Comp Security- Week 2 Flashcards

1
Q

Where is security a concern?

A

Business env.- shareholder confidence, cashflow
Medical env.- patient records, equipment safety
Military env.- weapon access, communication secrecy
Households.- privacy, security alarms
Society.- transportation, communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Software Security

A

Low level; security of the programming language itself
Attacker goal: Take over target machine by executing arbitrary code by hijacking applications control flow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Operating System Security

A

Os attacker: control malicious files and applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Network security

A

People
application
transport
network
data link
physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

web security and privacy

A

Attacker goal: set up malicious site visited by victim, no control of network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Aspects of security:

A

Distributed system: computers connected by networks (ex blockchain)
Communications/Network security: addresses security of communication links
Computer security: addresses security of end systems
Application security: relies on the 2 to provide secure services to end users
Security management: how to deploy security technologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Types of frauds/attacks

A
  1. insider fraud
  2. identity fraud- espionage
  3. password sniffing
  4. tcp session hijacking- send messages appearing to be from trusted host
  5. denial of service- tcp syn flooding by creating half open tcp requests
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Security strategies

A
  1. prevention
  2. detection
  3. reaction
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Security objectives/properties:

A
  1. confidentiality- prevent unauthorized discolsure of info
  2. integrity- prevent unauthorized modification of ino
  3. availability- prevent unauthorized withholding of info/resources
  4. authenticity- know who youre talking to
  5. accountability- prove an entity was involved in some event
  6. access control- restricting access to resources to privileged entities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

confidentiality

A

prevent unauthorized reading
secrecy: protection of data belonging to an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

integrity

A

prevent unauthorized writing
data integrity: when computerized data is the same as source document and hasnt been exposed to accidental or malicious alteration or destruction
detect and correct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

availability

A

being accessible upon demand by authorized entity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

accountability , at os level and at distributed systems

A

if an actual link between a user and user identity can be established then user can be held accountable
at os level: audit logs
in distributed systems: non repudiation mechanisms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

non repudiation services and the 2 types

A

non repudiation services: provide unforgeable evidence that a specific action occurred
non repudiation of origin: prevents against sender denying data was sent
non repudiation of delivery: prevents against receiver denying data was received

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Security attacks

A
  1. interception- access system they are not allowed to (confidentiality)
  2. interruption- disrupt a service and prevent it from functioning (availability)
  3. Modification- attacker tampers with a system (integrity)
  4. fabrication- attacker creates a false record ex fraud or phishing (integrity)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Eavesdropping

A

Getting info intended for someone else during transimission over communication channel (confidentiality)

17
Q

Alteration

A

Modification of info ex man in middle attack (data integrity)

18
Q

denial of service

A

interruption of data or info access (availability)

19
Q

masquerading

A

spoofing identity or sending something on their behalf (origin identity)

20
Q

Individual attacks follow this 5 step plan:

A
  1. Reconnaissance (Surveying) - learns all they can about target (mac or windows)
  2. Scanning- pre attack phase searches for vulnerabilities (what version, open ports)
  3. gain access- exploits vulnerability to gain access (inject malware)
  4. maintain access- deliver payload (plant spyware etc)
  5. cover tracks- hide evidence, modifies log files