Podcast
Questions and Answers
What is the main purpose of an access control policy in a business?
What is the main purpose of an access control policy in a business?
What may happen if an access control policy does not conform to data protection rules?
What may happen if an access control policy does not conform to data protection rules?
How do access control lists (ACLs) function in resource management?
How do access control lists (ACLs) function in resource management?
What issue can arise from having access control lists based on individual permissions?
What issue can arise from having access control lists based on individual permissions?
Signup and view all the answers
What is a potential benefit of establishing an access control policy for new users in a system?
What is a potential benefit of establishing an access control policy for new users in a system?
Signup and view all the answers
What is a fundamental problem associated with symmetric encryption?
What is a fundamental problem associated with symmetric encryption?
Signup and view all the answers
In asymmetric encryption, which key is used to decrypt a message encrypted with the public key?
In asymmetric encryption, which key is used to decrypt a message encrypted with the public key?
Signup and view all the answers
Which of the following statements is true regarding public keys in asymmetric encryption?
Which of the following statements is true regarding public keys in asymmetric encryption?
Signup and view all the answers
What must Alice and Bob each have to use symmetric encryption securely?
What must Alice and Bob each have to use symmetric encryption securely?
Signup and view all the answers
How does symmetric encryption handle the encryption key for communication?
How does symmetric encryption handle the encryption key for communication?
Signup and view all the answers
Which of the following accurately describes asymmetric encryption?
Which of the following accurately describes asymmetric encryption?
Signup and view all the answers
What can be a consequence of an attacker compromising a symmetric encryption key?
What can be a consequence of an attacker compromising a symmetric encryption key?
Signup and view all the answers
Which term is used to describe the key that remains private in an asymmetric encryption scheme?
Which term is used to describe the key that remains private in an asymmetric encryption scheme?
Signup and view all the answers
What must users be made aware of regarding their personal data?
What must users be made aware of regarding their personal data?
Signup and view all the answers
Why is user consent critical before data disclosure?
Why is user consent critical before data disclosure?
Signup and view all the answers
What is a crucial principle regarding the lifetime of user data?
What is a crucial principle regarding the lifetime of user data?
Signup and view all the answers
Which principle addresses how personal data can be altered by users?
Which principle addresses how personal data can be altered by users?
Signup and view all the answers
What must a company ensure regarding data storage location?
What must a company ensure regarding data storage location?
Signup and view all the answers
What type of policy should a company establish regarding user data?
What type of policy should a company establish regarding user data?
Signup and view all the answers
What aspect of data security is emphasized for companies handling personal data?
What aspect of data security is emphasized for companies handling personal data?
Signup and view all the answers
What should not be a reason for extending the data lifetime?
What should not be a reason for extending the data lifetime?
Signup and view all the answers
What is the purpose of encrypting the long random numbers exchanged between the client and server?
What is the purpose of encrypting the long random numbers exchanged between the client and server?
Signup and view all the answers
Which protocol should be used for transferring data over the Internet to ensure encryption?
Which protocol should be used for transferring data over the Internet to ensure encryption?
Signup and view all the answers
What does data 'at rest' refer to in the context of encryption?
What does data 'at rest' refer to in the context of encryption?
Signup and view all the answers
What is one of the challenges of encrypting data in use?
What is one of the challenges of encrypting data in use?
Signup and view all the answers
What is an expected outcome of data theft when data is encrypted?
What is an expected outcome of data theft when data is encrypted?
Signup and view all the answers
Which authentication method relies on the user providing secret personal information?
Which authentication method relies on the user providing secret personal information?
Signup and view all the answers
How do both the client and server create an encryption key for subsequent communication?
How do both the client and server create an encryption key for subsequent communication?
Signup and view all the answers
What is an example of possession-based authentication?
What is an example of possession-based authentication?
Signup and view all the answers
What is one significant limitation of encrypting data in use?
What is one significant limitation of encrypting data in use?
Signup and view all the answers
Which of the following is a common weakness of password-based authentication?
Which of the following is a common weakness of password-based authentication?
Signup and view all the answers
What does the application do with the data it decides to encrypt?
What does the application do with the data it decides to encrypt?
Signup and view all the answers
Which authentication method utilizes a unique biometric feature for user verification?
Which authentication method utilizes a unique biometric feature for user verification?
Signup and view all the answers
What does multi-factor authentication require from users?
What does multi-factor authentication require from users?
Signup and view all the answers
What aspect of password security can make it easy for attackers to access accounts?
What aspect of password security can make it easy for attackers to access accounts?
Signup and view all the answers
What can happen if a user forgets their password?
What can happen if a user forgets their password?
Signup and view all the answers
Which type of attack involves misleading users into providing their login details via fake sites?
Which type of attack involves misleading users into providing their login details via fake sites?
Signup and view all the answers
What is the primary purpose of session cookies in the authentication process?
What is the primary purpose of session cookies in the authentication process?
Signup and view all the answers
Which of the following methods can attackers use to obtain session cookies?
Which of the following methods can attackers use to obtain session cookies?
Signup and view all the answers
What is a recommended action to reduce the risk of session hijacking?
What is a recommended action to reduce the risk of session hijacking?
Signup and view all the answers
How can traffic encryption enhance security during the authentication process?
How can traffic encryption enhance security during the authentication process?
Signup and view all the answers
Which of the following is NOT an action recommended to mitigate session hijacking risks?
Which of the following is NOT an action recommended to mitigate session hijacking risks?
Signup and view all the answers
What characterizes a distributed denial of service (DDoS) attack?
What characterizes a distributed denial of service (DDoS) attack?
Signup and view all the answers
Why is it important to implement short timeouts on user sessions?
Why is it important to implement short timeouts on user sessions?
Signup and view all the answers
What is a common outcome of a successful denial of service attack?
What is a common outcome of a successful denial of service attack?
Signup and view all the answers
Study Notes
Introduction to System Analysis and Design
- Course code: BIS301
- Lecture notes partly based on Ian Sommerville's work.
- Year: 2023
Software Security
- High priority for developers and users.
- Malicious attacks lead to losses, potentially business closure.
- Unavailability or data breaches can cause user cancellations.
- Recovery takes time and effort, better spent on software.
Types of Security Threats
- Availability threats: Prevent authorized users from accessing the system (e.g., Distributed Denial of Service attacks).
- Integrity threats: Damage the system or its data (e.g., viruses, ransomware).
- Confidentiality threats: Gain access to private information (e.g., data theft).
System Infrastructure Stack
- Operational environment
- Application
- Frameworks and application libraries
- Browsers and messaging system libraries
- Database
- Operating system
- Software infrastructure
- Network
Security Management
- Authentication and authorization: Strong authentication standards and proper permissions minimize unauthorized access.
- System infrastructure management: Configure infrastructure software and apply security updates promptly.
- Attack monitoring: Regularly check for unauthorized access and implement resistance strategies.
- Backup: Implement policies to maintain undamaged copies of program and data files.
Operational Security
- Focuses on user security.
- User attacks trick users into revealing credentials or accessing malware (e.g., key-logging).
- Procedures include automatic logouts in shared spaces, user command logging and multi-factor authentication.
Injection Attacks
- Malicious users insert malicious code or commands through valid input fields.
- Execution of these instructions causes damage to the system (e.g., buffer overflow and SQL poisoning attacks).
SQL Poisoning Attacks
- Attacks on SQL database systems.
- Malicious users input SQL fragments into form fields.
- These fragments modify queries to access unauthorized data.
Cross-Site Scripting Attacks
- Another form of injection attack.
- Attacker injects malicious Javascript code into web pages.
- Code executes in user's browser, potentially stealing information or redirecting to malicious websites.
- Stolen cookies allow session hijacking.
- Input validation can prevent these attacks.
Session Hijacking Attacks
- Attackers gain session cookie to impersonate a legitimate user.
- Multiple methods exist (e.g., cross-site scripting, traffic monitoring).
- Malicious code can steal session cookies from victims.
- Traffic monitoring intercepts client-server communication.
Actions to Reduce Hacking
- Traffic encryption: Use HTTPS to encrypt data transmission.
- Multi-factor authentication: Require multiple authentication factors to reduce risk from stolen credentials.
- Short timeouts: Set short session timeouts to prevent prolonged unauthorized access.
Denial of Service Attacks
- Attacks to make a software system unavailable for normal use.
- Distributed Denial of Service (DDoS) attacks use multiple computers or systems to overwhelm the server.
- Other types target application users (e.g., user lockout attacks, brute-force attacks using email addresses).
Brute Force Attacks
- Attackers repeatedly try different passwords until one works.
- Some use password lists and generators.
- Using strong, unguessable passwords reduces this risk.
Authentication
- Process to verify a user's identity.
- Essential in software that stores user information.
- Enables personalization of user experiences.
Authentication Approaches
- Knowledge-based: User provides personal information.
- Possession-based: Physical device authentication.
- Attribute-based: Biometric attributes (e.g., fingerprints).
- Multi-factor: Combines multiple authentication methods.
Password-Based Authentication Weaknesses
- Insecure passwords: Easy-to-guess or -remember passwords are vulnerable.
- Phishing attacks: Users clicking on fake links to collect credentials.
- Password reuse: Using same password across different sites increases vulnerability.
- Forgotten passwords: Issues with recovery mechanisms for stolen credentials.
Federated Identity
- Authentication approach using external authentication services.
- Example: Login with Google/Facebook.
- Single set of credentials stored by trusted identity service.
- Reduced risk of security breaches due to fewer storage locations.
Authorization
- Complementary process to authentication; controls access to system resources.
- Access based on user identity and defined policy.
- Example: Shared folder access permissions.
Access Control Policies
- Define access rights to resources.
- Ensure compliance with data protection rules.
- Starting point for system access control scheme.
- Define access rights for new users (e.g., students in a system).
Access Control Lists (ACLs)
- Tables that link users to resources, defining permissions.
- Defined permissions on files or databases.
- Access can be granular, based on individual or group permissions.
Encryption
- Process of making data unreadable to unauthorized users.
- Uses transformations with a secret key.
- Modern techniques are effective but technology advancements can make apparent security vulnerable.
Symmetric Encryption
- Same key for encryption and decryption.
- Securely sharing the key is problematic.
- Potential for interception compromising all future communications.
Asymmetric Encryption
- Different Keys for encryption and decryption. (Public/Private).
- Public keys can be distributed freely. Private keys are used to decrypt received messages containing a Public Key.
- Asymmetric keys can also verify a user's identity.
Encryption and Authentication
- Asymmetric encryption to verify sender identity.
- Bob uses private key to encrypt message.
- Alice decrypts it with Bob's public key, verifying correct identification.
TLS and Digital Certificates
- Standard for secure web communication.
- Verifies server identity.
- Uses digital certificates, issued by Certificate Authorities (CAs).
- Digital certificates are signed using the CA's private key and include the CA's public key to verify.
Data Encryption
- Encryption helps protect data from unauthorized access (in-transit, at rest and in-use).
- Important in cloud products.
- Prevents theft or use of sensitive data.
- Encrypting data at rest.
- Using HTTPS protocol for encrypting data in-transit.
Key Management
- Ensures that encryption keys are securely generated, stored and accessed.
- Automation is needed for large numbers of keys.
- Key Management System (KMS): Specialized database for storing and managing keys.
Long-Term Key Storage
- Regulations require data retention for several years.
- Using archival data with a different key reduces risks.
- Key Management Systems provide timestamped keys for backups and archives.
Privacy
- Social concept relating to how personal information is collected, shared, and used.
- Importance varies across cultures and individuals.
- User preferences should be reflected in privacy policies.
Business Reasons for Privacy
- Compliance with data protection regulations is essential.
- Privacy safeguards reduce legal risks for business users.
- Reputational damage can result from privacy leaks/misuse.
Data Protection Laws
- Laws in many countries define acceptable data collection, use, and handling. (e.g., GDPR).
- Example of restrictions on information usage is given in the slide which specifies that use of health information is only allowed to the extent user gave permission for advertising).
- Rules for data storage, use and subject access.
Privacy Policy
- Defines how personal and sensitive user data is managed.
- Should be clear, consistent and user-friendly (terms and conditions are generally not user-friendly).
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz explores essential concepts surrounding access control policies and encryption methods. It covers their purposes, functionalities, and implications of non-compliance with data protection rules. Gain insights into symmetric and asymmetric encryption, access control lists, and their impact on security.