Week 8 - Security Flashcards

- To be able to explain how to protect a network - To be able to explain the need for security assessment

1
Q

What are the 5 approaches to security

A
  • No Security
  • Security through obscurity (only recommend security for a known weakness in the organisation)
  • Host Security
  • Network Security
  • Combination of Host & Network Security (most common)

Also…
Physical Security: access card
Logical Security: PIN number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What security threats does an e-commerce site face?

A
  • Defacing your website (obvious)
  • Altering your website, e.g., change selling prices? (not always obvious)
  • Stealing customer data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What two factors need to be considered in security?

A

Cost & performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the 7 characteristics requiring protection?

A
  1. Confidentiality
  2. Integrity (can you trust data is not altered)
  3. Availability (is it up & running)
  4. Authentication (are you who you say you are)
  5. Non-repudiation (evidence that transaction was performed)
  6. Privacy (who else can see my details)
  7. Access control (who has access to what?)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the two things we are trying to protect?

A

Our Resources (anything flowing or sitting in org)
o Hardware
o Software
o Storage (Backup & Recovery)
o Bandwidth (Cables/Flow of Data)

Our Reputation
o Corruption of Web Pages
o Forged E-Mail
o Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What type of attacks are there?

A
  1. Intrusion
  2. Denial of Service (DOS or DDOS)
  3. Information Theft
  4. Stupidity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Intrusion Detection Systems

A

When an unauthorised person enters the network.
Network based: monitors traffic on the cables
Host based: software implemented in each host & monitors individual computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Denial of Service or DDOS

A

Objective: to make target systems unavailable to the real users.
o Send excessive pings to a server (flooding) which must be responded to. Server slows and crashes & the real users cannot access it.
Distributed DOS: having multiple people in different locations pinging the server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Information Theft

A

The attacker can passively record data communications to gather sensitive information that may be passing between two hosts.
Happneing unknowingly to users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Stupidity

A

Unknowingly giving access & information without realising its contents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the goal of security?

A

To build in layers of security/protection to make it difficult for a hacker to penetrate your network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Explain the role of a firewall

A

(1) Allow acceptable traffic to enter (2) Prevent any suspicious external data packets attempting to enter the internal network.
it is a software that needs to be updated & maintained.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why do firewalls need a security policy?

A

Firewall rules are dependent on the security policy.
Security Policy will inform the firewall what data to allow & deny. E.g., school servers do not allow YouTube to be accessed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Where must the firewall be situated?

A

Must be placed at the boundary between the internal & external network.
All traffic coming from the Internet and going out from the internal network passes through the firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the most common firewall & what does it do?

A

screening router/packet filtering router…
The firewall only reads the header as that is where the information about whether to deny or allow the packet is contained.
- Determines if ‘destination address’ is within its network
- Screens the packet based on firewall rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What can’t a firewall do & what must you implement instead?

A

Prevent viruses or anything that does not go THROUGH the firewall.
Need an anti-virus software.

17
Q

A security plan: mgmt policies

A
  • Risk assessment – security cost vs potential loss risk matrix
  • Security audit: penetration testing (consultants hack network to find problems within the network)
  • Security (tradeoff): (greater security = slower, vice versa)
  • Vulnerability, threat, likelihood of attack, loss