Introduction Flashcards

1
Q

Security vs. Safety

A

Security: refers to protection against itended incidents and attacks
Safety: refers to reliability, stability and resilience (Ausfallsicherheit) (in German “dependability (Zuverlässigkeit) refer to both)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define Information

A

Represents a fourth production factor (in addition to ground, capital and work)
–> moving from industralized society to an information society

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Security?

A

State in which threats do not exist, are irrelevant , or do not apply –> security is subjective and relative (is flying secure?)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is IT Security?

A

Focuses on secure storage, processing, encoded transmission of data
Goals: Availability, Confidentiality, Integrity, Authenticity, Nonrepudation, Anonymity, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Name possible strategies of attacks and their likelyhood of success

A

Direct attacks: can be made technically diffcult

Indirect attacks: are often possible and successful (eg. social engineering attacks)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name natural enemies of IT Security

A
  • Users
  • Complexcity (of Code, e.g. 1 error per every 1000 lines of code: 50k errors in Windows)
  • Speed (time to market, etc.)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Name key concepts and principles

A

there is no absolute security / a system will always be attacked / security measures are mostly circumvented - not broken / simplicity and minimal systems are advantegeous

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Name some misconceptions of IT Security

A

Users are interested in IT Security / data and information flows can be controlled / certificates are useful / penetration tests helps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Name the formula to compute risk

A

Risk = (Probability of an event) * (expected loss)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are baseline requirements in IT Security?

A

independent from actual risk, you put state-of-the-art tools into place (firewall, antivir software, etc.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the problem with IT Security and Standards?

A

There are no standards that cover 100%, but best practices such as ISO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is cryptography?

A

kryptos = hidden, logos = word

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Name some cryptographic fundamentals

A

data integrity, access control, authentification, anonomity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is a cryptosystem?

A

set of algorithms together with the key management processes that support use of the algorithm in some application context

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Name some classes of cryptosystems

A

keyless cryptosystems (no crypto-parameter used) / secret key (symmetric) cryptosystems (same crypto-paramter for all participants) / public key (asymmetric) cryptosystems (crypto-parameters not shared among all participants)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Explain unconditional / information-theoretical security

A

if its impossible for the advisory to solve the task (e.g. its impossible to calculate the key because any key could be possible with same probability)

17
Q

Explain conditional / computational security

A

the advisory can theoretical calculate the key (maybe not now because of insufficient calculation power)

18
Q

What is a provably secure cryptosystem?

A

when breaking the cryptosystem is computationally equivalent to solving a mathematical problem –> if the problem cannot be solved, the system cannot be broken

19
Q

what is the Kerckhoff’s principle?

A

it says that cryptographic systems should be designed in a way that it remains secure even if the adversary knows all the details expect the key (e.g. knows the code)

20
Q

What are side-channel attacks?

A

work surprisingly well, e.g. timing attacks: time needed to generate a key leads to assumption about the approach

21
Q

what are keyless cryptosystems?

A

have a one-way function e.g. Function f:X –> Y is one-way, if it can be computed efficiencly but cannot be inverted efficiencly