Domain 5 - Protection of Information Assets Flashcards
What is the role of Certificate Authority (CA)?
1) A trusted third party that serves authentication infrastructures or organizations, and registers entities and issues them certificates
2) Maintains a directory of digital certificates for the reference of those receiving them
3) Manages the certificate life cycle, including certificate directory maintenance and certificate revocation list (CRL) maintenance and publication
What is the primary role of Certificate Authority (CA)?
Check the identity of the entity owning a certificate and to confirm the integrity of any certificate it issued.
What is the role of Registration Authority (CA)?
The individual institution that validates an entity’s proof of identity and ownership of a key pair
What is Certificate Revocation List (CRL)?
1) An instrument for checking validity of the certificates for which the CA has responsibility
2) Provide list of digital certificates that are no longer valid
What is Certificate Practice Statement (CPS)?
1) Document that outlines the policies and practices followed by a Certification Authority (CA) to issue and manage digital certificates (incl. policy on revoking certificates)
2) Designed to provide transparency and establish trust between the CA and its users
What is a Digital Certificate?
1) An electronic document that is used to verify the identity of a user, device, or organization
2) Contains information about the identity of the entity it is issued to, such as name, address, and public key
3) Issued by a trusted third party known as a Certificate Authority (CA)
How Digital Certificate is used?
Used to establish secure communications over the internet and other networks, by allowing parties to verify the identity of each other and encrypting data to protect it from unauthorized access.
When a digital certificate is issued, it is signed by the CA using their private key, providing assurance that the certificate is authentic and has not been tampered with.
The certificate can then be used to authenticate the identity of the certificate holder, typically through the use of digital signatures or other cryptographic protocols (e.g. IPSec, SSH, S/MIME, etc.).
What is the role of Directory Server in PKI?
Makes other users’ certificates available to applications
What is Secure Socket Layer (SSL)?
It is a protocol used to establish a secure and encrypted communication channel over the internet.
How SSL protects data?
1) User wants to access server, thus send request to the server to initiate secure connection using HTTPS protocol
2) Server responds by sending its digital certificate that contains the server’s public key & information about the certificate’s issuer
3) User checks the certificate to ensure it is valid by verifying the Certificate Authority’s digital signature contain in the certificate using the CA’s public key
4) Once verified, user generates symmetric session key & encrypts it with server’s public key
5) This is then send to server
6) An acknowledgement will be send after the server will decrypt with its private key to successfully receive the session key
7) The user & server can now use the session key to encrypt & decrypt all communication between them
Types of IDS
1) Network-based = Operate by analyzing network traffic as it passes through a particular point on the network, such as a switch or router
2) Host-based = Operate on individual machines, analyzing system logs, file changes, and other activity
Methods of detection used in Intrusion Detection System (IDS)
1) Statistical (Anomaly)= looks for deviations from normal patterns of behavior, which may indicate an attack
2) Signature-based = uses a database of known attack patterns, or signatures, to compare against network or system activity
3) Neural-based = Combines both statistical & signature-based IDS to create hybrid & better system
Why Statistical-based IDS most likely generate false alarm?
This IDS relies on definition of known & expected behavior of systems. Because normal network activity may at times include unexpected behavior (e.g. sudden massive downloads), these will be flagged as suspicious.
Categories of Power Failures/ Interruption
1) Total failure (blackout)
2) Severely reduced voltage (brownout)
3) Sags, Spikes & Surges
4) Electromagnetic Interference (EMI)
What is blackout?
Complete loss of electrical power which often caused by weather conditions (e.g. storm, earthquake) or inability of an electrical utility company to meet user demands
What is brownout?
Failure of electrical utility company to supply power within acceptable range which places strain on electronic equipment & may limit operational life or permanent damage