Immediate Attention Flashcards
What is Differential cryptanalysis?
seeks to find the difference between related plaintexts that are encrypted.
The plaintexts may differ by a few bits.
It is usually launched as an adaptive chosen plaintext attack; the attacker chooses the plaintext to be encrypted (but does not know the key) and then encrypts related plaintexts.
What is Linear cryptanalysis?
is a known plaintext attack where the cryptanalyst finds large amounts of plaintext/ciphertext pairs created with the same key. The pairs are studied to derive information about the key used to create them. Both differential and linear analysis can be combined as differential linear analysis.
What is Side-channel attacks?
use physical data to break a cryptosystem, such as monitoring CPU cycles or power consumption used while encrypting or decrypting.
What security principle can be used to help detect fraud coming from users becoming comfortable in their position?
rotation of duties
What is the purpose of rotation of duties?
to detect fraudulent behavior, which increases detection capabilities. the fact that responsibilities are routinely rotated deters fraud. Collusion prevention
What is the purpose of Separation of duties?
multiple people are required to complete critical or sensitive transactions. Minimize collusion
which plan provides strategies to detect, respond to, and limit consequences of malicious cyber incident
Cyber Incident Response Plan
Graham-Denning Model
concerned with how subjects and objects are created, how subjects are assigned rights or privileges, and how ownership of objects is managed. It has three parts: objects, subjects, and rules. It provides a more granular approach for interaction between subjects and objects. There are eight rules: Create object, create subject, delete object, delete subject, read access right, grant access right, delete access right, and transfer access right.
Harrison–Ruzzo–Ullman (HRU) Model
maps subjects, objects, and access rights to an access matrix. It is considered a variation to the Graham–Denning Model. It differs from Graham–Denning because it considers subjects to be also objects.
Incremental
only backup files that have changed since the last backup of any kind was performed and will reset archive bit. The time to perform the incremental backup is greatly reduced but it requires quite a few tapes. The most time in restoration.
Differential backups
differential backup records every piece of data in a file that has changed since the last full backup.
Diffusion
means the order of the plaintext should be spread out in the ciphertext.
Confusion
means that the relationship between the plaintext and ciphertext should be as random as possible.
What is terminology used to describe the data in data-link?
Frame
What is terminology used to describe the data in network layer?
Packets
What is terminology used to describe the data in transport?
Segments
The core principles of PCI-DSS are
• Build and maintain a secure network. • Protect cardholder data. • Maintain a vulnerability management program. • Implement strong access control measures. • Regularly monitor and test networks. • Maintain an information security policy.
Configuration management
is a process of identifying and documenting hardware components, software, and the associated settings.
o It involves the development of a security-oriented baseline configuration.
o It involves tasks such as disabling unnecessary services; removing unnecessary programs;
Change Management
the purpose is to understand, communicate, and document any changes with the primary goal of being able to understand, control, and avoid direct or indirect negative impact that the changes might impose.
The general flow of the change management process:
o Identifying a change
o Proposing a change
o Assessing the risk associated with the change
o Testing the change
o Scheduling the change
o Notifying impacted parties of the change o Implementing the change
Publication 800-30
Risk Management Guide for IT Systems
Publication 800-12
discusses three specific policy types: program policy, issue-specific policy, and system-specific policy.
Publication 800-37
a four-step Certification and Accreditation process
Publication 800-34
Business continuity planning
Publication 800-64
SDLC



