Chapter 7: Security in pervasive systems Flashcards

1
Q

What is Information Systems Security?

A
  • Processes and methodologies to protect information and information systems against unauthorized access
  • It is essentially risk management
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How can you manage the risk of information systems?

A

Risk = Probability x Impact
Probability: f(threats, vulnerabilities)
Impact: f(assets)

Asset: anything that could be of value
Threat: Potential danger to information life cycle
Vulnerability: Weakness that provides an opportunity for a threat to be exploited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What countermeasures / safeguards are available to mitigate potential risks?

A
  • Administrative, operational or logical measures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Is there a perfect security?

A
  • No because with enough time and resources every security technology is breakable
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How can you determine Good Enough Security

A
  • you need to find the minimum cost between cost for security enhancing mechanisms and expected total cost for violations
  • At a certain point towards 100 % security, the costs for security mechanisms increase exponentially
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the components of security

A
  • Security Services

- Security mechanisms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explain Security Services

A
A service that enhances the security of the information systems. Uses one or more security mechanisms
CIA
- Confidentiality
- Integrity
- Availability
- Authentication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Explain Security mechanisms

A

Mechanism designed to prevent or recover from a security attack

  • Encryption
  • Hashing
  • Digital Signatures
  • Passwords
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What means confidentiality?

A

Ensuring that only authorized principals can read the information

Threat: Disclosure
Security Mechanism: Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is encryption?

A

A transformation of plain text to cypher text

Decryption is the reverse transformation into plain text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does the Caesar encryption work?

A

Encryption + 3 letters shift in the alphabet
Decryption - 3 letters shift in the alphabet

Hallo -> KDOOR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does a symmetric cryptography work in general?

A

Message Source P ->
Encryption Algorithm E -> C=E(K,P)
Decryption Algorithm D -> P=D(K,C)

C= Cypher Text
P = Plain Text
K =  Key

Algorithms are public; security due to secrecy of the key, same key for encryption and decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are potential methods to attack encrypted data?

A

Brute Force: Try all possible decryption key until finding the correct one

Cryptanalysis: Analyze information of the cryptosystem to reduce the space of possible decryption keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why do we need (public key) asymmetric cryptography

A
  • Modern encryption algorithms are computationally secure (brute-force is computationally unfeasible)
  • Key distribution must be secure

-> Public key (asymmetric) cryptography allows to exchange keys over an insecure channel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does (public key) asymmetric cryptography work?

A

Two keys per user:

  • Public key can be distributed over insecure channels
  • Private key is kept secret

1) Encrypt plain text with receivers public key
2) Transmit cryphertext
3) Receiver decrypts the text using its private key to obtain plain text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Explain integrity

A

Ensures that only authorized principals can modify the information

Threat: Corruption
Mechanism: Hash, MAC code, digital signature

17
Q

What is a hash?

A
  • Mathematical function that converts arbitrary long string into a string of fixed length that guarantees integrity
  • easy to compute in forward direction but impossible to compute in reverse direction
  • Collision resistant: no two string generate same hash
18
Q

How can attackers influence the hash?

A
  • They can’t modify the hashed message that satisfies the hash
  • But attackers could modify the hash
19
Q

Explain how message authentication code can create integrity

A

Message Authentication Code (MAC):

  • Hash parameterized with a secret key
  • Sender needs key for computation
  • Receiver needs key for verification
  • Attacker can’t manipulate the hash
20
Q

Explain how digital signature can create integrity

A
  • Tries to recapture properties of handwritten signature
  • Only the signer may generate it
  • Anybody can verify its validity
  • Based on Public Key Cryptography

(Encryption with senders private key and decryption with senders public key)

21
Q

Explain Availability

A
  • Ensures that authorized principals can access and use the system without undue delays
    Threat: Denial of Service (DoS)
    Mechanism: redundancy, load balancing
22
Q

How can redundancy guarantee availability

A
  • copies of components that take over workload in the event of failure
23
Q

How can load balancing guarantee availability

A
  • Transfer workload from overloaded components to others with lighter load
  • Need to take care of (System monitoring, minimize impact of maintenance, optimize performance)
24
Q

Explain Authentication

A
  • Identify and verify a principals claimed identity
  • Threat: Impersonation
  • Mechanism: username/password
25
Q

How are passwords stored in a machine?

A
  • Not directly but the hashed of a password
  • Attackers can’t get a list of passwords
  • Salt (extra bytes) add protection against dictionary attacks

Password + Salt Value -> Hash algorithm -> Hash value

26
Q

In what way does pervasive computing make a difference to security?

A

These dimensions are fairly new for security:
Extended Computing Boundaries:
- IoT
- 1 user-N devices

Non-intrusive

Adaptive

Context-Aware
- Location

27
Q

What are the new attack vectors emerging from ubiquitous computing?

A
  • Networked computer systems become deeply embedded in the fabric of society
  • New usage patterns open up new vulnerabilities (but also opportunities)
  • Damage of malicious attacks become more varied and more pervasive
28
Q

Give some examples for new attack vectors of ubiquitous computing

A
  • Track people through geolocated dating apps
  • Internet of (evil) things (devices talk behind your back)
  • Denial of Life attack (pace maker / wearables)
29
Q

What is the problem with some geolocated dating apps?

A
  • They send distance of a single to the client (before that they sent the exact coordinates)

Problem:

  • Create a profile in the app
  • Fake three different locations
  • Query the service API to find distance to a particular user
  • -> Exact user location can be calculated using trilateration
30
Q

Whats the difference between Positioning and Tracking

A

Determine the spatial position of a system / person:

Positioning: entity determines its own location
Tracking: system determines entities location (privacy concern)

31
Q

What potential security issues can emerge from an wireless pacemakers?

A

Privacy:
- Access of sensitive health data

Integrity, Availability

  • Change settings (disable therapies)
  • Deliver command shock
32
Q

How can you track user behavior with ultrasonic?

A
  • High-frequency tones (not hearable for humans) embedded in ads, web pages, retail stores
  • Ultrasound beacons are gathered by user devices
  • User behavior can be profiled (ads seen, physical location visited)
33
Q

What are the general security challenges?

A

Extended computing boundary:

  • More computing devices increases complexity
  • Heterogenous devices make standard security mechanisms harder to implement

Security services musst be context-aware too

Security needs to be integrated from the very start