Session 25 (Security and Online Privacy) Flashcards
risk vs vulnerability vs exposure?
risk: likelihood that threat will occur
vulnerability: likelihood that threat will harm the system
exposure: (potential harm if threat breaks the controls and comprises the resources)
what are the components of internet security (CIA)?
Confidentiality: The information is secret. No
one can read that information without your
permission.
Integrity: The information remains unaltered.
No one can change that information without
your knowledge.
Availability: The information is available
upon your request. When you need it, that
information must be available
what are the two things we need to ensure confidentiality?
- we need to make sure that our data
cannot be read by anyone except the
intended recipient.
We do this through Cryptography. - we need to make sure that the
intended recipient is really the one who says
he is.
We do this though Access Control.
what is Caesar’s cipher?
The most basic substitution cipher
Encryption given a key K: each letter in the
plaintext P is replaced with the K’th letter
following corresponding number (shift right)
Decryption given K: shift left
Symmetric vs Asymmetric cryptography?
Symmetric Easy to use Faster Key management is hard (especially when number of users is high) Need key distribution Cannot provide digital signature
Asymmetric More complicated Much slower Simpler Key management system No need for Key distribution Can provide digital signature
what are the three components to control access?
- Authentication: to confirm that you are who
you say you are. - Authorization: to make sure that you can read
what you are able to read. - Accounting: to keep track of what you do.
what is the simplest authentication method?
password
what’s a way to add additional security?
multi-factor authentication (something you know, have, are)
what are the two main access control systems?
- physical
2. digital (Firewall, Intrusion Prevention System)
what is malware?
any software with malicious intent against your
computer
what can malware do?
– disrupt computer operation
– gain access to private systems
– steal personal information
– or even display advertisements
examples of types of malware
- Virus
- Worm
- Trojan Horses
- Ransomware
- Spyware
- Adware
- Scareware
describe phishing
– Lure victim via Email / URL Link
– To a fake website that look absolutely similar to
the original
– Trick user to enter personal details and/or
password
describe spear-phishing
– Phishing that intend to use against specific person
– More sophisticated and customized
– More promising to the victim
what is denial of service?
Attack that makes a machine or network
resource unavailable to the users.
Called Distributed Denial-of-Service (DDoS) if
the attacks occur from multiple sources