Security Concepts & Legal Aspects Flashcards

1
Q

Describe the essence of 202a

A
  • obtains data
  • that were not intended for him
  • especially protected against unauthorised access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe the essence of 202b

A
  • intercepts data
  • not intended for him
  • non-public data transmission or from the electromagnetic broadcast
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe the essence of 202c

A
  • prepares the commission

- an offence under section 202a or section 202b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe the essence of 303a

A
  • deletes, suppresses, renders unusable or alters data

- Section 202c shall apply mutatis mutandis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the essence of 303b?

A
  • interferes with data processing operations which are
    of substantial importance
    1. committing an offence under section 303a(1); or
    2. entering or transmitting data (section 202a) with the intention of causing damage to another; or
    3. destroying, damaging, rendering unusable, removing or altering a data processing system or a data carrier,
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the three security goals?

A

Confidentially, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the purpose of Confidentiality?

A
  • data confidentiality: no unauthorised party must have access to private or confidential data
  • privacy: ensures that individuals can control which data related to them can be accessed/stored by other parties
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the purpose of Integrity?

A
  • data integrity: ensures that data may only be changed in an intended and authorised manner
  • system integrity: ensures that a system performs as intended, unimpaired from deliberate or inadvertent unauthorized manipulation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the purpose of Availability?

A

Ensure that a system responds in a timely manner and that service can not be denied to authorized users
- in contrast to integrity, this does not imply that system returns unaltered information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What Law?
Trying to log into HISPOS as Ben Stock to retrieve list of registered students
- Achieved by guessing the corresponding password, which is „1234“

A

criminal offence (under 202a)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What Law?
A disgruntled administrator deletes access logs to remove his traces
from accessing a server room
- deleted important documents for sales department

A

criminal offence (under 􏰀303a)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What Law?
Denial of Service attack
- Botnet used to make billions of requests to amazon.com - Given the high load, amazon.com is offline for 30 minutes

A

criminal offence (under 􏰀303b)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What Law?
Using KRACK attack to eavesdrop on your neighbour‘s wifi connection
- Allows to „remove“ encryption (null key used for XOR)

A

criminal offence (under 􏰀202a)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What CIA principle?
Assume you store your holiday pictures unencrypted in some cloud service. One day while wandering around in your area you see an advertisement for a local travel agency showing your family together sitting at the beach. Angrily you rip off the poster and return home.

A

An unauthorized party accessing a private cloud violates the security goal of confidentiality. Depending on the type of access granted to the intruder, integrity could have also been violated, if he would have been able to change data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What CIA principle?
A neighbor is listening to loud music, and it is the day before your first exam. You know that he is probably using his wireless speakers and decide to jam(block) all wireless traffic. Shortly after setting up the necessary device which you had lying around, the music stops, and you can get your hard earnt sleep.

A

As the jamming of all wireless traffic blocks all wireless communication, mainly the security goal of availability is violated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What Law’s are broken?
Linux.Wifatch is a malware targeting routers. It gains access by attacking weak Telnet passwords. In contrast to other malware it is not known to execute malicious actions, but rather attempts to close curtain vulnerabilities. Entities:
• the programmer (you can assume that the programmer released it)

A
I. §202a: Yes
II. §202b: No
III. §202c: Yes
§303a: Yes
§303b: Yes
17
Q

Assume you can eavesdrop (belauschen) on a communication over Wifi and modify its content. Which security goals are violated?

A

Confidentiality and Integrity

18
Q

Which law’s apply?
Person X develops a ransomware, which encrypts the disks of any infected computer. The ransomware then asks for a certain amount of money in Bitcoin with the promise of releasing the key to the encrypted files.

A

§303a, §303b

19
Q

Which law’s apply?
Person X develops a banking trojan.
This program modifies the operating system to be loaded on every boot.
When the victim visits a banking Web site, the trojan
a) extracts all credentials entered by the victim and
b) changes the recipient of a transaction to the attacker.

A

§202b, §303a

20
Q

Which law’s apply?
Student X finds a vulnerability in the latest Linux kernel.
Instead of submitting a bug report to Linux, he instead develops a proof-of-concept to exploit the bug, which allows to gain root privileges.
Given that he is short on money, he sells the PoC tool on the black market.

A

§202c