IT security Flashcards

1
Q

What is the CIA triad?

A

The CIA triad includes confidentiality, integrity, and availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the difference between safety and security?

A

Saftey is about protecting the environment from a system. Security is about protecting the system form the environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are potential causes of security vulnerabilities?

A
  1. Development under tight time constraints
  2. Insufficient knowledge of the developer
  3. Underestimation of risk potentials
  4. Operating system failure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define confindentiality?

A

Only the sender and the legitimate receiver should be able to understand the transmitted information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define integrity?

A

Communication is not unnoticeable altered in transit. Neither by accident nor by a malicious adversary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define availability

A

Communication should be available within its operational boundaries without an adversay being able to tear it down.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define authentication

A

Sender and receiver should be able to validate the other party involved in the communication at any time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define non-repudiation

A

Sender of a message is not able to deny the authorship after transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Anonymity

A

The originator of a message can not be identified.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Pseudonymity

A

The originator of a message can be identified, though either only with a huge effort or by using additional information not necesarily available to the message’s recipient.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Name six frauds in communication systems

A

Malware - software that harms a target - worms , virus, spyware, ransomware
Distributed Denial-of-Service-Attack
Machine in the Middle Attack
Spoofing
Replay Attack
Insufficient input validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is symmetric cryptography

A

In symmetric cryptography the same key is used for encryption and decryption.
It is older than assymmetric cryptography, for example, Caesar’s cipher.
Provides confidentiality for transmitted or stored data. Only sender and receiver should understand the transmitted information.
Algorithms: DES, advanced Encryption Standard, ChaCha20
Block cipher - work on plaintext pieves with a fixed size
Stram cipher - work on bit-by-bit or byte-by-byte

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the requirements for symmetric cryptography

A

Knowldge of the algorithm should not weaken the strenght of the encryption - Kerckhoff’s principle
Knowledge of ciphertext and algorithm should not enable an adversary to extract either the plaintext or the secret key
Stronger: Knowledge of ciphertext and corresponding plaintext should not enable the adversary to extract the secret key
Sender and receiver must obtain a copy of the secret key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Attacks on symmetric encryption

A

Cryptoanalysis - algorith and plaintext-ciphertext is analyzed
Brute-fore attack - try all possible keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the properties of cryptographic hash functions?

A

Compression - H(x) produces output of fixed lenght, regardless of the lenght of x
Efficiency - H(x) is relatively easy and fast to compute
Pre-image resistance - Given H(x), it should be practically infeasible to find x
2nd pre-image resistance Given H(x) and x it should be practically infeasible to find x’ not equal x that H(x) = H(x’)
Collision resistance - it should be practically infeasible to find x and x’ (with x’ not equal x) such that H(x) = H(x’)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the most widely used cryptographic hash functions?

A

> MD5, 128-bit output (don’t use!)
SHA-1, 160-bit output (don’t use!)
SHA-2(56), up to 256-bit output
SHA-3, 224 up to 512-Bit output

17
Q

Describe asymmetric cryptography

A

Problem of symmentric cryptography - key distribution.
Solution of asymmetric cryptography - public and private key. Public key is known to everyone, private key only to user. Public and private key are connected through a hard mathematical problem
RSA
ECC
Provides CIA

18
Q

What is authentication

A

Authentication describes the process that validates the identity of a user or program against any other user or program and is atwo step procedure.
Identification is asserting who a person is
Authentication is proving that asserted identity

19
Q

Name different authentication methods

A

Password
Something you are - biometrics
Something you have
Singel Sign-On
Multi-factor Authentication

20
Q

Name different authentication frauds

A

Brute-force attack
Social Engineering
Phishing
Physical attacks

21
Q

Name effective policy implementations

A

Check every access
Enforce least privilege
Verify acceptable usage
Tracking
Access Log

22
Q

What is spoofing?

A

Attacker pretends to be someone or something else.
ARP
MAC
DNS
IP

23
Q

What are digital certificates?

A

Digital document that assures the mapping between a public key and the corresponding entity (natural or legal person, domain name, mail address, …

24
Q

What’s the content of a X.509 certificate?

A

> Version: specifies the version and thus the
certificate format, currently v3
Serial Number: Unique identifier within the
CA.
Signature Algorithm Identifier: Algorithm
that is used to sign the certificate together
with any parameters.
Issuer Name: Name of the trusted third
party (CA).
Period of validity: Consists of two dates,
the first and the last on which the certificate
is valid.
Subject name: The name of the user who
holds the private key corresponding to the
contained public key.
Public key info: The public key itself together
with information about the algorithm in use.
Issuer identifier: Optional identifier for the
issuer.
Subject identifier: Optional identifier for the
subject.
Extensions: Added in version 3 and contains a
list of extension fields.
Signature: Covers all other fields of the
certificate and contains the hash digest
encrypted with the signer’s private key.

25
Q

What institutions are involved in the certification process?

A

> Certificate authority (CA): Provides the CA
certificate and signs CSR issued by the
subjects.
Registration authority (RA): Validates the
information provided by the subject and
approves the CSR before it is signed by a CA.
Validation authority (VA): Offers validation
of certificates either by OCSP or CRL.

26
Q

How does ARP work? And how is it spoofed?

A
  1. A wants to send a frame to D
  2. A sents an ARP request (boradcast) containing D’s IP address
  3. All recieving devices update their tables
  4. D send ARP reply (unicast) to A
27
Q

How can encryption keys be exchanged between two parties?

A

1 One party can physically deliver the key on a USB stick to the other
2 A thrid party generates a key and delivers it to both parties.
3 Transmit a new key over an established encrypted transmission path.
4 Use of asymmetric encryption for symmentric key exchange.

28
Q

How can data in motion be encrypted?

A

Transport encryption
End-To-End encryption

29
Q

What is TLS?

A

Successor of the Internet standard Secure Socket Layer SSL

> SSL architecture operates on two layers
The upper layer serves several functions:
Handshake, Change Ciper Spec, Alert Protocol, and
Application Data Protocol
The lower layer handles the security of the communication:
Record Protocol

30
Q

Describe the TLS 1.2 handshake

A

Phase 1: Establish security capabilities, including protocol version , session ID, cipher suite, compression methods, and initial random numbers
Phase 2: Server may send certificate, key exchange, and request certificate. Server signals end of hello message phase.
Phase 3: Client sends certificate if requested. Client sends key exchange. Client may send certificate verification.
Phase 4: Change cipher suite and finish handshake protocol.

31
Q

Describe the client_hello

A

> Version: Highest version supported by the client
Random: Nonce to prevent against replay
attacks
Session ID: If nonzero the client wishes to
update a session or create a new connection
within one session. If zero a new session is
created.
CipherSuite: List of supported cipher suites in
decreasing order of preference
(e.g. TLS_RSA_WITH_AES_128_CBC_SHA256)
Compression Method: List of supported
compression methods

32
Q

Describe the server_hello

A

> Ephemeral Elliptic Curve Diffie-Hellman
for key exchange (could also be RSA)
RSA for authentication (could also be
(EC)DSA)
AES128 GCM for symmetric encryption
SHA256 for message authentication hash
algorithm or MD5

33
Q

What is HTTPS? What is encrypted and not encrypted?

A

Combination of HTTP and useage of SSL/TLS as transport security

URL of the requeste document is encrypted
Contents of teh document
Contents of browser forms
Cookies

Not encrypted:
IP addresses of the endpoints and TCP ports
Amount of transmitted data

34
Q

What is a VLAN?

A

VLANs separate the network into different broadcast domains.

35
Q

What is a firewall?

A

A barrier between different network areas.

36
Q

What are firewall rules based on?

A

Source and destination IP
TLP
transport layer address port
physical interface

37
Q

What are stateful inspection firewalls?

A

Outgoing packets are tracked as connections. Incoming packets are allowed only if they match the outgoing packets in terms of sources destination address and port numbers.

38
Q

Name different firewall basing options and firewall locations

A

Bastion host: critical strong point int the network
Host-based firewall: software module to secure an individual host
Personal firewal: software module to secure a personal computer

distributed firewalls
demilitarized zone

39
Q

What information should be included in the audit log of an intrusion dedection firewall?

A

Subject: typicall a user
action: operation that is performed
object: resouce, file, progra, or whatever is accessed by the subject
exception-condition:
resouces usage
time-stamp