IT-Security (Chapter 1) Flashcards

1
Q

Examples of Cyber-Physical Systems

A

Industrial Facilites
Smart Grid
Smart Transport
Smart Cities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security vs. Safety

A

Security: Protection against intentional malice
Safety: Protection against accidental threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Defintion of “Threat”

A

A threatin an IT-based system is any possible event or sequence of actions that might lead to a violation of one or more security goals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the Security Goal Acronym

A

CIAAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Security Goal 1

A

Confidentiality:

Data transmitted/stored should only be revealed to intended audience

Confidentiality of entitiesis also referred to as anonymity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Security Goal 2

A

Integrity:

It should be possible to detect any modification of data

This requires to be able to identifythe creator of some data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Security Goal 3

A

Availability:

Services should be available and function correctly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Security Goal 4

A

Accountability:

It should be possible to identify the entity responsible for any communication event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Security Goal 5

A

Controlled Access:

Only authorized entities should be able to access certain services or information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Masquerade (Threats Technically Defined)

A

An entity claims to be another entity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Eavesdropping (Threats Technically Defined)

A

An entity reads information it is not intended to read

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Authorization Violation (Threats Technically Defined)

A

An entity uses a service or resources it is not intended to use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Loss or Modification of (transmitted) information (Threats Technically Defined)

A

Data is being altered or destroyed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Denial of Communication Acts (Repudiation) (Threats Technically Defined)

A

An entity falsely denies its participation in a communication act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Forgery of information (Threats Technically Defined)

A

An entity creates new information in the name of another entity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Sabotage (Threats Technically Defined)

A

Any action that aims to reduce the availability and / or correct functioning of services or systems

17
Q

Physical Security (Safeguards Against Security Threats)

A

Locks or other physical access control

18
Q

Personnel Security (Safeguards Against Security Threats)

A

Employee screening processes

Security training and awareness

19
Q

Administrative Security (Safeguards Against Security Threats)

A

Controlling import of foreign software

20
Q

Emanations Security (Safeguards Against Security Threats)

A

Radio Frequency and other electromagnetic emanations controls

21
Q

Media Security (Safeguards Against Security Threats)

A

Scanning media for viruses

22
Q

Lifecycle Controls (Safeguards Against Security Threats)

A

Trusted system design, implementation, evaluation and endorsement

23
Q

Computer Security (Safeguards Against Security Threats)

A

Protection of the computing devices itself

24
Q

Communications Security (Safeguards Against Security Threats)

A

Protection of information during transport from one system to another

25
Q

Security Services

A
Authentication
Integrity
Confidentiality
Access Control
Non Repudiation
26
Q

Authentication (Security Service)

A

The most fundamental security service which ensures, that an entity has in fact the identity it claims to have

27
Q

Integrity (Security Service)

A

In some kind, the “small brother” of the authentication service, as it ensures, that data created by specific entities may not be modified without detection

28
Q

Confidentiality (Security Service)

A

Most popular security service, ensuring the secrecy of protected data

29
Q

Access Control (Security Service)

A

Controls that each identity accesses only those services and information it is entitled to

30
Q

Non Repudiation (Security Service)

A

Protects against that entities participating in a communication exchange can later falsely deny that the exchange occurred

31
Q

Security Supporting Mechanisms

A

Key management: All aspects of the lifecycle of cryptographic keys

Event detection / security audit trail: Detection and recording of events that might be used in order to detect attacks

Intrusion detection: Analysis of recorded security data

Notarization: Registration of data by trusted third party that can confirm certain properties

32
Q

Types of cryptographic algorithms

A

Symmetric encryption algorithms: (DES, 3DES, AES, Twofish)
Asymmetric encryption algorithms: (RSA, ElGamal)
Hash functions: (MD5, SHA1, SHA2, SHA3)

33
Q

Symmetric vs. Asymmetric

A

Assymetric comes with high overhead
Symmetric allows higher data thoughput
Assymetric for encrypting symmetric

34
Q

Message Detection Codes (MDC)

A

Hash of data as fingerprint to check for modifications

35
Q

Message Authentication Codes (MAC)

A

Append a secret key 𝐾 to a message 𝑚 and hash it to ℎ(𝑚|𝐾)

Result is fingerprint of the message that cannot be forged as attackers do not know key K