Mid-term exam part 2 study Flashcards
what is the Fraud and Abuse Triangle?
3 aspects of motivation before mis-behavior occurs.
1-opportunity: without opportunity or if the attacker thinks they will get caught then they prob wont do it.
2-pressure: financial, greed, desire to perform or hide under achievements- psychology of perpetrator
3-Rationalization: convinces themselves they are good people in their own mind. may say to self ‘my employer expects too much of us’’, etc.
what is the Coso framework?
a type of security planning framework for corporations with 4 main objectives: 1- strategic: high lvl goals, 2- operations: efficient use of resources, 3- Reporting: reliability and 4- Compliance: compliance with laws.
what is the Cobi framework?
a type of IT security control planning that offers a framework as follows:
1- planning and organizing
2- acquisition and implementation (information systems)
3-delivery and support (implementation of IT security)
4- monitoring
what is plain text?
the original message (images, text, sounds ,etc) . used in cryptography
cyphertext?
the end result of encryption.
-the plain text is encrypted and turned into ‘random bits’ called Cyphertext.
Cipher?
the mathematical operation to encrypt and decrypt data.
key?
random string of ones and zeros. the cipher and key are needed to encrypt and decrypt a message.
what is Kerckhoof’s law?
states that for encryption to work: only the key needs to be kept secret not the cipher.
what is symmetric encryption?
symmetric encryption: single key is used for encryption and decryption in both directions. keys must be shard ahead of transmissions securely.
what is Asymmetric encryption?
also called public key encryption: 2 keys are used, one is private and one is public. the public key is used to encapsulate the message and each user has their own private key used to decrypt messages.
what is exhaustive search and how is it mitigated?
exhaustive search: brute force: try every key until password is cracked. the longer the key the harder and longer it takes to crack. each additional bit used in the key doubles the time it will take to crack the key. 100 bits req. today
what number of bits in a key do some countries require so the authorities can crack it?
40 bits or less.
what is exhaustive search?
brute forcing a password.
out of the 4 following types of encryption, which type is viable/ secure today? RC4 DES 3DES AES
AES
what are RC4 encryption strengths and weaknesses?
RC4 is extremely fast and uses little Ram- makes attractive for low end mobile devices. encryption of 40 bits or more. very weak and is easy to crack.