Prelim Flashcards

1
Q

What is E-commerce?

A

Any transaction online, including online banking, software services, remote service providers, or online course platforms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the key specifications of Real-world Security?

A
  • Specifications/policy : What is the system supposed to do
  • Implementation mechanism : How does it do it?
  • Correctness/assurance : Does it really work?
  • Human Nature : Can the system survive “clever users”?
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What you might want in a software?

A

*Privacy
*Protection against phishing, vishing
*Integrity
*Authentication
*Authorization
*Confidentiality
*Non-repudiation
*Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

It is the protection against unauthorized modification or destruction of information.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ensures that information is not disclosed to unauthorized persons.

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The process of verifying the identity of a user, message, or originator.

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Provides proof of data delivery and sender identity, so that neither party can later deny having processed the information.

A

Non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

It is the guarantee of timely, reliable access to data and information services for authorized users.

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does Availability refer to in information security?

A

Timely, reliable access to data and information services for authorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define Integrity in the context of information security.

A

Protection against unauthorized modification or destruction of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Confidentiality in information security?

A

Assurance that information is not disclosed to unauthorized persons.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Authentication?

A

Security measures to establish the validity of a transmission, message, or originator.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does Non-repudiation mean?

A

Assurance that the sender has proof of data delivery and the recipient has proof of the sender’s identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the types of assets in information security?

A
  • Physical assets: Devices, computers, people
  • Logical assets: Information, data, intellectual property
  • System Assets: Software, hardware, data, personnel resources
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is an attack in the context of information security?

A

An attempt to gain access, cause damage to, or otherwise compromise information and/or systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a Passive attack?

A

An attack in which the attacker observes interaction with the system but does not directly interact with the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Define an Active attack.

A

An attack in which the attacker directly interacts with the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is an Unintentional attack?

A

An attack where there is no deliberate goal of misuse.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is Exposure in information security?

A

An instance when the system is vulnerable to attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Characteristics of information to be useful

A

Accurate
Timely
Complete
Verifiable
Consistent
Available

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Aspects of Information Needing protection

A

Availability
Confidentiality
Authentication
Non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

is the resource being protected

A

Assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Physical assets

A

devices, computers, people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Logical assets

A

information, data (in transmission, storage, or processing), and intellectual property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

System assets

A

any software, hardware, data, administrative, physical, communications, or personnel resource within an information system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What does Compromise refer to?

A

A situation in which the attack has succeeded.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is a consequence of an attack?

A

The outcome of an attack, which may include disruption, corruption, or exploitation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is meant by Disruption in the context of consequences?

A

Targets availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is meant by Corruption in the context of consequences?

A

Targets integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is meant by Exploitation in the context of consequences?

A

Targets confidentiality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

is a type of consequence, involving accidental exposure of information to an agent not authorized access.

A

Inadvertent disclosure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Taxonomy of attacks with relation to security goals

A

Threat to Confidentiality
Threat to integrity
Threat to availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Taxonomy of attacks with relation to security goals

Threat to Confidentiality

A

Snooping
Traffic analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Taxonomy of attacks with relation to security goals

Threat to integrity

A

Modification
Masquerading
Replaying
Repudiation

35
Q

Taxonomy of attacks with relation to security goals

Threat to availability

A

Denial of service

36
Q

What is the definition of Authentication?

A

The process of recognizing a user’s identity.

37
Q

What is Authorization?

A

The process that determines what a user is able to do and see on a website.

38
Q

What is Malware?

A

Malicious software designed to disrupt, damage, or gain unauthorized access to systems.

39
Q

Malware Prevention Methods

A

Regular Software Updates
Antivirus Software
Network Segmentation
Educate Users

40
Q

Malware Prevention Tools and Strategies

A

Patch Management Systems
Endpoint Detection and Response (EDR)
Regular Backups
Network Segmentation

41
Q

List examples of Malware.

A
  • Viruses
  • Worms
  • Ransomware
  • Trojans
  • Spyware
  • Adware
42
Q

What is Phishing?

A

Tricking individuals into providing sensitive information by pretending to be a trusted entity.

43
Q

What are common forms of Phishing?

A
  • Emails
  • Fake websites
  • SMS (‘smishing’)
  • Voice calls (‘vishing’)
44
Q

Phishing Prevention Tools and Strategies

A

1 . Email Security Gateways
2 . Phishing Simulations
3 . Zero Trust Access
4 . Threat Intelligence Feeds

45
Q

Social Engineering Prevention Methods

A

Strict Access Control
Verify Requests
Awareness Programs
Incident Reporting

46
Q

Software Vulnerabilities

A

Flaws or weaknesses in code that attackers can exploit to compromise systems, steal data, or gain unauthorized access

47
Q

Hardware Vulnerabilities

A

Weaknesses in network protocols, configurations, or infrastructure that can lead to unauthorized access or data interception

48
Q

Common Vulnerabilities

A
  • Weak or Default Credentials
  • Man-in-the-Middle (MITM) Attacks
  • Unsecured Network Devices
  • Denial of Service (DoS) and Distributed Denial of Service (DDos Attacks:
  • Outdated or Insecure Protocols
49
Q

What is Social Engineering?

A

Exploiting human psychology to manipulate individuals into divulging confidential information.

50
Q

What are examples of Social Engineering?

A
  • Pretexting
  • Baiting
  • Tailgating
  • Quid pro quo attacks
51
Q

What are Denial of Services (DoS) Attacks?

A

Overloading systems or networks to make them unavailable to legitimate users.

52
Q

What are Man in the Middle (MITM) Attacks?

A

Intercepting communication between two parties to eavesdrop or alter data.

53
Q

What are Password Attacks?

A

Cracking or stealing passwords through brute force, dictionary attacks, or keylogging.

54
Q

What are Zero Day Exploits?

A

Exploiting software vulnerabilities before the vendor releases a patch.

55
Q

Define Cryptology.

A

The process of making and using codes to secure the transmission of information.

56
Q

Where did the word Cryptology came from?

A

Greek words Kryptos and Grahein
“Kryptos” means hidden
“Grahein” means to write

57
Q

Code Breaking

A

Cryptanalysis

58
Q

Code designing

A

Cryptography

59
Q

What does Cryptanalysis refer to?

A

The process of obtaining the original message from the encrypted message.

60
Q

What is cryptography?

A

The practice and study of encryption to prevent unauthorized reading of information.

61
Q

What does a cryptographic system typically include?

A
  • Private key cipher
  • Message integrity techniques
  • Secure identification/authentication techniques
62
Q

What is a Private Key cipher?

A

A cipher where the secret key is shared between two parties.

63
Q

What is a Public Key cipher?

A

A cipher where the secret key is not shared, allowing communication using public keys.

64
Q

What is the operation principle of the Caesar Cipher?

A

Each letter is translated into the letter a fixed number of positions after the letter in the alphabet.

65
Q

What is a Block Cipher?

A
  • Are stronger but slower and often implemented in hardware
  • One or large block at a time
  • Substitution and transposition
66
Q

What is the Electronic Codebook (ECB) mode?

A

Each block is encrypted with the same key—identical plaintext block created identical cipher block

Simplest Encryption mode

67
Q

What is Cipher Block Chaining (CBC)?

A

Each plaintext block is XORed with the previous ciphertext block, adding randomization.

68
Q

What is the Counter (CTR) mode?

A

Encrypting using the value of a counter. Plaintext can be any size - XOR 8 bits at a time instead of 128 bit block

Acts like a stream cipher

69
Q

What is a Stream Cipher?

A
  • Are fast and easy to implement in hardware
  • Encryption is performed 1 bit or 1 byte at a time
  • Mixes plaintext with key stream
  • Either using Symmetric Key or Public Key
  • The starting state should never be the same twice — uses initialization vector
70
Q

What is Symmetric cipher?

A

involves using a single key to encrypt and decrypt data

71
Q

What is Asymmetric Cipher?

A

encryption uses two keys - one public and one private - to encrypt and decrypt data

72
Q

What is an assumption in information security?

A

It can help find underlying vulnerabilities.

73
Q

Digest

A

can be used to check the integrity of a message: that the message has not been changed

74
Q

Substitution cipher

A

replaces one symbol with another

75
Q

Plaintext

A
  • A message in its natural format readable by an attacker
  • Original message or data (also called cleartext
76
Q

Ciphertext

A

Message altered to be unreadable by anyone except the intended recipients

77
Q

Encryption

A

Transforming the plaintext under the control of the key

78
Q

Key

A

Sequence that controls the operation and behavior of the cryptographic algorithm

79
Q

Decryption

A

Transforming the ciphertext back to the original plaintext

80
Q

Types of Cryptography

A

Stream Ciphers
Block Ciphers

81
Q

Confusion

A

Key to ciphertext relationship is very complicated
Key cannot be determined on the ciphertext

82
Q

Diffusion

A

Output should be different from the input
Change 1 bit of the input, at least 50% of the output should change

83
Q

Block Cipher Mode Operations

A
  1. Electronic Codebook (ECB)
  2. Cipher Block Chaining (CBC)
  3. Counter (CTR)