Security Flashcards

1
Q

Strategies to reduce risk of data confidentiality

A

Provider ensured data fully destroyed

Multiple encryption keys

Logical isolation of multiple customers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Federated identity management

A

Arrangement between two or more trust domains

Use same digital idenity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Security risks of user identity federation

A

Less control over use lifecycle

Single point of failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

____ Identity Server can act as a hub that connects multiple identity providers to authenticate users to a particular service provider

A

WSO2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The Google ____ 2.0 system supports server-to-server interactions such
as those between a web application and a Google service

A

0Auth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Difference between WSO2 and 0Auth

A

0Auth supports server to server interactions

WSO2 acts as a hub, “more frontend”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

RACI stands for

A

Responsible Accountable Consulted Informed Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Bussiness COntinuty

A

Activity performed to ensure bussiness continues in case of disaster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is it important contracts define froma bussienss continuity and resilience perspective

A

Recovery time

Objects

Monetary Penalty if downtime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

BS 259999

A

Now ISO 22301

International Standard for implementing and maintaining effective business continuity plans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Usage of data consideration

A
  • Personal died used without consent
  • Data sent across borders
  • No opt out features
  • Lack of individual control
  • Local law
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What can be done to data to make it be used for more general purposes?

A

De-identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Risks of multi-tenancy if managed uncorrectly

A
  • Inadequate local seperation
  • Co-mingled tenant data
  • Uncoordinated change controls
  • Performance risks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Visually descriobe a multi-tenant application

A

Ref img

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Multi-tennacy - keys

A

Per Tenant Key management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is important to manage risk

A

Third Party Assessments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

In the event of a security incident, applications and services hosted at a Cloud provider are

A

difficul to investgate

distributed logging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Infrastructure Security Architecture- Cloud

A

Tiered zones

Only allow required access in each zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Examples of third party audit lifecycle

A

Vulnerability identification

Results Analysis

Risk Assessment

Redmediation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Improving security of network and apps is referred to as

A

Hardening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Are non-prod enviroments immune to exposure?

A

No - even more at risk due to
generic authentication crdes
security flaws
then PIVOTING into production

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Use cloud for secret app?

A

no

23
Q

Security MEtric

A

Measurable value - how well company doing to reduce cyber security risks

24
Q

Types of security metrics

A

Process
Network
Software

25
Q

What do process security metrics usually refer to?

A

Measure processes and procedures
Compliance/Governance driven
Generally support better security
Actual impact hard to define

26
Q

What type of security metric would be associated with the following:
No. of policy violations
% of systems with formal risk assessments
% of system with tested security controls
% of weak passwords
No. of identified risks and their severity
% of systems with contingency plans

A

Process Security Metric

27
Q

Network Security Metric - common features

A
  • Driven by products
  • Readily available
  • Widely used
  • Gives sense of control
28
Q

Examples of network security metrics

A
  • Succesfull/unsucceful logs
  • No of incidents
  • No of cirus blocked
  • No of virus inections
  • No of port probes
  • Traffic analysis
29
Q

What type of security metric is associated with the following:
Successful/unsuccessful logons
No. of incidents
No. of viruses blocked
No. of patches applied
No. of spam blocked
No. of virus infections

A

Network Security Metric

30
Q

Charateristics of software security metric

A

Complex

Context sENSITIVE

eNVIROMENT dEPENDENT

31
Q

Levels of software seucrity metric

A

System Level
Design level
Code level

32
Q

Follow are examples of what security metric?
Size and complexity Defects over time Cost per defect Layers of security Design Flaws

A

Software Security Metric

33
Q

Threat Modelling to do with

A

Explore vulnerabiles, threats and create strategies for these

34
Q

Who released Bitcoin

A

Pen name Satoshi Nakamoto 2008

35
Q

What type of blockchain is bitcoin

A

Distributed ledger

36
Q

Three parts of a chain in a blockchain

A

Data
Hash
Previous Hash

37
Q

What ensures the integrity of a proof of work blockchain?

A

The number of blocks in chain - to change one piece of data would require to rehash the entire change, impossible

38
Q

Explain how a blockchain links up

A

Ref to img

39
Q

Different blockchain consensus mechanism

A

Proof of Work
Proof of Stake

40
Q

Disadvantages of proof of work

A

Lack of speed
Poor Scalability
Inefficient Energy COnsumption

41
Q

What consensus mechanism does Ethereum use

A

Proof of stake

42
Q

Role of validators in Proof of Stake chain

A

no energy-intensive computational process to earn the right to validate. Instead of working to solve proofs of work, validators “stake” some of the blockchain’s native tokens to become eligible for selection as a validator node. The prospective validator will essentially stake crypto tokens native to the blockchain to serve as collateral.

43
Q

Distributed LEdger TEchnology (DLT) is often associated with what type of blochain

A

Consortium / Private blockchain

44
Q

Is hashing alone enough to secure a block chain? If not, what else is used?>

A

No
*Consensus Mechanism
*Distributed peer-to-peer network

45
Q

Proof of work conesus mechanism

A

achieving agreement on Blockchain network to confirm transactions and addnew blocks to the chain

solve mathematical problem

46
Q

How does adding proof of work increase bitcoin security?

A

Takes alot of time to recalculate each block

47
Q

Centralized, Decentralized and Distributed Difference

A

Ref img

48
Q

To succefully tamper with a proof of work blockchain you would have to

A

Temper with all blocks

Redo proof of work for each block

Take control of > 50% of peer-peer network to generate consensur

49
Q

How can blochcain support confidentiality

A

encrypt block data

50
Q

Future component of blocbhain

A

*Smart Contract - Get rid of need for intermedieries
*Blockbhain Cloud Storage
*IoT BLockchain

51
Q

Smart Contract Use Cases

A
  • Supply chain
  • REal estate
  • Insurnace
  • Personal Identity
52
Q

Describe Blockchain Cloud Storage

A
  1. Shard data
  2. Encrypt shards
  3. Distributed shards across nodes with synched ledger
  4. Record transactions on blockhain ledger
53
Q

What is this an example of?

A

Smart Contracts in a supply chain

Each level validated it has received product and performed their respective process