Security Flashcards
1
Q
(5 answers)
What are the different types of system attackers?
A
-
Hackers
- Keystroke logging, password harvesting, identity theft, etc.
-
Click fraud
- Pay-per-click charges to online advertisements that are generated fraudulently
-
Bulk-mailers
- Spam, phishing
-
Employees, system users, members of the public
- Through deliberate or unintended misuse
-
Extortion
- The suggestion that confidential data will be exposed
2
Q
(4 answers)
What are the different types of threats to systems?
A
-
Interruption
- Asset is unusable or unavailable when required (Denial of Service)
-
Interception
- Unauthorised party has gained some access to an asset
-
Modification
- Interception with alteration to an asset
-
Fabrication
- Creation of an unauthorised new object in the system
3
Q
(6 answers)
What are the different security services required by enterprise systems?
A
-
Confidentiality
- Assets are only accessible to authorised users
-
Integrity
- Malicious or accidental alteration of data is detected
-
Non-repudiation
- Users must be accountable for their actions (non-deniability)
-
Auditing
- A secure record of security-related events for the purpose of non-repudiation and recovery is captured
-
Authentication
- Users can be identified and actions are correctly associated with individuals
-
Authorisation
- Determines what a user or program is allowed to do
4
Q
(7 answers)
What are the different security policies an system administrator should employ?
A
- Passwords are changed regularly and are a certain length and complexity
- User accounts have no more privileges than required
- Regular cycle of system backups
- Enforce update/patch cycles
- Deploy virus protection and anti-spyware systems
- Install and configure a firewall
- Have users sign statements of legitimate use of computer resources
5
Q
What types of security measures can be taken to improve system security?
A
- Cryptography
- Ciphers
- Caesar
- Rail-fence
- Block
- Stream
- Symmetric cryptography
- Public key cryptography
- Hash functions
- Ciphers
- Protocols and networking:
- IPv6
- SSL
- Firewalls