Revision Exam Flashcards

1
Q

What is public key cryptography?

A

Relies on 2 keys, one is made public for others to use, the other remains confidential to the owner. One is used for encryption, the other decryption. As long as the private key remains confidential, the encrypted data is protected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Symmetric vs Asymmetric encryption (Pros/Cons)

A

Symmetric (same key for encryption/decryption):
• Pros:
- fast, allows for processing of large amounts of data
- easy to implement

• Cons:
- if distributed key is compromised, the encrypted data is exposed
- distribution of keys needs to be done in a secure and reliable way
- in a large system the amount of unique keys grows exponentially
- no digital signatures

Asymmetric (public/private key):
• Pros:
- public key, no need to distribute over secure channels
- if public key is exposed, connection remains secure
- supports digital signatures
- easily scalable

• Cons:
- slower performance, not suitable for large amounts of data
- users must secure their own keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How are hash functions used?

A

Hash functions transform variable size plaintext and transforms it into fixed size data blocks, it also creates a fingerprint of the plaintext.
It is used for:
- message authentication
- verifying data integrity
- password storage
- digital signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is confidentiality?

A

Systems and data are only accessible by authorised users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is integrity?

A

Systems and data are reliable and complete.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is availability?

A

Systems and data are accessible when they are needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does it mean for a system to be corrupted?

A

It’s a loss of integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does it mean for a system to become leaky?

A

It represents a loss of confidentiality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does it mean for a system to be unavailable?

A

It represents a loss of availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a passive attack?

A

It observes the use of the systems data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is an active attack?

A

It changes the content of a system and its resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an insider attack?

A

It’s an attack from a person with privileged access to the system (employee).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is an outsider attack?

A

It is an attack from a person or organisation from outside the organisation which seeks to obtain protected information by infiltrating.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a DOS attack and Flooding attack?

A

DOS attack:
Has the objective to make a system unavailable or unusable by depleting system resources (bandwidth, disk space, CPU).

Flooding attack:
Is a type of DOS attack. It sends large volumes of traffic to a system, so that it cannot examine and authorise network traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SSL and IPSec

A

SSL (Secure Socket Layer):
Used for secure web traffic and ensures data encryption between a client and a server. It secures data at the application level. It is commonly used in web browsing, email and instant messaging.

IPSec (Internet Protocol Security):
Suite of protocols used to secure data at the network layer. Used for securing communications over IP networks (VPN).
Ensures all traffic passing through a network is secured.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is risk analysis?

A

It specifies the likelihood of each individual threat to assets, given existing controls (management, operations, technical processes and procedures). It asses risk as the probability of a threat occurring times its cost to the company. The consequences are specified along with the order of risks, to more easily treat them.

17
Q

Difference between cryptanalytic and brute-force attack?

A

Cryptanalytic attack:
Relies on the nature of the algorithm and some knowledge of the general characteristics of the plaintext or sample of plaintext-ciphertext pairs.

Brute-force attack:
Tries every possible key on a piece of ciphertext until an intelligible translation into plaintext is found. On average half of all possible keys must be tried to achieve success.

18
Q

A computer virus places a copy pf itself into programs and arranges so the code executes when the program is run. The easy approach is to append itself onto the existing code, which increases the size of the program. List approaches which do not change the size of the program:

A
  1. Compression virus:
    Length would be unaffected and thus both the original and infected program would be identical in size, making it impossible to identify by size.
  2. Pointer to RAM:
    Uses a pointer to RAM location and execute the code that resides there.