Egna frågor 1 (koncept) Flashcards

1
Q

What does confidentiality mean?

A

The resource is protected from unauthorized read access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does integrity mean?

A

The resource is protected from unauthorized write (change or delete) access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does availability mean?

A

The resource can be accessed by authorized subjects in an unaltered way

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the three main security counter measures?

A

Prevention
Detection
Response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is as important for PET?

A

Data and metadata

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is important for TET?

A

Fairness concern: bias, discrimination
Accountability concern: compliance
Transparency concern: explainability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explain the principle of least privilege

A

The principle of least privilege (POLP), an important concept in computer security, is the practice of limiting access rights for users to the bare minimum permissions they need to perform their work. Under POLP, users are granted permission to read, write or execute only the files or resources they need to do their jobs: In other words, the least amount of privilege necessary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Explain the principle of complete mediation

A

Every access to every object must be checked for authority. This principle, when systematically applied, is the primary underpinning of the protection system. It forces a system-wide view of access control, which in addition to normal operation includes initialization, recovery, shutdown, and maintenance. It implies that a foolproof method of identifying the source of every request must be devised. It also requires that proposals to gain performance by remembering the result of an authority check be examined skeptically. If a change in authority occurs, such remembered results must be systematically updated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Explain the principle of economy of mechanism

A

Keep the design as simple and small as possible. This well-known principle applies to any aspect of a system, but it deserves emphasis for protection mechanisms for this reason: design and implementation errors that result in unwanted access paths will not be noticed during normal use (since normal use usually does not include attempts to exercise improper access paths). As a result, techniques such as line-by-line inspection of software and physical examination of hardware that implements protection mechanisms are necessary. For such techniques to be successful, a small and simple design is essential.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Explain the principle of open design

A

The principle of open design states that the security of a mechanism should not depend on the secrecy of its design or implementation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Explain the principle of psychological acceptability

A

The principle of psychological acceptability states that security mechanisms should not make the resource more difficult to access than if the security mechanisms were not present. Configuring and executing a program should be as easy and as intuitive as possible, and any output should be clear, direct, and useful.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Explain the principle of separation of privilege

A

In computer programming and computer security, privilege separation is a technique in which a program is divided into parts which are limited to the specific privileges they require in order to perform a specific task. This is used to mitigate the potential damage of a computer security vulnerability.
A common method to implement privilege separation is to have a computer program fork into two processes. The main program drops privileges, and the smaller program keeps privileges in order to perform a certain task. The two halves then communicate via a socket pair. Thus, any successful attack against the larger program will gain minimal access, even though the pair of programs will be capable of performing privileged operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Explain the principle of least common mechanism

A

The principle of least common mechanism states that mechanisms used to access resources should not be shared. Sharing resources provides a channel along which information can be transmitted, and so such sharing should be minimized.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Explain the principle of fail-safe defaults

A

The principle of fail-safe defaults states that, unless a subject is given explicit access to an object, it should be denied access to that object. Whenever access, privileges, or some security-related attribute is not explicitly granted, it should be denied.

Other definition:
Fail-safe defaults: Base access decisions on permission rather than exclusion. This principle means that the default situation is lack of access, and the protection scheme identifies conditions under which access is permitted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Explain the principle of privacy by design

A

Privacy by design means that the privacy protection rules are taken into account already when IT systems and procedures are designed. It is a way to ensure that the General Data Protection Regulation’s requirements are complied with and that the data subjects’ rights are protected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the definition of weak collision resistance?

A

Given an arbitrary x there exists no x’ with x’ != x so that h(x) = h(x’)

17
Q

What is the definition of strong collision resistance?

A

There exist no x and x’ with x != x’ so that h(x) = h(x’)

18
Q

What is the difference between strong and weak collision resistance?

A

The obvious difference in their definitions is that for weak collision resistance we assume to be bound to a particular choice of x, whereas in the definition of strong collision resistance we are free to arbitrarily choose our x and x’.

19
Q

What two properties does the Bell-LaPadula model enforce?

A

The simple security property: no process may read data at a higher level.
This is also known as no read up (NRU);
The *-property: no process may write data to a lower level. This is also
known as no write down (NWD).

20
Q

Explain mandatory access control

A

In general, when systems enforce a security policy independently of user actions, they are described as having mandatory access control, as opposed to the discretionary access control in systems like Unix where users can take their own access decisions about their files.

21
Q

What is the Chinese wall model?

A

The goal of the Chinese Wall Model is to ensure that information can not fl􏰞ow between two corporations being in conflict􏰞 of interest.
The 􏰟objects􏰠 (i.e. unit of information) are grouped into 􏰟datasets􏰠. Each dataset represents a corporation. Moreover, each dataset belongs to one or more con􏰞ict of interest class (CI).

There are two main rules to respect:
􏰜 (ss-rule) a subject can read an object if
􏰛 the object is in a dataset that has been already accessed by the subject or 􏰛 the object belongs to a CI that has never been accessed by the subject
􏰜 (*-rule) a subject can write an object O if
􏰛 the subject can read the object and
􏰛 the subject can not read objects outside the dataset of O.

22
Q

What is the Compartmentation and the lattice model?

A

Basic idea: accessing the information requires both clearance and membership in the suitable group.

23
Q

What is the BMA model?

A

Developed by the British Medical Association to describe the information flows permitted by medical ethics. Each of these has potential applications outside its initial field.

24
Q

What does metamorphic mean in terms of viruses?

A

Metamorphic code is used by some viruses when they are about to infect new files, and the result is that the next generation will never look like current generation. The mutated code will do exactly the same thing (under the interpretation used), but the child’s binary representation will typically be completely different from the parent’s. Mutation can be achieved using techniques like inserting NOP instructions (brute force), changing what registers to use, changing flow control with jumps, changing machine instructions to equivalent ones or reordering independent instructions.

Polymorphic malware also makes changes to code to avoid detection. It has two parts, but one part remains the same with each iteration, which makes the malware a little easier to identify

Metamorphic code can also mean that a virus is capable of infecting executables from two or more different operating systems (such as Windows and GNU/Linux) or even different computer architectures. Often, the virus does this by carrying several viruses within itself. The beginning of the virus is then coded so that it translates to correct machine-code for all of the platforms that it is supposed to execute in. This is used primarily in remote exploit injection code where the target platform is unknown.

25
Q

What is a zero-day exploit?

A

A Zero-day (also known as 0-day) vulnerability is a computer-software vulnerability that is unknown to, or unaddressed by, those who should be interested in mitigating the vulnerability (including the vendor of the target software). Until the vulnerability is mitigated, hackers can exploit it to adversely affect computer programs, data, additional computers or a network. An exploit directed at a zero-day is called a zero-day exploit, or zero-day attack.

26
Q

Give four examples of requirements for secure hash functions

A

Can be efficiently applied to data of any size.
Produces a fixed-length output.
Is one-way.
Is strong collision resistant.

27
Q

What are the social engineering exploits?

A
The desire to help 
Attribution
Liking
Fear
Reactance
Reciprocity
Dynamics of doing a favor
28
Q

What are the countermeasures to social engineering?

A

Clear concise protocols that are enforced
Awareness training
Simple rules to define sensitive information
Simple rule that ID required for restricted action
Data classification policy
Resistance training
Testing by security assessment
Politeness change, “NO” is OK