Lesson 3 Flashcards
__________ is related to scientific methods of identifying the authors of a crime by examining objects or substances involved in the crime.
Forensic analysis
In the context of cybersecurity, it is related to the explanation of a cybercrime, based on the analysis of information or traces led by the attacker in the computing systems used or attacked.
Forensic analysis
Forensic analysis aims to explain the state of a computing system by extracting information and using it to reconstruct the series of actions undertaken by the attacker.
Forensic analysis
True or false:
Providers (ISPs) in order to both collect connection information from specific previously-identified targets in real time, and to analyze connection information of ISP subscribers in order to identify potential suspects via an automatic process (whose details are not publicly known).
True
The term “__________” has been given to practices where governments or governmental organizations perform surveillance and data collection at a national scale (or larger). This is opposed to “___________”, which targets an individual of (supposed) interest.
mass dataveillance; personal dataveillance
______ against the hardware are a real threat, even for implementations of algorithms that have been mathematically proven secure.
Physical attacks
________ and _______ are two common classes of attacks that require a physical access to the device.
Attacks by observation; attacks by perturbation
Nowadays, a serious but unfortunately possible attack scenario is a _______ triggered by a JavaScript application embedded in a web page.
hardware attack
Physical attacks can be classified as ________, _________ and a new field known as _________. The first two assume the insider attacker model i.e., the device is under the attacker’s control, while the last one assumes the outsider model. The outsider model requires fewer hypotheses for the attacker and thus can be considered as more dangerous.
observation attacks
perturbation attacks
hardware-targeted software attacks
__________ are physical attacks based on the observation of the circuit behavior during a computation. They exploit the fact that some physical quantities depend on intermediary values of the computation in the device. This is the so-called _________.
Side-channel analysis (SCA);
information leakage.
The most classic leakages are _________, _________, and ______.
timing
power consumption
electromagnetic emissions (EM)
DES stands for?
Data Encryption Standard (DES)
AES stands for?
Advanced Encryption Standard (AES)
ECC stands for?
Elliptic Curve Cryptography (ECC)
_________ are now a well-known class of physical attacks where a device undergoes a modification of physical parameters in order to obtain an incorrect behavior. Most classical fault injection means are power glitches, clock glitches, laser pulses, and electromagnetic pulses.
Fault attacks