Security Flashcards
the same shared key was used to both encrypt and decrypt the message; faster but we have the key distribution problem - how do 2 parties agree on and share a key if they have never interacted before
symmetric encryption
two mathematically related keys are used; one is a public key that can be shared with everyone and another is a private key that is always kept secret; is slower, but can help with the key distribution problem
public-key encryption
function that maps input of any size to an output of fixed size
hash function
a hash function combined with someone’s private key can used to create a _________________
digital signature
issued by a certificate authority (CA) - there are only a few trusted organizations around the world; can be used to prove that your public key actually belongs to you
digital certificate
when hackers use psychology to trick people into divulging confidential information
social engineering
4 types of malware
virus, worm, trojan horse, ransomware
can insert itself into the code of other computer programs and copy itself throughout the computer and the network when the infected programs run
virus
is similar to a virus, but it does not need to be attached to another program, and can copy itself without any human help
worm
software that appears to be harmless, but actually does something unexpected and malicious behind the scenes. The user has to launce it, and cannot replicate on its own
trojan horse
software that will either threaten to publish or prevent the victim from accessing their files unless a ransom is paid. Usually this will be some cryptocurrency so it cannot be traced to the person they paid
ransomware
5 other techniques than malware
phishing, spam, botnet, denial of service attack, sniffing
use deceptive emails or text messages to social engineer users into revealing sensitive information. Often they will pretend to come form a trusted authority and will ask for confidential information
phishing
unsolicited junk mail
spam
collection of computers (usually infected ones) that are used together for a common purpose
botnet
involves many computers overwhelming a website by requesting a service in an attempt to block others from accessing the website
denial of service attack
eavesdropping on network communication to obtain sensitive information like passwords, emails, company files, etc.
sniffing
the ____, ____, and ____ that are used to prevent unauthorized access, alteration, theft, interruption, or physical damage of information systems
policies, procedures, technical measures
are rules and expectations
policies
are the step-by-step guides in place
procedures
are controls to enforce such policies/procedures and to further safeguard information systems
technical measures
6 types of security services
authentication, access control, data confidentiality, data integrity, availability, non-repudiation
assurance that the other party is who they say they are
authentication
prevention of unauthorized use of a resource
access control
protection of data from unauthorized disclosure
data confidentiality
assurance that services are available when needed
availability
protection against denial by one of the parties in a communication
non-repudiation
wireless security authentication methods
WPS, PSK, EAP
very simple measures in place, like pushing the button on your router to join the network
WPS (wifi protected setup)
you enter a passphrase to join the network
PSK (pre-shared key)
may need to login with a username and password
EAP (Extensible Authentication Protocol) method
wireless security protocols
WEP, WPA, WPA2, WPA3
can be easily cracked
WEP (Wired Equivalent Privacy)
temporarily replacement for WEP
WPA (WIreless Protected Access)
very secure, used be eduroam
WPA2
newest, introduced in 2018. Even more secure, expected to become more common as it’s adopted
WPA3
determing points of vulnerability, level of risk, and potential damage if it were to happen
risk assessment
identifies main security risks, acceptable security goals, and mechanisms to achieve these goals
security policy
states acceptable uses and users of information and computers; establishes things like privacy, user responsibility, personal use of devices, access rules for different employees
acceptable use policy
focused on getting the IT systems up and running after a disruption, like restoring backup files, maintaining backup systems, reconfiguring servers etc.
disaster recovery planning
focused on getting the business up and running after a disruption. Not just focused in machines, but people too, like coming up with measures to operate after closures due to the pandemic, returning to the office after an evacuation, etc.
business continuity planning
investigates if the current security and control framework is adequate; involves a comprehensive assessment of a company’s computer security polices, procedures, and technical measures, personnel, training, and documentation
security audit