IT security Flashcards
What is the CIA triad?
The CIA triad includes confidentiality, integrity, and availability.
What is the difference between safety and security?
Saftey is about protecting the environment from a system. Security is about protecting the system form the environment.
What are potential causes of security vulnerabilities?
- Development under tight time constraints
- Insufficient knowledge of the developer
- Underestimation of risk potentials
- Operating system failure
Define confindentiality?
Only the sender and the legitimate receiver should be able to understand the transmitted information.
Define integrity?
Communication is not unnoticeable altered in transit. Neither by accident nor by a malicious adversary.
Define availability
Communication should be available within its operational boundaries without an adversay being able to tear it down.
Define authentication
Sender and receiver should be able to validate the other party involved in the communication at any time.
Define non-repudiation
Sender of a message is not able to deny the authorship after transmission.
Anonymity
The originator of a message can not be identified.
Pseudonymity
The originator of a message can be identified, though either only with a huge effort or by using additional information not necesarily available to the message’s recipient.
Name six frauds in communication systems
Malware - software that harms a target - worms , virus, spyware, ransomware
Distributed Denial-of-Service-Attack
Machine in the Middle Attack
Spoofing
Replay Attack
Insufficient input validation
What is symmetric cryptography
In symmetric cryptography the same key is used for encryption and decryption.
It is older than assymmetric cryptography, for example, Caesar’s cipher.
Provides confidentiality for transmitted or stored data. Only sender and receiver should understand the transmitted information.
Algorithms: DES, advanced Encryption Standard, ChaCha20
Block cipher - work on plaintext pieves with a fixed size
Stram cipher - work on bit-by-bit or byte-by-byte
What are the requirements for symmetric cryptography
Knowldge of the algorithm should not weaken the strenght of the encryption - Kerckhoff’s principle
Knowledge of ciphertext and algorithm should not enable an adversary to extract either the plaintext or the secret key
Stronger: Knowledge of ciphertext and corresponding plaintext should not enable the adversary to extract the secret key
Sender and receiver must obtain a copy of the secret key
Attacks on symmetric encryption
Cryptoanalysis - algorith and plaintext-ciphertext is analyzed
Brute-fore attack - try all possible keys
What are the properties of cryptographic hash functions?
Compression - H(x) produces output of fixed lenght, regardless of the lenght of x
Efficiency - H(x) is relatively easy and fast to compute
Pre-image resistance - Given H(x), it should be practically infeasible to find x
2nd pre-image resistance Given H(x) and x it should be practically infeasible to find x’ not equal x that H(x) = H(x’)
Collision resistance - it should be practically infeasible to find x and x’ (with x’ not equal x) such that H(x) = H(x’)