Introduction to Computer Security Flashcards

1
Q

What does not exist?

A

A completely secure system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Level of security depends on

A

Time, Money and Probability of a successful break in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why do we constantly need updates?

A

Security is a process, not a product. What is considered secure today might not be tomorrow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why shouldn’t we download updates?

A

Updates can introduce new vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What happens when you incease the complexity of a system? (SW)

A

Decrease its security superlinearly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Open System

A

Interacts with other systems or external enviornment using standard protocols (web browser interacting with websites using HTTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Closed System

A

Designed to work in isolation or only with specific components, often proprietary and less interoperable (iMessage)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Security implications of open systems

A

May introduce vulnerabilities through interactions with external components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

only good thing about
closed systems

A

Fewer points of exposure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Open Source

A

Software whose source code is publicly available (Linux, Apache)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Closed Source

A

Software whose source code is proprietary and not publicly available (Mac, Windows, Adobe Photoshop)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Advantage of open source software

A

Community audits and faster identification of security issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Risk of closed-source software

A

Hidden vulnerabiliies may persist longer due to lack of external audits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

kernel

A

Bridge between software and hardware, core of operating system. (Creates, schedules and terminates processes)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Kerckoffs’s Principle

A

“A cryptosystem should be secure even if everything about the system, except the key, is public knowledge”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Shannon’s Reformulation of Kerckoffs’s Principle

A

“The enemy knows the system” - focus on robust design, not secrecy (Cough Cough Windows!)

17
Q

Security through obscurity

A

assuming secrecy is enough to prevent attacks

18
Q

3 main entities in a system

A

software, hardware and humanware

19
Q

Firmware

A

software embedded in hardware that controls device funcitonality

20
Q

Evil Maid Attack

A

Physical attack - unauhtorized person tampers with a device (flashing a modified firmware)

21
Q
A
22
Q

Social Engineering

A

Manipulate people into exposing confidential information (Humanware attack)

23
Q
A