ChatGPT Introduction Flashcards

1
Q

What is the first principle of secure systems?

A

Secure systems do not exist: all systems have vulnerabilities due to bugs, design flaws and human errors. Security is about MINIMIZING risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What determines the security level of a system?

A

The time, money and resources required to break the system, and probability of success.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why does complexity reduce security?

A

More complexity increases vulnerabilities, as errors in design, implementation, or usage are more likely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the KISS rule in security design?

A

Keep it Simple and Stupid: Simplify protection mechanisms to reduce potential vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the three entities composing a system?

A

Software, hardware and humanware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why is software a critical part of system security?

A

It has a large exposed attack surface, can be accessed remotely, and often contains vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is firmware?

A

Piece of software embedded in hardware to control its functionality - and can be modified by attackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the Evil Maid Attack?

A

A physical attack where an unauthorized person tampers with a device, such as flashing a modified firmware.

*Flashing firmware is updating it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why is humanware often the weakest link in security?

A

Humans are vulnerable to fatigue, social engineering, bad habits and lack of knowledge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is social engineering?

A

Manipulating individuals into divulging confidential information (phishing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why is security considered a process, not a product?

A

What is considered secure today may not be secure tomorrow, must constantly update, monitor and adapt to address emerging threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What challenges are associated with updating systems?

A

May not be available for all devices, can introduce new bugs (which can be vulnerabilities), and require careful cost/benefit evaluation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does Kerckhoffs’s Principle state?

A

A cryptosystem should be secure even if everything about the system is public except the key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Shannon’s Reformulation of Kerckoffs’s Principle?

A

The enemy knows the system, rely on robust design not secrecy!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Security Through Obscurity, and why is it flawed?

A

Relying on a closed system for security, flawed because they are not audited regularly by public communities for vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are open and closed systems?

A

Open systems interact with external systems/environment with standard protocols

Closed systems operate in isolation or only with specific other systems (proprietary)

17
Q

What is the importance of user education in security?

A

Educated users are less likely to fall victim to attacks, but education is costly and hindered by bad habits or ideological resistance.

18
Q
A