Final Deck Flashcards

1
Q

What are the four kinds of attackers?

A
  1. Rogue hackers
  2. Organized crime
  3. Insider threat
  4. Nation states
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Rogue hackers

A

Hackers not affiliated with an organized group. Usually hacking on a moral basis or political agenda.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Doxxing

A

The practice of revealing private information publicly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Organized crime

A

Organized group attacking bigger targets. Ex. Bank theft, SWIFT hack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Insider threat

A

Threat of hacker working within a corporation. Ex. Edward Snowden

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Nation states

A

Countries using their resources to attack another country or corporation. Ex. Stuxnet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the four aspects of good cryptography?

A
  1. Confidentiality
  2. Integrity (ensure contents haven’t been tampered with)
  3. Authenticity (prove who a message came from / who performed transaction)
  4. Non-repudiation (ensure party can’t back out of a transaction)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

True or false: IP packets are encrypted by default

A

FALSE! They’re plaintext, like sending a postcard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

True or false: My computer’s communication is by default broadcast across the entire network.

A

True! Like the old telephones. Our computers can run in promiscuous mode and record other packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How was crypto classified historically?

A

As a munition until the 1990s when businesses needed to be able to encrypt their data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the idea of crypto wars?

A

Gov wants special access to tech, and companies believe this makes the tech less secure. Ex. San Bernadino shooter –> FBI asking for backdoor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cryptography vs. cryptanalysis

A

Cryptography is the science of creating uncrackable codes. Cryptanalysis is the science of cracking them. Cat and mouse game!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cryptology

A

Umbrella term covering cryptanalysis and cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Steganography

A

The art of concealing information (NOT encrypting).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

If I shave CJ’s head and write a message to her parents on her scalp, which “-ography” am I using?

A

Steganography. The information is hidden, but not encrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

If I write a secret letter to nacho in lemon juice and scramble the letters using a key, which “-ography” am I using?

A

Both steganography (writing in lemon juice) and cryptography (scramble the letters).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the two types of cryptography?

A

Substitution and transposition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

I want to see Jeremy at Koelbel at 4:30. I write a letter to him saying “Teme ta lebelok ta rofu iytrhit” what type of cryptography am I using?

A

Transposition! I didn’t substitute any letters, I just moved them around.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Using substitution of a mod 28 alphabet and key = 15, what does the word “rat” become?

A

r (18) + 15 = 33 - 28 = 5
a (1) + 15 = 16
t (20) + 15 = 35 - 28 = 7

epg

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Scytale

A

A stick with a certain number of sides. Wrap leather band with letters around stick to see message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A scytale is a form of ancient (transposition/substitution)

A

Transposition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

How does the Caesar cypher differ from the Vignere cypher?

A

The Caesar cypher is much simpler and uses a fixed key to substitute letters. The Vignere cypher changes each letter differently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What was Claude Shannon’s discovery?

A

He demonstrated that substitution and transposition, sufficiently combined, yield encrypted data that is indistinguishable from random data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is Kerckhoff’s Principle for encryption?

A

The secret is in the key, not the algorithm. Think of a door lock! It doesn’t matter if you know who makes the lock.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is the opposite of Kerckhoff’s Principle?

A

Security through obscurity. Ex. DVD developed their own crypto.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What are three time tested public algorithms we discussed?

A

DES encryption
AES encryption
Diffie-Hellman (asymm key exchange, not encryption)
RSA (NSA has paid them off)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Where is Diffie Hellman used?

A

All web browsers for sites that use SSL. DH is used in the key exchange.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Keyspace

A

The set of all possible keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is the DES keyspace?

A

56-bit key, so 2^58. Originally had 128-bit, but NSA influenced them to weaken.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is the AES keyspace

A

128-bit key, so 2^128. Assuming 350B guesses per second, it would take 1.2B times longer than age of the universe to crack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What did Tesla do wrong in creating their key fob?

A

They used a proprietary crypto algorithm with only a 40-bit key. Could be cracked in seconds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What are the three requirements for a one-time pad?

A
  1. Must be perfectly random
  2. Pad must be as long as the message
  3. Must be used only once
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Should you trust a software product claiming to use one-time pads?

A

No! Computers are bad at generating random numbers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Pseudo-random number generators (PRNG) and examples

A

Introducing entropy into the equation to generate more random numbers. Ex. move mouse around to create key, Cloudflare lava lamp and camera.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

How does XOR work?

A

XOR: Exclusive OR. So if two inputs are (1 and 0) or (0 and 1) then output is 1. Otherwise output is 0. Not AND.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Block vs. stream ciphers

A

Stream ciphers encrypt data one bit at a time.

Block ciphers use transposition to move blocks to other same-size locations in a way that appears random.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Is block cipher encryption more efficient that steam cipher encrypting?

A

Yes! Block cipher is more efficient but not as secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Are AES and DES block or stream ciphers?

A

Block ciphers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Electronic Code Book (ECB) vs. Cipher Block Chaining (CBC)

A

ECB encrypts every block the same way every time - info can be gained through freq. analysis (you can see the penguin).
CBC uses XOR on plaintext with last encrypted block, requires an initialization vector.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What’s the initialization vector (IV) used in CBC?

A

IV is needed to create the first encrypted block. First encrypted block used for second, and so on…

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What part of InfoSec can be equated to a digital fingerprint?

A

Hashing. It provides integrity!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What is hashing useful for?

A

Ensuring files are unchanged in transmission. Compare hashed file before and after transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

How should you store passwords on your database?

A

Store hashed passwords!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What’s another name for a hash and why does it have this name?

A

Message digest (md) bc a hash digests input of any size –> fixed-size output.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Avalanche effect

A

One small change to the input completely changes the output (hash)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Collision resistance

A

Two different inputs can’t have the same output (hash)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

In the birthday question, how many people do we need to get a 50% chance of collision?

A

2^n = 365 –> n = 8.51. 2^n/2 –> 50% chance of collision. Only 2^4.2 which is about 23 people.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What did Flame malware do?

A

Performed an MD5 hash collision to hijack Microsoft server, MD5 was known to be broken! Had to be found within a millisecond. Was the work of Equation Group (NSA TAO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

How did Google force companies to switch their encryption to SHA-2 and why?

A

Chrome showed a warning that the site could be potentially dangerous if it was using SHA-1, which was already cracked. Businesses don’t want that!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What is hashing used for in web surfing?

A

Hashing is used for the browser SSL to ensure you’re at the site you think you are.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

How long has key sharing been a problem?

A

The history of the world! Up to 1970

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

What’s the problem with Diffie Hellman?

A

No authentication, so you are subject to a MITM attack (how does Alice know that she’s talking to Bob?)

53
Q

How does RSA work?

A

Uses trapdoor one-way function. Multiply together two really large prime numbers. The product is the public key, the two primes make up the private key.

54
Q

Why is key size so much larger for asymmetric encryption?

A

Because you’re only using prime numbers - there are too few if you just use 128-bit, so you need to use something like 4096-bit.

55
Q

What two parts of RSA’s crypto give it digital signature capability?

A

Authentication and non-repudiation.

56
Q

What is the problem with encrypting using asymmetric cryptography?

A

It is 1000x slower than symmetric, can’t be used for websites.

57
Q

Why not use RSA for both key exchange and authentication?

A

Because if RSA was compromised, all of your past communication would be compromised. Solution is to use ephemeral DH for key exchange.

58
Q

X.509

A

A chain of trust certificates, ultimately trusted by a root cert bundled with your computer/browser

59
Q

What are the problems with the X.509 model?

A

You have to trust that root authorities…

  1. Will act in good faith.
  2. Have good operational security protecting their keys.
60
Q

What’s the alternative to X.509 cert model, and what’s the major difference?

A

PGP. Big difference is that it does not rely on a central authority like the certification structure of X.509

61
Q

Phil Zimmerman

A

Creator of PGP while encryption was a munition. He printed a book called PGP source code and internals.

62
Q

Gaining access to a system involves what three things?

A
  1. Identification (who are you?)
  2. Authentication (prove it)
  3. Authorization (this is what you can do after you’ve been authenticated)
63
Q

If Will leaves a typed note on our kitchen table signed “ - Will” has he been authenticated?

A

No, anyone could have written that! He’s been identified but not authenticated.

64
Q

If Will leaves a handwritten note on our table signed “ - Will” and saying something that only we know, has he been authenticated?

A

Yes, he’s proven that it’s really him because he has information that nobody else should have.

65
Q

What do the username and password provide in terms of the three parts of gaining access?

A

Username (identity)

Password (authentication)

66
Q

What are the three primary means of authentication (proving who you are)

A
  1. Something you know (ex. password)
  2. Something you have (ex. key, debit card)
  3. Something you are (ex. Touch ID)
67
Q

Why do passwords persist?

A

Most password replacements trade usability and deployability for more security.

68
Q

Passphrase

A

Using a phrase with a long character length that is easy to remember (ex. “crated beetle charger famous”)

69
Q

Cracking is a function of what two inputs?

A

Entropy and speed

70
Q

How many guesses will you need to make to guess 50% of the keyspace for a 128-bit password?

A

2^128 / 2 = 2^127 guesses

71
Q

A 128-bit AES password has how many bits of entropy?

A

2^128 so 128 bits of entropy

72
Q

How much entropy does an 8-character lowercase password have?

A

2^x = 26^8. x = 37.6 (bits of entropy)

73
Q

What are Bruce Schneier’s best security password recs for businesses?

A
  1. Encourage passphrases instead of very complex passwords
  2. Don’t force people to change passwords
  3. Let people use password managers
74
Q

THC Hydra

A

Used for password guessing of online attacks. Much slower than offline bc of network latency.

75
Q

Why is THC Hydra called “Hydra”?

A

Websites may limit guesses, but THC Hydra spawns a lot of processes and guesses to limit.

76
Q

What part of the computer does offline password guessing use?

A

Uses GPU, which is really good for password cracking.

77
Q

Work factor

A

Through bcrypt. 2^X (X is work factor) which determines how many rounds of hashing occur before the final hash.

78
Q

How many rounds of hashing occur with a bcrypt hash with a work factor of 10

A

2^10 = 1024 rounds of hashing.

79
Q

Salting

A

Random salt is added to plaintext password before it is hashed. Salt is stored next to hash. [SALT]$[HASH]

80
Q

Peppering

A

Database server and web server are separate. Database server is encrypted with password held by web server. Compromised DB can’t be decrypted without compromising web server.

81
Q

What does salting password protect against?

A

Brute forcing hashes and rainbow table attacks!

82
Q

How can targeted attacks assist with password cracking?

A

People usually create passwords based on their life. Find out everything you can about a person and use this information to create targeted PW lists.

83
Q

What is the VERY first thing to do when vulnerability scanning?

A

Reconnaissance, aka passive information gathering (build a dossier!)

84
Q

Scanning vs. reconnaissance

A

Scanning is active, reconnaissance is passive

85
Q

Risk = _____ x ______ x ______

A

Asset x vulnerability x threat.

Define assets, then find vulnerabilities in assets.

86
Q

What are the six phases in active vulnerability scanning?

A
  1. Network sweeps
  2. Network tracing
  3. Port scans
  4. OS Fingerprinting
  5. Version scans
  6. Vulnerability scans
87
Q

What is management’s goal from a business perspective?

A

Minimize your attack surface.

88
Q

How might a business minimize its attack surface?

A

Tunnel traffic, shut down open but unused ports, apply updates as soon as they’re released!

89
Q

True or false: creating a complex IT structure is more secure because attackers won’t understand it.

A

False, complexity is the enemy of security.

90
Q

Metasploit

A

Framework containing ~1500 exploits.

91
Q

Bug vs. vulnerability

A

A bug is simply some flaw in code. If the flaw is exploitable, it’s a vulnerability.

92
Q

EternalBlue

A

Exploit developed by NSA that exploits older versions of Microsoft. Told Microsoft about it once they figured out it was leaked.

93
Q

What was WannaCry based on? Who made it?

A

North Korea took the leaked EternalBlue and developed WannaCry with it.

94
Q

What are the four reasons why it’s hard to patch? (Wendy Nather, CISO)

A
  1. You can’t update a system that isn’t under your control.
  2. Organizational constraints
  3. “Built to last” conflicts with “update early and often”
  4. Systems with external, highly entangled dependencies will take longer to update (ex. Niagara)
95
Q

What are the five principles of physical security?

A

Deter, detect, alarm, delay, respond.

96
Q

What is the weakest link in a secure system?

A

The humans! Aka “wetware”

97
Q

Spear phishing

A

A phishing attack that targets a specific organization or person.

98
Q

What are two defenses to (spear) phishing scams?

A

2FA or physical tokens. Ex. Google requires employees to use YubiKeys and system hasn’t been phished.

99
Q

Vishing

A

Voice phishing, coercing people into revealing critical information over voice

100
Q

What is the problem with security warnings?

A

We treat security warnings like whack-a-mole. Dismiss them quickly. Most phishing sites that use SSL make sure there are no certificate errors.

101
Q

Dual-task interference

A

Refers to how multitasking between 2+ tasks causes brain interference and performance of all tasks suffers

102
Q

Where does working memory occur in the brain?

A

The medial temporal lobe (MTL), which includes the hippocampus and amygdala

103
Q

What happens to the medial temporal lobe (MTL) during dual task interference (DTI)?

A

Neural activity in MTL decreases for those in a high DTI condition

104
Q

When should Chrome show security warnings for maximum benenefit?

A

Low DTI times such as when waiting for a page to load or when a download finished. Leads to much fewer warnings being dismissed.

105
Q

Warning fatigue

A

Users habitually devote less attention to messages with each repeated viewing.

106
Q

How should Chrome show warnings to avoid habituation?

A

Use polymorphic warnings, which are warnings that change how they are shown, even for the same warning. Also, show warnings less frequently!

107
Q

Generalization of habituation

A

When the effects of habituation to one stimulus carry over to a different stimulus that looks similar, but never seen before!

108
Q

Why is the basic UI idea of visual consistency dangerous to security messages?

A

Because of the generalization of habituation. Users will habitually dismiss regular notifications and this will carry over to security notifications.

109
Q

How did Kevin Mitnick hack into big companies

A
  1. Called employee
  2. Said he was an employee
  3. Asked for employee to run code or give him info
110
Q

Dwell time

A

Amount of time a breach was in effect but not discovered

111
Q

Incident response is the intersection of _______ and _______. It is (offensive/defensive) security.

A

Security and forensics. Defensive! It’s a response to an attack.

112
Q

What does Krebs recommend as a first step for network security?

A

Monitor, then harden! You can’t defend what you can’t see.

113
Q

What are the phases of incident response

A
  1. Plan
  2. Prevent
  3. Detect (assuming intruder)
  4. Respond

Circular, so response will improve the plan and prevent future attacks of similar nature.

114
Q

Kill-chain concept

A

As a defender if you can detect an attack before the attacker accomplishes their goal, EVEN IF THEY BREACH YOUR NETWORK, you win.

115
Q

Breach vs. compromise

A

If you were breached but never compromised, you win as a defender! Compromise is the damage done once a breach occurs.

116
Q

What is the issue with a simple intrusion detection systems (IDS)?

A

Set of warnings but don’t do anything. Like a check engine light, you decide whether to respond to it.

117
Q

How does NSM improve simple IDS system?

A

Gives the defender the data to look into IDS (the check engine light)

118
Q

True or false: NSM is the practice of collecting everything.

A
True! Extracted content
Alert data
Metadata
Session data
Transaction data

Combine!!

119
Q

What are the principles of a defensible network, and what benefit does this provide?

A

Can be watched, audited, inventoried, etc. Benefit is that you don’t need as large of a security team.

120
Q

What are key metrics that the Computer Incident Response Team (CIRT) should account for?

A
  1. The classification and count of incidents.
  2. The time elapsed from incident detection to containment.

Maybe think about the profits lost?

121
Q

CIO vs. CISO

A

CIO wants things to be faster, better, cheaper. Implements tech without thinking security.

CISO tasked with incident response, forensics, security education, etc.

The two are often in conflict!

122
Q

What group of employees does security training not help?

A

Doesn’t help with intentional, malicious employees who will disregard training.

123
Q

Worm vs. virus

A

Worm: Self-replicating
Virus: Attached to file

124
Q

Malware static analysis vs. dynamic analysis

A

Static analysis: Not running the file but looking at code to determine its functionality, purpose, and identifying traits. Certain tools may execute malware without warning!
Dynamic analysis: Run malware and analyze, also analyze machine once malware has run.

125
Q

What are the five steps of security evaluation as referenced in Beyond Fear?

A
  1. What are you trying to protect?
  2. What are the risks to those assets?
  3. How well does the security solution mitigate those risks?
  4. What other risks does the security solution cause?
  5. What trade-offs does the security solution require?
126
Q

What are you trying to protect when evaluating terrorism (Beyond Fear security evaluation step 1)

A

People. Your assets are not the buildings or the locations, but the people there.

127
Q

PII

A

Personally identifiable information

128
Q

PHI

A

Protected health information