Introduction Flashcards
Security vs. Safety
Security: refers to protection against itended incidents and attacks
Safety: refers to reliability, stability and resilience (Ausfallsicherheit) (in German “dependability (Zuverlässigkeit) refer to both)
Define Information
Represents a fourth production factor (in addition to ground, capital and work)
–> moving from industralized society to an information society
What is Security?
State in which threats do not exist, are irrelevant , or do not apply –> security is subjective and relative (is flying secure?)
What is IT Security?
Focuses on secure storage, processing, encoded transmission of data
Goals: Availability, Confidentiality, Integrity, Authenticity, Nonrepudation, Anonymity, etc.
Name possible strategies of attacks and their likelyhood of success
Direct attacks: can be made technically diffcult
Indirect attacks: are often possible and successful (eg. social engineering attacks)
Name natural enemies of IT Security
- Users
- Complexcity (of Code, e.g. 1 error per every 1000 lines of code: 50k errors in Windows)
- Speed (time to market, etc.)
Name key concepts and principles
there is no absolute security / a system will always be attacked / security measures are mostly circumvented - not broken / simplicity and minimal systems are advantegeous
Name some misconceptions of IT Security
Users are interested in IT Security / data and information flows can be controlled / certificates are useful / penetration tests helps
Name the formula to compute risk
Risk = (Probability of an event) * (expected loss)
What are baseline requirements in IT Security?
independent from actual risk, you put state-of-the-art tools into place (firewall, antivir software, etc.)
What is the problem with IT Security and Standards?
There are no standards that cover 100%, but best practices such as ISO
What is cryptography?
kryptos = hidden, logos = word
Name some cryptographic fundamentals
data integrity, access control, authentification, anonomity
what is a cryptosystem?
set of algorithms together with the key management processes that support use of the algorithm in some application context
Name some classes of cryptosystems
keyless cryptosystems (no crypto-parameter used) / secret key (symmetric) cryptosystems (same crypto-paramter for all participants) / public key (asymmetric) cryptosystems (crypto-parameters not shared among all participants)