Midterm Exam Study Flashcards

1
Q

If a key is 43 bits long, how much longer will it take to crack it by exhaustive search if it is extended to 50 bits?

A

128 times as long

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

If a key is 47 bits long, how much longer will it take to crack it by exhaustive search if it is extended to 50 bits?

A

8 times as long

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

If a key is 42 bits long, how much longer will it take to crack it by exhaustive search if it is extended to 50 bits?
**how did you calculate this?

A

256 times as long
–multiply each successive bit added to the length by a factor of 2. so 42 bits extended to 50 bits is a total of 8 bits extended on. so 2 x 1 = 2 (two times as hard) then multiply this answer by 2 for the next successive bit so… =2 (x) 2 = 4… 4x(the next successive bit = 2) = 8… 8x2=16, 16x2=32, 32 x 2 = 64, 64x2= 128 , 128 x 2 (the last successive bit) = 256. so 256 as long!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is the CIA triangle?

A

CIA= C -Confidentiality, I- Integrity, A - Availability.
*Data is only seen by those that need to see it and best practices to protect private data, info can’t be changed or destroyed and those that need access to info have it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what are the 3 types of countermeasures to thwart compromises?

A

Preventative, Detective and Corrective: the prevention keep attacks from occurring, detective: detection of attacks and fast detection = minimal damage, Corrective: get the corporation back on track.
**safe guards, protection and controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is SQL injection? describe..

A

SQL injection: sending modified SQL programming statements (and/or) to web applications/ servers. modifies a database. easy to execute commands.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What kind of threats are there by employees?

A

attacks on own company network out of spite, anger, extortion, to make $, etc.
examples: Logic bomb, steal trade secrets (non proprietary), sell info or IT security or data deleted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

how do Worms spread?

A

Direct Propagation Worms: take advantage of/ detect security flaws in computers and moves from one pc to the next without the user doing anything at all. this allows to worm to move quickly throughout a network and even the WEB as a whole. each infected computer becomes a base where the worm can infect other computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what are blended threats?

A

programs placed on websites as downloadable but are in-fact hidden viruses with worms embedded or the viruses create vulnerability allowing the worm/future attacks to do damage. *often the virus contains a Pay-load. sometimes the payload is a Trojan or root kit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Trojan horses and Root kits are what?

A

Trojan horses: pretend to be a legit program but are in-fact damaging once installed. sometimes are remote access software.
Root Kits: software that takes administrative control and then hides from the administrative detecting techniques in root system files(i think?).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

2 types of Trojan horses are?

A

Down-loaders: small programs enable larger Trojan horses to download.
*RAT: Remote Access Trojans: allow computer to be accessed and used remotely for malicious reasons.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is spyware?

A

software that gathers personal info, cookies, keystrokes and data mining.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is spam, hoaxing / phishing?

A

emails sent to trick users into giving away personal info, download attachments or open emails with code hidden in photos/ images. often used to use-up bandwidth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

how do attackers get info about a network:?

A

Reconnaissance is done to gather info: programs used to scan for ip addresses used on the network, ip addresses are then scanned with port scanning software to determine which ports are open, used and the OS being used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

once attackers have info about a network (ports, OS used, etc.) how do they use this info?

A

certain applications use certain ports like HTTP = port 80 so attackers can use attacks against HTTP that are known.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is a DDOS?

A

Distributed Denial Of Service attack: a(hacker) controls 100’s of bots/ zombie computers. the bots then do a denial of service attack onto a target computer. (example= flood with Transmission Control Protocol connection opening requests, once resources used up server crashes.)

17
Q

what is plan protect respond?

A

plan is created to respond to attacks, protect has countermeasures in place and response is built so that if an attack occurs then it is quickly found and fixed.

18
Q

steps of developing a security plan?

A

plans must include all resources and classified based on sensitivity to attack and importance to business, identify security gaps, remediation plans or gaps, focus on biggest security risk pay offs once fixed first.

19
Q

what is the: Sarbanes-Oxley act?

A

companies are required by law to report any material control deficiencies in their financial reporting process. this means if there is a significant likely-hood that there will be errors in book keeping then it must be reported or the stock can lose value or the CFO can lose job. chief financial officer.

20
Q

name some privacy protection laws and explain them:

A

HIPPA: private health care info, Gramm leach: protection for personal financial info, EU Data protection: commercial data protection in Europe.

21
Q

what is PCI-DSS?

A

Payment Card Industry - Data Security Standard: credit card accepting companies for payment must follow the PCI-DSS standards to protect customers credit card data.

22
Q

what is FISMA?

A

Federal Information Security Act: mandated yearly audits of any and all servers that store federal/gov. information. this can also include contracted services.

23
Q

what are the 2 stages of the FISMA?

A

the 2 stages of the federal information security act:
1- Certification: certified by itself or from an outside org.
2- ATO: Authorization To Operate: is given by an official if a higher level beyond certification of security is needed. this is done after the official reviews the certification security practices of the said device.

24
Q

CSO? what is its role?

A

Chief Security Officer: head of the IT security department.

25
Q

CIO:

A

Chief Information Officer.
**held accountable for security breaches and often IT
security is under this person.

26
Q

describe Risk Analysis

A

formula that compares probable losses with security protections, how countermeasures will alter losses, do countermeasures produce benefits that exceed costs?
-loss expectancy, probability of occurrence and costs of countermeasures. *hard to use in real life

27
Q

how do companies respond to risk?

A

risk reduction: implement security.

  • acceptance: if security costs more than data lost
  • insurance: pay mo. fee for someone to cover your losses
  • avoidance: if a merger with another company or some other business thing is considered then not doing it because it makes the company too vulnerable to attack.
28
Q

what is policy? give examples:

A

statements/plans of what SHOULD be done under specific circumstances NOT how it should be done.
provides direction, allows best implementation at any time.
**
Example: policy: all new employees must have a background check.
-implementors decide on the type/option of background check services and pick the one that matches the company policy, they don’t get hung up on details b/c the policy lays out what is required.
_guidelines for fingerprints in one example: some kitchen staff have unreadable fingerprints for machines and are given a code instead.

29
Q

diff. between Standards and Guidelines for implementors that implement policies.

A

standards are rules that must be followed, no interpretation takes place. guidelines are recommendations or allow flexibility in decisions.

30
Q

request/ authorization control?

A

person that makes request can never be the one who authorizes that request.

31
Q

what are Baselines?

A

describe the details of what is to be achieved without specifically describing how to do them. so may tell staff to apply passwords but wont tell them how to do this.

32
Q

recommended practices are what?

A

prescriptive practices gives to companies by gov. or other organizations.

33
Q

what is Promulgation?

A

formally announcing/ making users aware of new policies.

34
Q

how/why is monitoring done in a network?

A

to protect the network from abuse from employees. all employees should be told they are monitored and why.

35
Q

Auditing is what?

A

controls of financial processes health is being reviewed. not used to punish organizations but instead looks at samples of financial data to see if accurate, to come up with overall health of financial controls.