Week 10 - Systems Security Flashcards

1
Q

Achieving the security of CIA and non-repudiation depends on?

A

Authentication - identity to entity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Malware is?

A

intrusive software designed to damage or take control of a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

NCSC - reduce reliance on passwords

A

use single sign on (SSO) - ues MFA to check identity then grants a token that can be used instead of password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

NCSC -implement technical solutions

A

use controls such as max number of authentication attempts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

NCSC - protect all password

A

encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

NCSC - password overload

A

human factor, password management systems, good practices and against password expiry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

NCSC - help generate better passwords

A

use machine generated passwords, or “three random words”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

NCSC - training

A

provide guidance and advice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DoS is?

A

Denial of service, high level of requests over a network which floods the machine/network, responses fail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

combination of authentication and authorisation is?

A

access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Access control list (ACL)

A

a list of who has authorisation to communicate with whom

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Specifying authorisation rules, terms used?

A

subject entity

object the asset on which the operation is being performed

action the operation being attempted

permission allowed or denied

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

two key security properties that authorisation enables in a system:

A

least privilege
authorisation to perform minimal set of operations to complete function

separation of privileges
separation of duties so that no 1 employee is given enough privilege to misuse the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Mandatory access control (MAC)?

A

Access to resources is strictly controlled by the operating system (OS) as specified by the system administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Advantages of MAC?

A

high level security, every subject and object has sensitivity label with NWU and NRD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Disadvantages of MAC?

A

large surface area, human error with assigning labels, wrong input gives access to unauthorised personnel or denies access to correct entity

high admin and maintenance costs

17
Q

Discretionary Access Control (DAS)?

A

widely used, subjects set access control on objects they own. based on trust

18
Q

DAC -permissions?

A

grants entities the right to read, write or execute object

19
Q

DAC - read?

A

abrv - (r) open make no changes

20
Q

DAC - write

A

abrv - (w) make changes

21
Q

DAC - execute

A

abrv - (x) run a program

22
Q

Advantages of DAC?

A

easy to implement, users gives permissions and security

23
Q

Disadvantages of DAC?

A

lack of accountability, difficult to execute in larger settings, not good for limited access permissions

24
Q

Role based access controls (RBAC)

A

users assigned roles, object accessing by user with appropriate roles

25
Q

advantages of RBAC?

A

sets roles across and organisation, users automatically assigned the correct transactions once in a roles, users cannot receive permissions outside of role.

26
Q

disadvantages of RBAC?

A

creating roles more difficult than DAC, role explosion (creating more roles if not checked).

27
Q

Reference monitor?

A

enforces access control rules, if not rules - default is applied.

28
Q

three main types of accountability?

A

non-repudiation
cannot deny

digital forensics
traces in the log, logs of interacting entities

compliance
erating in accordance with the relevant standards, regulations, or internal policies.

29
Q

GDPR?

A

general data protection regulation

privacy and security law, what personal information can be collected, regulates how data is processed or stored

30
Q

Accountability challenges ?

A

volume of logs,