Access Control and Encryption Policies Quiz
45 Questions
6 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the main purpose of an access control policy in a business?

  • To define the cost of resources in the business
  • To set rules for user access to information and resources (correct)
  • To manage employee performance evaluations
  • To outline marketing strategies for user engagement
  • What may happen if an access control policy does not conform to data protection rules?

  • Access to all data will be revoked immediately
  • The policy will be automatically updated
  • Users may gain unauthorized access to resources
  • There could be legal action in response to a data breach (correct)
  • How do access control lists (ACLs) function in resource management?

  • They facilitate automatic backups of database files
  • They generate reports on user activity levels
  • They ensure all users have equal access to all resources
  • They serve as tables linking users with their permissions for various resources (correct)
  • What issue can arise from having access control lists based on individual permissions?

    <p>They can become excessively large and complex</p> Signup and view all the answers

    What is a potential benefit of establishing an access control policy for new users in a system?

    <p>It helps ensure consistent access rights for new users</p> Signup and view all the answers

    What is a fundamental problem associated with symmetric encryption?

    <p>The risk of key interception during sharing</p> Signup and view all the answers

    In asymmetric encryption, which key is used to decrypt a message encrypted with the public key?

    <p>The corresponding private key</p> Signup and view all the answers

    Which of the following statements is true regarding public keys in asymmetric encryption?

    <p>They can be freely shared and published</p> Signup and view all the answers

    What must Alice and Bob each have to use symmetric encryption securely?

    <p>A copy of the same encryption key</p> Signup and view all the answers

    How does symmetric encryption handle the encryption key for communication?

    <p>It requires the key to be securely exchanged between parties</p> Signup and view all the answers

    Which of the following accurately describes asymmetric encryption?

    <p>It utilizes a pair of different keys for different processes</p> Signup and view all the answers

    What can be a consequence of an attacker compromising a symmetric encryption key?

    <p>All past and future messages can be read</p> Signup and view all the answers

    Which term is used to describe the key that remains private in an asymmetric encryption scheme?

    <p>Private key</p> Signup and view all the answers

    What must users be made aware of regarding their personal data?

    <p>What data is collected and its purpose</p> Signup and view all the answers

    Why is user consent critical before data disclosure?

    <p>It is a legal requirement to protect user rights</p> Signup and view all the answers

    What is a crucial principle regarding the lifetime of user data?

    <p>Data must be deleted if a user deletes their account</p> Signup and view all the answers

    Which principle addresses how personal data can be altered by users?

    <p>Discovery and error correction</p> Signup and view all the answers

    What must a company ensure regarding data storage location?

    <p>Data must only be stored in countries with strong data laws</p> Signup and view all the answers

    What type of policy should a company establish regarding user data?

    <p>A privacy policy for data management</p> Signup and view all the answers

    What aspect of data security is emphasized for companies handling personal data?

    <p>Maintaining secure storage to prevent unauthorized access</p> Signup and view all the answers

    What should not be a reason for extending the data lifetime?

    <p>The potential for future marketing</p> Signup and view all the answers

    What is the purpose of encrypting the long random numbers exchanged between the client and server?

    <p>To generate a common encryption key without direct exchange</p> Signup and view all the answers

    Which protocol should be used for transferring data over the Internet to ensure encryption?

    <p>HTTPS</p> Signup and view all the answers

    What does data 'at rest' refer to in the context of encryption?

    <p>Data stored without being accessed</p> Signup and view all the answers

    What is one of the challenges of encrypting data in use?

    <p>It slows down system response time.</p> Signup and view all the answers

    What is an expected outcome of data theft when data is encrypted?

    <p>Thieves find it very difficult and expensive to use the data.</p> Signup and view all the answers

    Which authentication method relies on the user providing secret personal information?

    <p>Knowledge-based authentication</p> Signup and view all the answers

    How do both the client and server create an encryption key for subsequent communication?

    <p>By using the long random numbers they generated</p> Signup and view all the answers

    What is an example of possession-based authentication?

    <p>Mobile device verification</p> Signup and view all the answers

    What is one significant limitation of encrypting data in use?

    <p>Implementing a general search mechanism is impossible.</p> Signup and view all the answers

    Which of the following is a common weakness of password-based authentication?

    <p>Password reuse across multiple sites</p> Signup and view all the answers

    What does the application do with the data it decides to encrypt?

    <p>Encrypts the data before it gets processed</p> Signup and view all the answers

    Which authentication method utilizes a unique biometric feature for user verification?

    <p>Attribute-based authentication</p> Signup and view all the answers

    What does multi-factor authentication require from users?

    <p>At least two different authentication methods</p> Signup and view all the answers

    What aspect of password security can make it easy for attackers to access accounts?

    <p>Using passwords that are easy to remember</p> Signup and view all the answers

    What can happen if a user forgets their password?

    <p>They often need a password recovery mechanism</p> Signup and view all the answers

    Which type of attack involves misleading users into providing their login details via fake sites?

    <p>Phishing attack</p> Signup and view all the answers

    What is the primary purpose of session cookies in the authentication process?

    <p>To keep users logged in during a session</p> Signup and view all the answers

    Which of the following methods can attackers use to obtain session cookies?

    <p>Cross-site scripting attacks and traffic monitoring</p> Signup and view all the answers

    What is a recommended action to reduce the risk of session hijacking?

    <p>Using multi-factor authentication for sensitive actions</p> Signup and view all the answers

    How can traffic encryption enhance security during the authentication process?

    <p>By protecting session cookies from being intercepted</p> Signup and view all the answers

    Which of the following is NOT an action recommended to mitigate session hijacking risks?

    <p>Using ineffective passwords for user accounts</p> Signup and view all the answers

    What characterizes a distributed denial of service (DDoS) attack?

    <p>It uses numerous hijacked computers to overwhelm a service</p> Signup and view all the answers

    Why is it important to implement short timeouts on user sessions?

    <p>To ensure users are logged out in case of inactivity</p> Signup and view all the answers

    What is a common outcome of a successful denial of service attack?

    <p>System unavailability for legitimate users</p> Signup and view all the answers

    Study Notes

    Introduction to System Analysis and Design

    • Course code: BIS301
    • Lecture notes partly based on Ian Sommerville's work.
    • Year: 2023

    Software Security

    • High priority for developers and users.
    • Malicious attacks lead to losses, potentially business closure.
    • Unavailability or data breaches can cause user cancellations.
    • Recovery takes time and effort, better spent on software.

    Types of Security Threats

    • Availability threats: Prevent authorized users from accessing the system (e.g., Distributed Denial of Service attacks).
    • Integrity threats: Damage the system or its data (e.g., viruses, ransomware).
    • Confidentiality threats: Gain access to private information (e.g., data theft).

    System Infrastructure Stack

    • Operational environment
    • Application
    • Frameworks and application libraries
    • Browsers and messaging system libraries
    • Database
    • Operating system
    • Software infrastructure
    • Network

    Security Management

    • Authentication and authorization: Strong authentication standards and proper permissions minimize unauthorized access.
    • System infrastructure management: Configure infrastructure software and apply security updates promptly.
    • Attack monitoring: Regularly check for unauthorized access and implement resistance strategies.
    • Backup: Implement policies to maintain undamaged copies of program and data files.

    Operational Security

    • Focuses on user security.
    • User attacks trick users into revealing credentials or accessing malware (e.g., key-logging).
    • Procedures include automatic logouts in shared spaces, user command logging and multi-factor authentication.

    Injection Attacks

    • Malicious users insert malicious code or commands through valid input fields.
    • Execution of these instructions causes damage to the system (e.g., buffer overflow and SQL poisoning attacks).

    SQL Poisoning Attacks

    • Attacks on SQL database systems.
    • Malicious users input SQL fragments into form fields.
    • These fragments modify queries to access unauthorized data.

    Cross-Site Scripting Attacks

    • Another form of injection attack.
    • Attacker injects malicious Javascript code into web pages.
    • Code executes in user's browser, potentially stealing information or redirecting to malicious websites.
    • Stolen cookies allow session hijacking.
    • Input validation can prevent these attacks.

    Session Hijacking Attacks

    • Attackers gain session cookie to impersonate a legitimate user.
    • Multiple methods exist (e.g., cross-site scripting, traffic monitoring).
    • Malicious code can steal session cookies from victims.
    • Traffic monitoring intercepts client-server communication.

    Actions to Reduce Hacking

    • Traffic encryption: Use HTTPS to encrypt data transmission.
    • Multi-factor authentication: Require multiple authentication factors to reduce risk from stolen credentials.
    • Short timeouts: Set short session timeouts to prevent prolonged unauthorized access.

    Denial of Service Attacks

    • Attacks to make a software system unavailable for normal use.
    • Distributed Denial of Service (DDoS) attacks use multiple computers or systems to overwhelm the server.
    • Other types target application users (e.g., user lockout attacks, brute-force attacks using email addresses).

    Brute Force Attacks

    • Attackers repeatedly try different passwords until one works.
    • Some use password lists and generators.
    • Using strong, unguessable passwords reduces this risk.

    Authentication

    • Process to verify a user's identity.
    • Essential in software that stores user information.
    • Enables personalization of user experiences.

    Authentication Approaches

    • Knowledge-based: User provides personal information.
    • Possession-based: Physical device authentication.
    • Attribute-based: Biometric attributes (e.g., fingerprints).
    • Multi-factor: Combines multiple authentication methods.

    Password-Based Authentication Weaknesses

    • Insecure passwords: Easy-to-guess or -remember passwords are vulnerable.
    • Phishing attacks: Users clicking on fake links to collect credentials.
    • Password reuse: Using same password across different sites increases vulnerability.
    • Forgotten passwords: Issues with recovery mechanisms for stolen credentials.

    Federated Identity

    • Authentication approach using external authentication services.
    • Example: Login with Google/Facebook.
    • Single set of credentials stored by trusted identity service.
    • Reduced risk of security breaches due to fewer storage locations.

    Authorization

    • Complementary process to authentication; controls access to system resources.
    • Access based on user identity and defined policy.
    • Example: Shared folder access permissions.

    Access Control Policies

    • Define access rights to resources.
    • Ensure compliance with data protection rules.
    • Starting point for system access control scheme.
    • Define access rights for new users (e.g., students in a system).

    Access Control Lists (ACLs)

    • Tables that link users to resources, defining permissions.
    • Defined permissions on files or databases.
    • Access can be granular, based on individual or group permissions.

    Encryption

    • Process of making data unreadable to unauthorized users.
    • Uses transformations with a secret key.
    • Modern techniques are effective but technology advancements can make apparent security vulnerable.

    Symmetric Encryption

    • Same key for encryption and decryption.
    • Securely sharing the key is problematic.
    • Potential for interception compromising all future communications.

    Asymmetric Encryption

    • Different Keys for encryption and decryption. (Public/Private).
    • Public keys can be distributed freely. Private keys are used to decrypt received messages containing a Public Key.
    • Asymmetric keys can also verify a user's identity.

    Encryption and Authentication

    • Asymmetric encryption to verify sender identity.
    • Bob uses private key to encrypt message.
    • Alice decrypts it with Bob's public key, verifying correct identification.

    TLS and Digital Certificates

    • Standard for secure web communication.
    • Verifies server identity.
    • Uses digital certificates, issued by Certificate Authorities (CAs).
    • Digital certificates are signed using the CA's private key and include the CA's public key to verify.

    Data Encryption

    • Encryption helps protect data from unauthorized access (in-transit, at rest and in-use).
    • Important in cloud products.
    • Prevents theft or use of sensitive data.
    • Encrypting data at rest.
    • Using HTTPS protocol for encrypting data in-transit.

    Key Management

    • Ensures that encryption keys are securely generated, stored and accessed.
    • Automation is needed for large numbers of keys.
    • Key Management System (KMS): Specialized database for storing and managing keys.

    Long-Term Key Storage

    • Regulations require data retention for several years.
    • Using archival data with a different key reduces risks.
    • Key Management Systems provide timestamped keys for backups and archives.

    Privacy

    • Social concept relating to how personal information is collected, shared, and used.
    • Importance varies across cultures and individuals.
    • User preferences should be reflected in privacy policies.

    Business Reasons for Privacy

    • Compliance with data protection regulations is essential.
    • Privacy safeguards reduce legal risks for business users.
    • Reputational damage can result from privacy leaks/misuse.

    Data Protection Laws

    • Laws in many countries define acceptable data collection, use, and handling. (e.g., GDPR).
    • Example of restrictions on information usage is given in the slide which specifies that use of health information is only allowed to the extent user gave permission for advertising).
    • Rules for data storage, use and subject access.

    Privacy Policy

    • Defines how personal and sensitive user data is managed.
    • Should be clear, consistent and user-friendly (terms and conditions are generally not user-friendly).

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    This quiz explores essential concepts surrounding access control policies and encryption methods. It covers their purposes, functionalities, and implications of non-compliance with data protection rules. Gain insights into symmetric and asymmetric encryption, access control lists, and their impact on security.

    More Like This

    Use Quizgecko on...
    Browser
    Browser