Exam Flashcards
ISO27000 INFORMATION SECurity
Preservation of confidentiality, integrity and availability of information
What determines a good hash function?
Fast
Not possible to revert
No collisions
3 stages of security control
Storage, transmission and processing
Application of hash functions
MAC
Check if a download is correct (no byte tampering)
Storing information such as password (compare the hashes to eachother)
What does TLS achieve?
Encryption, authentication
PORT for HTTPS and HTTP?
HTTPS: 443
HTTP: 80
Confidentiality
The property that information is not made available or
disclosed to unauthorized individuals, entities, or
processes
Availability
The property of being accessible and usable
upon demand by an authorized entity.
Integrity
The property of accuracy and completeness
ISO27001
Information Security Management System
It describes a framework setting up and managing an ISMS,
i.e. establishing and operating a security program within an organisation
ISO27005
risk management process
ISO27002
Code of practice for information security management
It provides a checklist of security controls that organisations
can consider using and implementing.
Risk treatment strategies
– Reduce,
share,
retain/accept,
avoid
Authorization
Authorization is to specify access and usage permissions for entities, roles or
processes
biometric requierment
Universality:
Each person should have the characteristic;
Distinctiveness:
Any two persons should be sufficiently different in
terms of the characteristic;
Permanence:
The characteristic should be sufficiently invariant
(with respect to the matching criterion) over a period
of time;
Collectability:
Threat scenario modelling:
– Attacker centric, architecture centric, and asset centric
TPM
TRustedf platform module
-Sealed storage/encryption
Authenticated boot
-Remote attestation
Phases in incident response
analysis
– containment
– eradictation
– normalization
Parameters (block and key size) of AES
Block: 128
Key: 128, 192, 256
3 categories of security controls
physcial: lock
administrative: polciies
, technologiaal: encryption
3 functional sec
Preventive: Encryption
detective: Intrusion detection system
corrective security: REstore to backup
Type 1 and type 2 virtualization architecture
Type1: Hyeprvisoper -1, OS 0
Type2: OS 0: Rest is 3 (including hypervisor)
Type 1 and type 2 virtualization architecture
Type1 (No hostOS between): Hyeprvisoper -1, OS 0
Type2: OS 0: Rest is 3 (including hypervisor)
phases in incident response
analysis
– containment
– eradictation
– normalization
Risk assessment process
Identification: Assets, threats
Analysis: Value of assets, likelyhood
Evaluation: Rank risk, compare with criteria
Elkement of ISMS cycle
Planning, Risk assessment, security controlls, evaluation, reporting
entity
A person, organisation, agent, system, session, process, etc
identity
A set of names / attributes of entity in a specific domain
An entity may have identities in multiple domains
An entity may have multiple identities in one domain
DAC
Discretionary access control
Linux, r,w,x
tls dh
Client and server perform Diffie-Hellman-Exchange (DH)
Server signs his DH value with server private key (RSA)
Client validates signature with server public key (RSA)
tls pic
see pic pohne