Security Flashcards

1
Q

Why is it important?

A

Clients expect it

Service providers require risks to be handled with care

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Confidentiality attacks

A

Interception of data
Make sure info transmitted is only visible to authorised parties
Encrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Integrity attacks

A

Data is changed
Digital signatures
Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Authenticity attacks

A
Can't replay old messages
Impersonation
Unsecured URLs
Counterfeit objects put into system
Web spoofing - webpage that looks exactly the same as another webpage (two factor authentication as solution) 
Encryption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is web spoofing?

A

webpage that looks exactly the same as another webpage

Type of authenticity attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Availability attacks

A
Cutting communication lines
Destroying servers
Interrupting data
Disable file management system
Denial of service attacks
Governments block
(eg. DOS attacks)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a solution to web spoofing?

A

Two factor authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Explain TFA

A

Two factor authentication. Uses username and password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Top 10 Security Threats according to OWASP

A

1) SQL injection: instead of typing in name of user, user types in SQL command
2) Broken Authentication and Session Management: if using public computer and you close tab, you should not remain logged in
3) XSS: Cross Site Scripting is when malicious scripts are injected into sites
4) Insecure Direct Object References:
5) Security Misconfiguration
6) Sensitive Data Exposure
7) Missing Function Level Access Control
8) Cross Site Request Forgery (CSRF)
9) Using Components with Known Vulnerabilities
10) Unvalidated Redirects and Forwards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What types of XSS exist?

A

Persistent and Non Persistent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the idea of risk management?

A

Identifying things that can go wrong with projects. These must be documented, identified and reviewed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What types of risks exist?

A

Client
Schedule
Technology
Operational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the risk management approach?

A
Identify
Assess
Document
Monitor and review
Repeat
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a client risk?

A

Client does something silly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a schedule risk?

A

This is related to project management - running out of time or poor planing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a technology risk?

A

Relying on unproven or new technologies

17
Q

What is an operational risk?

A

Communicational or team cooperation risks

18
Q

Explain the risk matrix

A

This is a 2d matrix combining likelihood with level of impact.

19
Q

What columns exist within the risk analysis form?

A

1) Risk
2) Trigger (event that provides signs risk is happening, measurable trigger but only measures this one risk)
3) Likelihood: likely, possible, unlikely
4) Impact: extent to which we will suffer
5) Contingency plans: what we will do

20
Q

What does it mean if a risk has been ‘realised’?

A

It is happening

21
Q

What is a rubber hose attack?

A

Beat someone with rubber hose until they tell you password or shit you want to know

22
Q

What is social engineering?

A

Exploit vulnerabilities of people

23
Q

What types of attacks are there (tech)?

A

Confidentiality
Integrity
Authenticity
Availability