IT-Security (Chapter 1) Flashcards

(35 cards)

1
Q

Examples of Cyber-Physical Systems

A

Industrial Facilites
Smart Grid
Smart Transport
Smart Cities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security vs. Safety

A

Security: Protection against intentional malice
Safety: Protection against accidental threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Defintion of “Threat”

A

A threatin an IT-based system is any possible event or sequence of actions that might lead to a violation of one or more security goals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the Security Goal Acronym

A

CIAAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Security Goal 1

A

Confidentiality:

Data transmitted/stored should only be revealed to intended audience

Confidentiality of entitiesis also referred to as anonymity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Security Goal 2

A

Integrity:

It should be possible to detect any modification of data

This requires to be able to identifythe creator of some data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Security Goal 3

A

Availability:

Services should be available and function correctly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Security Goal 4

A

Accountability:

It should be possible to identify the entity responsible for any communication event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Security Goal 5

A

Controlled Access:

Only authorized entities should be able to access certain services or information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Masquerade (Threats Technically Defined)

A

An entity claims to be another entity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Eavesdropping (Threats Technically Defined)

A

An entity reads information it is not intended to read

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Authorization Violation (Threats Technically Defined)

A

An entity uses a service or resources it is not intended to use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Loss or Modification of (transmitted) information (Threats Technically Defined)

A

Data is being altered or destroyed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Denial of Communication Acts (Repudiation) (Threats Technically Defined)

A

An entity falsely denies its participation in a communication act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Forgery of information (Threats Technically Defined)

A

An entity creates new information in the name of another entity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Sabotage (Threats Technically Defined)

A

Any action that aims to reduce the availability and / or correct functioning of services or systems

17
Q

Physical Security (Safeguards Against Security Threats)

A

Locks or other physical access control

18
Q

Personnel Security (Safeguards Against Security Threats)

A

Employee screening processes

Security training and awareness

19
Q

Administrative Security (Safeguards Against Security Threats)

A

Controlling import of foreign software

20
Q

Emanations Security (Safeguards Against Security Threats)

A

Radio Frequency and other electromagnetic emanations controls

21
Q

Media Security (Safeguards Against Security Threats)

A

Scanning media for viruses

22
Q

Lifecycle Controls (Safeguards Against Security Threats)

A

Trusted system design, implementation, evaluation and endorsement

23
Q

Computer Security (Safeguards Against Security Threats)

A

Protection of the computing devices itself

24
Q

Communications Security (Safeguards Against Security Threats)

A

Protection of information during transport from one system to another

25
Security Services
``` Authentication Integrity Confidentiality Access Control Non Repudiation ```
26
Authentication (Security Service)
The most fundamental security service which ensures, that an entity has in fact the identity it claims to have
27
Integrity (Security Service)
In some kind, the “small brother” of the authentication service, as it ensures, that data created by specific entities may not be modified without detection
28
Confidentiality (Security Service)
Most popular security service, ensuring the secrecy of protected data
29
Access Control (Security Service)
Controls that each identity accesses only those services and information it is entitled to
30
Non Repudiation (Security Service)
Protects against that entities participating in a communication exchange can later falsely deny that the exchange occurred
31
Security Supporting Mechanisms
Key management: All aspects of the lifecycle of cryptographic keys Event detection / security audit trail: Detection and recording of events that might be used in order to detect attacks Intrusion detection: Analysis of recorded security data Notarization: Registration of data by trusted third party that can confirm certain properties
32
Types of cryptographic algorithms
Symmetric encryption algorithms: (DES, 3DES, AES, Twofish) Asymmetric encryption algorithms: (RSA, ElGamal) Hash functions: (MD5, SHA1, SHA2, SHA3)
33
Symmetric vs. Asymmetric
Assymetric comes with high overhead Symmetric allows higher data thoughput Assymetric for encrypting symmetric
34
Message Detection Codes (MDC)
Hash of data as fingerprint to check for modifications
35
Message Authentication Codes (MAC)
Append a secret key 𝐾 to a message 𝑚 and hash it to ℎ(𝑚|𝐾) Result is fingerprint of the message that cannot be forged as attackers do not know key K