Podcast
Questions and Answers
What is the main purpose of an access control policy in a business?
What is the main purpose of an access control policy in a business?
- To define the cost of resources in the business
- To set rules for user access to information and resources (correct)
- To manage employee performance evaluations
- To outline marketing strategies for user engagement
What may happen if an access control policy does not conform to data protection rules?
What may happen if an access control policy does not conform to data protection rules?
- Access to all data will be revoked immediately
- The policy will be automatically updated
- Users may gain unauthorized access to resources
- There could be legal action in response to a data breach (correct)
How do access control lists (ACLs) function in resource management?
How do access control lists (ACLs) function in resource management?
- They facilitate automatic backups of database files
- They generate reports on user activity levels
- They ensure all users have equal access to all resources
- They serve as tables linking users with their permissions for various resources (correct)
What issue can arise from having access control lists based on individual permissions?
What issue can arise from having access control lists based on individual permissions?
What is a potential benefit of establishing an access control policy for new users in a system?
What is a potential benefit of establishing an access control policy for new users in a system?
What is a fundamental problem associated with symmetric encryption?
What is a fundamental problem associated with symmetric encryption?
In asymmetric encryption, which key is used to decrypt a message encrypted with the public key?
In asymmetric encryption, which key is used to decrypt a message encrypted with the public key?
Which of the following statements is true regarding public keys in asymmetric encryption?
Which of the following statements is true regarding public keys in asymmetric encryption?
What must Alice and Bob each have to use symmetric encryption securely?
What must Alice and Bob each have to use symmetric encryption securely?
How does symmetric encryption handle the encryption key for communication?
How does symmetric encryption handle the encryption key for communication?
Which of the following accurately describes asymmetric encryption?
Which of the following accurately describes asymmetric encryption?
What can be a consequence of an attacker compromising a symmetric encryption key?
What can be a consequence of an attacker compromising a symmetric encryption key?
Which term is used to describe the key that remains private in an asymmetric encryption scheme?
Which term is used to describe the key that remains private in an asymmetric encryption scheme?
What must users be made aware of regarding their personal data?
What must users be made aware of regarding their personal data?
Why is user consent critical before data disclosure?
Why is user consent critical before data disclosure?
What is a crucial principle regarding the lifetime of user data?
What is a crucial principle regarding the lifetime of user data?
Which principle addresses how personal data can be altered by users?
Which principle addresses how personal data can be altered by users?
What must a company ensure regarding data storage location?
What must a company ensure regarding data storage location?
What type of policy should a company establish regarding user data?
What type of policy should a company establish regarding user data?
What aspect of data security is emphasized for companies handling personal data?
What aspect of data security is emphasized for companies handling personal data?
What should not be a reason for extending the data lifetime?
What should not be a reason for extending the data lifetime?
What is the purpose of encrypting the long random numbers exchanged between the client and server?
What is the purpose of encrypting the long random numbers exchanged between the client and server?
Which protocol should be used for transferring data over the Internet to ensure encryption?
Which protocol should be used for transferring data over the Internet to ensure encryption?
What does data 'at rest' refer to in the context of encryption?
What does data 'at rest' refer to in the context of encryption?
What is one of the challenges of encrypting data in use?
What is one of the challenges of encrypting data in use?
What is an expected outcome of data theft when data is encrypted?
What is an expected outcome of data theft when data is encrypted?
Which authentication method relies on the user providing secret personal information?
Which authentication method relies on the user providing secret personal information?
How do both the client and server create an encryption key for subsequent communication?
How do both the client and server create an encryption key for subsequent communication?
What is an example of possession-based authentication?
What is an example of possession-based authentication?
What is one significant limitation of encrypting data in use?
What is one significant limitation of encrypting data in use?
Which of the following is a common weakness of password-based authentication?
Which of the following is a common weakness of password-based authentication?
What does the application do with the data it decides to encrypt?
What does the application do with the data it decides to encrypt?
Which authentication method utilizes a unique biometric feature for user verification?
Which authentication method utilizes a unique biometric feature for user verification?
What does multi-factor authentication require from users?
What does multi-factor authentication require from users?
What aspect of password security can make it easy for attackers to access accounts?
What aspect of password security can make it easy for attackers to access accounts?
What can happen if a user forgets their password?
What can happen if a user forgets their password?
Which type of attack involves misleading users into providing their login details via fake sites?
Which type of attack involves misleading users into providing their login details via fake sites?
What is the primary purpose of session cookies in the authentication process?
What is the primary purpose of session cookies in the authentication process?
Which of the following methods can attackers use to obtain session cookies?
Which of the following methods can attackers use to obtain session cookies?
What is a recommended action to reduce the risk of session hijacking?
What is a recommended action to reduce the risk of session hijacking?
How can traffic encryption enhance security during the authentication process?
How can traffic encryption enhance security during the authentication process?
Which of the following is NOT an action recommended to mitigate session hijacking risks?
Which of the following is NOT an action recommended to mitigate session hijacking risks?
What characterizes a distributed denial of service (DDoS) attack?
What characterizes a distributed denial of service (DDoS) attack?
Why is it important to implement short timeouts on user sessions?
Why is it important to implement short timeouts on user sessions?
What is a common outcome of a successful denial of service attack?
What is a common outcome of a successful denial of service attack?
Flashcards
Session Hijacking
Session Hijacking
A type of attack where an attacker obtains a user's session cookie and uses it to impersonate them.
Cross-Site Scripting (XSS) Attack
Cross-Site Scripting (XSS) Attack
An attack that uses malware to steal session cookies from a user's device.
Traffic Monitoring
Traffic Monitoring
An attack that involves monitoring traffic between a user and a server to identify and capture session cookies.
Denial of Service (DoS) Attack
Denial of Service (DoS) Attack
Signup and view all the flashcards
Distributed Denial of Service (DDoS) Attack
Distributed Denial of Service (DDoS) Attack
Signup and view all the flashcards
Traffic Encryption
Traffic Encryption
Signup and view all the flashcards
Multi-Factor Authentication (MFA)
Multi-Factor Authentication (MFA)
Signup and view all the flashcards
Short Timeouts
Short Timeouts
Signup and view all the flashcards
Access Control Policy
Access Control Policy
Signup and view all the flashcards
Access Control List (ACL)
Access Control List (ACL)
Signup and view all the flashcards
Explicit Access Control
Explicit Access Control
Signup and view all the flashcards
Data Breach (Related to Access Control Policy)
Data Breach (Related to Access Control Policy)
Signup and view all the flashcards
Default Access Rights
Default Access Rights
Signup and view all the flashcards
Knowledge-based Authentication
Knowledge-based Authentication
Signup and view all the flashcards
Possession-based Authentication
Possession-based Authentication
Signup and view all the flashcards
Attribute-based Authentication
Attribute-based Authentication
Signup and view all the flashcards
Phishing Attack
Phishing Attack
Signup and view all the flashcards
Password Reuse
Password Reuse
Signup and view all the flashcards
Forgotten Passwords
Forgotten Passwords
Signup and view all the flashcards
Insecure Passwords
Insecure Passwords
Signup and view all the flashcards
Multi-factor Authentication
Multi-factor Authentication
Signup and view all the flashcards
Symmetric Encryption
Symmetric Encryption
Signup and view all the flashcards
Asymmetric Encryption
Asymmetric Encryption
Signup and view all the flashcards
Encryption
Encryption
Signup and view all the flashcards
Decryption
Decryption
Signup and view all the flashcards
Encryption key
Encryption key
Signup and view all the flashcards
Key Sharing Problem
Key Sharing Problem
Signup and view all the flashcards
Public key
Public key
Signup and view all the flashcards
Private key
Private key
Signup and view all the flashcards
Data in Transit Encryption
Data in Transit Encryption
Signup and view all the flashcards
Data at Rest Encryption
Data at Rest Encryption
Signup and view all the flashcards
Data in Use Encryption
Data in Use Encryption
Signup and view all the flashcards
Diffie-Hellman Key Exchange
Diffie-Hellman Key Exchange
Signup and view all the flashcards
HTTPS (Hypertext Transfer Protocol Secure)
HTTPS (Hypertext Transfer Protocol Secure)
Signup and view all the flashcards
Data Encryption
Data Encryption
Signup and view all the flashcards
What are data protection laws?
What are data protection laws?
Signup and view all the flashcards
What are the rights of data subjects?
What are the rights of data subjects?
Signup and view all the flashcards
Who is a data controller?
Who is a data controller?
Signup and view all the flashcards
What is a privacy policy?
What is a privacy policy?
Signup and view all the flashcards
What are data protection principles?
What are data protection principles?
Signup and view all the flashcards
What is awareness and control?
What is awareness and control?
Signup and view all the flashcards
What is purpose limitation?
What is purpose limitation?
Signup and view all the flashcards
What is consent?
What is consent?
Signup and view all the flashcards
Study Notes
Introduction to System Analysis and Design
- Course code: BIS301
- Lecture notes partly based on Ian Sommerville's work.
- Year: 2023
Software Security
- High priority for developers and users.
- Malicious attacks lead to losses, potentially business closure.
- Unavailability or data breaches can cause user cancellations.
- Recovery takes time and effort, better spent on software.
Types of Security Threats
- Availability threats: Prevent authorized users from accessing the system (e.g., Distributed Denial of Service attacks).
- Integrity threats: Damage the system or its data (e.g., viruses, ransomware).
- Confidentiality threats: Gain access to private information (e.g., data theft).
System Infrastructure Stack
- Operational environment
- Application
- Frameworks and application libraries
- Browsers and messaging system libraries
- Database
- Operating system
- Software infrastructure
- Network
Security Management
- Authentication and authorization: Strong authentication standards and proper permissions minimize unauthorized access.
- System infrastructure management: Configure infrastructure software and apply security updates promptly.
- Attack monitoring: Regularly check for unauthorized access and implement resistance strategies.
- Backup: Implement policies to maintain undamaged copies of program and data files.
Operational Security
- Focuses on user security.
- User attacks trick users into revealing credentials or accessing malware (e.g., key-logging).
- Procedures include automatic logouts in shared spaces, user command logging and multi-factor authentication.
Injection Attacks
- Malicious users insert malicious code or commands through valid input fields.
- Execution of these instructions causes damage to the system (e.g., buffer overflow and SQL poisoning attacks).
SQL Poisoning Attacks
- Attacks on SQL database systems.
- Malicious users input SQL fragments into form fields.
- These fragments modify queries to access unauthorized data.
Cross-Site Scripting Attacks
- Another form of injection attack.
- Attacker injects malicious Javascript code into web pages.
- Code executes in user's browser, potentially stealing information or redirecting to malicious websites.
- Stolen cookies allow session hijacking.
- Input validation can prevent these attacks.
Session Hijacking Attacks
- Attackers gain session cookie to impersonate a legitimate user.
- Multiple methods exist (e.g., cross-site scripting, traffic monitoring).
- Malicious code can steal session cookies from victims.
- Traffic monitoring intercepts client-server communication.
Actions to Reduce Hacking
- Traffic encryption: Use HTTPS to encrypt data transmission.
- Multi-factor authentication: Require multiple authentication factors to reduce risk from stolen credentials.
- Short timeouts: Set short session timeouts to prevent prolonged unauthorized access.
Denial of Service Attacks
- Attacks to make a software system unavailable for normal use.
- Distributed Denial of Service (DDoS) attacks use multiple computers or systems to overwhelm the server.
- Other types target application users (e.g., user lockout attacks, brute-force attacks using email addresses).
Brute Force Attacks
- Attackers repeatedly try different passwords until one works.
- Some use password lists and generators.
- Using strong, unguessable passwords reduces this risk.
Authentication
- Process to verify a user's identity.
- Essential in software that stores user information.
- Enables personalization of user experiences.
Authentication Approaches
- Knowledge-based: User provides personal information.
- Possession-based: Physical device authentication.
- Attribute-based: Biometric attributes (e.g., fingerprints).
- Multi-factor: Combines multiple authentication methods.
Password-Based Authentication Weaknesses
- Insecure passwords: Easy-to-guess or -remember passwords are vulnerable.
- Phishing attacks: Users clicking on fake links to collect credentials.
- Password reuse: Using same password across different sites increases vulnerability.
- Forgotten passwords: Issues with recovery mechanisms for stolen credentials.
Federated Identity
- Authentication approach using external authentication services.
- Example: Login with Google/Facebook.
- Single set of credentials stored by trusted identity service.
- Reduced risk of security breaches due to fewer storage locations.
Authorization
- Complementary process to authentication; controls access to system resources.
- Access based on user identity and defined policy.
- Example: Shared folder access permissions.
Access Control Policies
- Define access rights to resources.
- Ensure compliance with data protection rules.
- Starting point for system access control scheme.
- Define access rights for new users (e.g., students in a system).
Access Control Lists (ACLs)
- Tables that link users to resources, defining permissions.
- Defined permissions on files or databases.
- Access can be granular, based on individual or group permissions.
Encryption
- Process of making data unreadable to unauthorized users.
- Uses transformations with a secret key.
- Modern techniques are effective but technology advancements can make apparent security vulnerable.
Symmetric Encryption
- Same key for encryption and decryption.
- Securely sharing the key is problematic.
- Potential for interception compromising all future communications.
Asymmetric Encryption
- Different Keys for encryption and decryption. (Public/Private).
- Public keys can be distributed freely. Private keys are used to decrypt received messages containing a Public Key.
- Asymmetric keys can also verify a user's identity.
Encryption and Authentication
- Asymmetric encryption to verify sender identity.
- Bob uses private key to encrypt message.
- Alice decrypts it with Bob's public key, verifying correct identification.
TLS and Digital Certificates
- Standard for secure web communication.
- Verifies server identity.
- Uses digital certificates, issued by Certificate Authorities (CAs).
- Digital certificates are signed using the CA's private key and include the CA's public key to verify.
Data Encryption
- Encryption helps protect data from unauthorized access (in-transit, at rest and in-use).
- Important in cloud products.
- Prevents theft or use of sensitive data.
- Encrypting data at rest.
- Using HTTPS protocol for encrypting data in-transit.
Key Management
- Ensures that encryption keys are securely generated, stored and accessed.
- Automation is needed for large numbers of keys.
- Key Management System (KMS): Specialized database for storing and managing keys.
Long-Term Key Storage
- Regulations require data retention for several years.
- Using archival data with a different key reduces risks.
- Key Management Systems provide timestamped keys for backups and archives.
Privacy
- Social concept relating to how personal information is collected, shared, and used.
- Importance varies across cultures and individuals.
- User preferences should be reflected in privacy policies.
Business Reasons for Privacy
- Compliance with data protection regulations is essential.
- Privacy safeguards reduce legal risks for business users.
- Reputational damage can result from privacy leaks/misuse.
Data Protection Laws
- Laws in many countries define acceptable data collection, use, and handling. (e.g., GDPR).
- Example of restrictions on information usage is given in the slide which specifies that use of health information is only allowed to the extent user gave permission for advertising).
- Rules for data storage, use and subject access.
Privacy Policy
- Defines how personal and sensitive user data is managed.
- Should be clear, consistent and user-friendly (terms and conditions are generally not user-friendly).
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.