q

Universality (biom)

A

The chosen biometric is possessed by most

32
Q

Uniqueness (biom)

A

The given trait is unique to those who possess it

33
Q

Permanence

A

How well a given characteristicevades change over time

34
Q

Acceptability

A

Acceptability notes how feasible and reasonable the request is

35
Q

Performance

A

A set of metrics to judge the robustness of the system and now well it functions

36
Q

Collectability

A

How convenient and reasonable collection is

37
Q

Circumvention

A

How easily the System can b fooled

38
Q

Measuring biometric performance

A

Far → false acceptance rate
FRR → false rejection rate
EER → equal error rate

39
Q

Bell la Padula model -

A

Combines dad and MAC to support confidentiality (exclusively)

The simple security property: a subject with a given security level can not read an object to a higher security level.
• no read up
• The * property: a subject with a given security level
cannot write to an object at a lower security level. • no write down
- No stealing of secrets no divulging of secrets

40
Q

Biba model

A

Implements MAC to protect integrity - (exclusively)

The simple integrity axiom: a subject with a given integrity must not read data at lower integrity level.
• no read down
• The * integrity axiom: a subject with a given integrity must not write data at higher integrity level.
• no write up -
Does not offer confidentiality
Think of baby example

41
Q

Chinese wall model

A

Designed to prevent conflicts of interest
Can implement rbac
Think of the lawyer who is between two companies

42
Q

DQ

The Bell-LaPadula and Biba models each has its own primary security focus (confidentiality or integrity). If we combine these two models, what will happen?

A
43
Q

Auditing vs accountability

A

Accountability is accomplished through conducting auditing in the monitored environment

44
Q

How do we achieve accountability through auditing?

A

In analyzing the data we have collected in auditing

45
Q

Accountability

A

Using appropriate logging and ,monitoring keep track of activities following security, business conduct ethics etc

46
Q

Security benefits of accountability

A

Nonrepudiation
Who/what misused out resources
Detect and prevent intrusions
Prepare materials for legal proceedings

47
Q

Nonrepudiation

A

A situation that uses sufficient evidence to prevent the individual from denying that they did something

48
Q

How can we enforce Nonrepudiation?

A

Getting a signature from a package delivery,
Using a system or network of logs
Using digital forensics
Digital signature
Etc

49
Q

Deterrence (accountability)

A

Accountability can be a great deterrent against misbehaviour, can warn offended to keep the away from the offence

Eg) badge access time, internet usage at work

50
Q

Admissibility of records

A

A regular and consistent tracking system must be productive admissible evidence!
We need to be able to show where evidence was, how it was passed from one person to another and how it was protected

Must have a hash proving that it is original and not been modified —> hash function

51
Q

Hash function

A

An algorithm that analyzes the data and produces a code or hash. This can be used to prove the originality of evidence e

52
Q

Hash mismatch

A

When data that a hash algorithm had documented is then modified

53
Q

Cryptographic hash function (CHF)

A

An algorithm that matches arbitrary length input with a fixed length string.
Think of this as an address

The arbitrary length input is labelled as a message and the fixed length output is labelled as digest

Used for integrity, authentication and Nonrepudiation

54
Q

5 properties of chf

A

Cryptographic hash function

1 deterministic - same method always produces the same hash
2 one way function - given a hash it it infeasible to produce the original method
3 collision resistance - there is no way to find hash that represents two distinct messages, one digest per message
4 avalanche effect - any chance (even minor) generates a new and entirely different digest
5 computationally efficient- algorithm does not take a long time to compute

55
Q

Dr. Haque wants to implement a new lab accommodation policy for her research students. Her students should be present in her lab during the weekdays from 9 am to 5 pm. Which of the following approach can she use to implement the new policy? Why? Hint: students use an access card to get into the lab, then use lab workstations.
a) Deterrence
b) Record admissibility

A

In using deterrence. Eg having students key in with their time of arrival, dr haque can ensure that she has time evidence, thus deterring misbehaviour and implementing record admissibility through a clock in timing system

56
Q

Intrusion detection System (IDS)

A

IDS is a device or software that monitors a system or network for malicious activity or policy violation
Usually reports any such activity or violation to the admin

Can detect the following:

Denial of service attacks
Buffer overflow
Protocol attacks
Password cracking
Malicious codes such as virus or worm
Impersonation attack
Illegal data manipulation
Unauthorized file access

57
Q

DISCUSS the difference between authentication and accountability

A

AuthenticatIon is a matter of identification and verification, whereas accountability comes after authentication and authorization and access control. It is the next step in security that ensures the appropriate use of a system

58
Q

Order: access control, identification, Accountability, authorization, verification

A

Identification then verification then authentication the. Authorization then access control and then accountability

59
Q

What are the two types of IDS systems

A

Network intrusion detection system
Host intrusion detection system

Both posses the same two working principles,et: signature based detection and anomaly based detection

60
Q

Host vs network intrusion system detection
HIDS VS NIDS

A

Host ids monitors malicious activities as traffic in a single device
Network ids monitors traffic flow In A network

These two can works together

61
Q

HIDS

A

Host-based intrusion detection system
- takes snapshot of existing systems file and compares with previous/normal state
- adds much more granularity

62
Q

NIDS

A

Network intrusion detection system
Monitoring ongoing traffic of a system without overwhelming it
Should ideally combined with other security measures such as a firewall
Can inspect traffic on and offline (offline occurs with collected traffic data)

63
Q

Signature based IDS

A

works similar to an antivirus attack. Maintain database of signatures that signal particular type of attack comparing oncoming traffic to those signatures

64
Q

Signatures (in context if ids)

A

Subject lines and attachments on emails known to carry viruses, re,one logins and other malicious byte sequences

65
Q

Drawbacks of a signature based ids system

A

Usually precise IF the signature database is up to date
Fails to detect new or specially crafted packets —> attackers can also created these databases
This means attackers can test these packets to bypass this ids

Searching overhead can become timely and inefficient as the number of signatures increases

66
Q

Anomaly based IDS

A

Uses a baseline of regular traffic and activity on a network.
Form of machine learning this way it can identify the deviation from baseline traffic/activity

67
Q

Downsides to anomaly/machine based IDs

A

Higher rate of false positives compared to the signature based IDS

68
Q

Intrusion Prevention System (IPS)

A

Identifies suspicious activity
Logs security events
Attempts to block intrusions or limit data
Reports intrusion attempts

69
Q

Intrusion Prevention System (PS) types and methods

A

Similar to IDs there can be both host and network (hips and nips)

70
Q

IPS vs IDs system

A

IDs will only defect, where’s IPs can take action
Traffic needs to flow though lPS
Traffic does not need to flow through IDs
Packet processing overload is higher in IPS than IDs

71
Q

If you place a NIDS in your network, why do you still need a HIDS?

A

An hids will provide a more granular level of security. it will use a more real time analysis of what is occurring in a specific device

72
Q

What are the differences between signature and anomaly-based IDS?

A

Pattern matching vs machine learning