467_Flashcards
What is malware as defined by NIST 800-83?
A program inserted into a system, usually covertly, to compromise confidentiality, integrity, or availability of data, applications, or operating systems.
What is an Advanced Persistent Threat (APT)?
A well-resourced, persistent attack using various technologies and malware, often state-sponsored, targeting specific businesses or political entities.
What are the main classifications of malware propagation mechanisms?
Infected content (viruses), vulnerability exploit (worms), and social engineering (spam emails, Trojans).
What is a virus?
Malware that replicates itself into executable code and propagates when the infected code is executed.
What is a worm?
A program that spreads independently by exploiting vulnerabilities and often carries a payload.
What is a Trojan horse?
Malware that appears legitimate but contains harmful hidden functionality, such as spyware or keyloggers.
What are botnets used for?
Activities such as DDoS attacks, spamming, sniffing sensitive data, and installing additional malware.
What is ransomware?
Malware that encrypts user data and demands payment for the decryption key.
What is a logic bomb?
Code that triggers a payload when specific conditions are met.
What is the difference between a rootkit and a backdoor?
A rootkit hides its presence and provides admin access, while a backdoor is an entry point bypassing security checks.
What is a phishing attack?
A social engineering attack where victims are tricked into revealing sensitive information by mimicking trusted sources.
What is a macro virus?
A virus that uses macro or scripting code in documents to execute and spread.
What is a drive-by-download attack?
Malware installation through a compromised website without user consent.
What are the four generations of anti-virus software?
1) Signature-based scanners, 2) Heuristic scanners, 3) Activity traps, 4) Full-featured protection.
What is sandbox analysis?
Executing potentially malicious code in a controlled environment to analyze its behavior.
What is a hash function?
A function that converts a variable-length input into a fixed-size output called a hash value.
What are the key properties of a cryptographic hash function?
Preimage resistance, second preimage resistance, and collision resistance.
What is preimage resistance?
The property that makes it computationally infeasible to find an input x given its hash value h.
What is collision resistance?
The property that makes it computationally infeasible to find two distinct inputs x and y such that H(x) = H(y).
What is the main application of a message digest?
To provide message authentication by verifying data integrity.
What is a digital signature?
A mechanism where the hash value of a message is encrypted with a private key to ensure authenticity and integrity.
What are simple hash functions, and why are they insecure?
Functions like XOR-based hashing are prone to collisions and insufficient for secure applications.
What is the birthday paradox in the context of hash functions?
The probability of finding a collision is significant after approximately √2^m inputs for an m-bit hash value.
What is the Secure Hash Algorithm (SHA)?
A family of cryptographic hash functions designed by NIST, including SHA-1, SHA-2, and SHA-3.
Why was SHA-3 developed?
To provide a secure alternative to SHA-2 due to concerns about its structural similarity to SHA-1, which has vulnerabilities.
What is the structure of SHA-3?
Based on a sponge construction, allowing flexibility in output size and security.
What are brute-force attacks on hash functions?
Efforts to find preimages, second preimages, or collisions by testing large numbers of inputs.
What is a hash-based pseudorandom function (PRF)?
A function using a hash to generate pseudorandom values, often for key generation.
What is the significance of the S-box in SHA-2 and SHA-3?
Provides nonlinearity to resist cryptanalytic attacks.
How is a hash function used in password storage?
Passwords are hashed, and the hash is stored. Verification is done by comparing the stored hash with the hash of the entered password.
What does RSA stand for?
Rivest-Shamir-Adleman, the developers of the algorithm.
What is the purpose of public-key cryptography?
To provide secure communication and digital signatures without relying on a trusted key distribution center.
What are the six components of a public-key cryptosystem?
Plaintext, encryption algorithm, public key, private key, ciphertext, decryption algorithm.
What is a trap-door one-way function?
A function that is easy to compute but infeasible to invert without special knowledge (the trap-door).
What are the basic requirements for a public-key algorithm?
Easy to generate key pairs, encrypt with the public key, decrypt with the private key, and infeasible to derive private key from public key.
What is the mathematical basis of RSA encryption?
C = M^e mod n, where C is ciphertext, M is plaintext, e is the public exponent, and n is the modulus.
What are the prime factors of n in RSA used for?
They are used to compute the private key through the totient function ø(n).
What are the common attacks on RSA?
Brute force, mathematical attacks, timing attacks, hardware fault-based attacks, chosen ciphertext attacks.
How does RSA use the Chinese Remainder Theorem (CRT)?
To speed up decryption by breaking calculations into smaller moduli.
What is a common public exponent used in RSA?
e = 65537, because it has only two 1 bits, minimizing computational overhead.
What is the countermeasure for timing attacks on RSA?
Using constant exponentiation time, adding random delays, or blinding ciphertexts.
What is Optimal Asymmetric Encryption Padding (OAEP)?
A procedure to add random padding to plaintext to prevent chosen ciphertext attacks on RSA.
What are the applications of public-key cryptosystems?
Encryption/decryption, digital signatures, and key exchange.
What is the main advantage of public-key cryptography over symmetric encryption?
Key distribution is simpler as the public key can be shared openly.
What does AES stand for?
Advanced Encryption Standard.
What are the block and key sizes for AES?
Block size: 128 bits. Key sizes: 128, 192, or 256 bits.
What is the structure of AES?
Processes data as a 4x4 matrix (State array) through multiple rounds of substitution and permutation.
What are the four main transformation functions of AES?
SubBytes, ShiftRows, MixColumns, AddRoundKey.
What is the purpose of the SubBytes transformation?
It substitutes each byte in the State using an S-box designed for cryptographic strength.
What does the ShiftRows transformation do?
Performs a cyclic shift of the rows in the State matrix to ensure diffusion.
What is the MixColumns transformation?
A column-wise mixing operation that combines the bytes in each column of the State matrix.
What is the AddRoundKey transformation?
Performs a bitwise XOR between the State matrix and a round key.