Cybersecurity Threats and Principles

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following is an example of a confidentiality threat?

  • Distributed denial of service attack
  • Data theft (correct)
  • Virus
  • Ransomware

Ransomware primarily affects the integrity of data.

True (A)

What are the two key principles that should be established according to authentication and authorization standards?

Strong authentication and proper access permissions

An attacker might launch a ______ to make a system unavailable to its users.

<p>Distributed denial of service attack</p> Signup and view all the answers

Which of the following is NOT a threat to integrity?

<p>Cyber bullying (A)</p> Signup and view all the answers

Match the security threats with their categories:

<p>Virus = Software threat Ransomware = Availability threat Data theft = Confidentiality threat Distributed denial of service = Availability threat</p> Signup and view all the answers

Security updates should be applied as soon as they become available.

<p>True (A)</p> Signup and view all the answers

What does proper system infrastructure management entail?

<p>Proper configuration and timely security updates</p> Signup and view all the answers

What is the main purpose of operational security?

<p>To help users maintain security (A)</p> Signup and view all the answers

Multi-factor authentication increases the likelihood of an intruder gaining access to the system with stolen credentials.

<p>False (B)</p> Signup and view all the answers

What should be implemented to ensure you keep undamaged copies of program and data files?

<p>Backup policies</p> Signup and view all the answers

SQL poisoning attacks take advantage of situations where user input is used as part of an ______.

<p>SQL command</p> Signup and view all the answers

Match the following types of attacks with their descriptions:

<p>Buffer overflow attacks = Involves exceeding memory allocation limits SQL poisoning attacks = Uses malicious SQL to gain database access User command logging = Tracks user commands for security reviews Auto-logout = Automatically logs users out after inactivity</p> Signup and view all the answers

Which of the following is NOT a strategy for minimizing the effects of an attack?

<p>Ignoring unauthorized access (B)</p> Signup and view all the answers

Injection attacks utilize valid input fields to execute malicious code.

<p>True (A)</p> Signup and view all the answers

What is one common type of injection attack?

<p>SQL poisoning</p> Signup and view all the answers

What is the main goal of user lockout attacks?

<p>Lock users out to deny them access to the service (D)</p> Signup and view all the answers

Brute force attacks typically involve attackers using weak passwords.

<p>True (A)</p> Signup and view all the answers

What is authentication?

<p>The process of ensuring that a user is who they claim to be.</p> Signup and view all the answers

Attackers create different passwords and try to login with each of these in a ________ attack.

<p>brute force</p> Signup and view all the answers

Match the type of attack with its definition:

<p>User lockout attack = Locks users out after failed authentication attempts Brute force attack = Attempts multiple password combinations to gain access Authentication = Process of verifying user identity Denial of service attack = Prevents legitimate users from accessing services</p> Signup and view all the answers

What outcome may occur if accounts are not locked after failed validation attempts?

<p>Brute-force attacks on the system (C)</p> Signup and view all the answers

Authentication is only necessary for software that does not contain user information.

<p>False (B)</p> Signup and view all the answers

What tactic do attackers often use to speed up brute force attacks?

<p>Using lists of common passwords.</p> Signup and view all the answers

What does allocating users to groups in access control manage?

<p>Group-based permissions (B)</p> Signup and view all the answers

Encryption transforms readable data into an unreadable format.

<p>True (A)</p> Signup and view all the answers

What is used by the encryption algorithm to transform data?

<p>a secret key</p> Signup and view all the answers

Modern encryption techniques can make data practically __________ using current technology.

<p>uncrackable</p> Signup and view all the answers

Match the following resources with their corresponding permissions:

<p>Resource A = Read Resource B = Execute Resource C = Create, Delete Resource D = Read, Edit</p> Signup and view all the answers

What potential future technology may necessitate a new approach to encryption on the Internet?

<p>Quantum computing (A)</p> Signup and view all the answers

All encryption methods used today are guaranteed to remain secure indefinitely.

<p>False (B)</p> Signup and view all the answers

What is the reverse process of encryption called?

<p>decryption</p> Signup and view all the answers

What does the public key of the CA include?

<p>Key size and encryption algorithm (D)</p> Signup and view all the answers

The public key can be used to encrypt the digital signature.

<p>False (B)</p> Signup and view all the answers

What does TLS stand for?

<p>Transport Layer Security</p> Signup and view all the answers

The server's public key is included in the digital __________ sent to the client.

<p>certificate</p> Signup and view all the answers

What is the purpose of the RS and RC numbers generated during the TLS process?

<p>They help compute the symmetric key for data encryption. (A)</p> Signup and view all the answers

What is a primary function of a Key Management System (KMS)?

<p>Maintaining encryption keys (A)</p> Signup and view all the answers

To verify the identity of the client, the server encrypts the RS using its public key.

<p>False (B)</p> Signup and view all the answers

Data protection regulations do not require archival data to be encrypted.

<p>False (B)</p> Signup and view all the answers

What is the minimum retention period for tax and company data in the UK?

<p>six years</p> Signup and view all the answers

What needs to be checked regarding the digital certificate sent from the server?

<p>Issuer and validity</p> Signup and view all the answers

Younger people tend to be less inhibited about sharing personal information on ______.

<p>social networks</p> Signup and view all the answers

Data is exchanged using a __________ key computed from RS and RC.

<p>symmetric</p> Signup and view all the answers

Why should encryption keys be changed regularly?

<p>To reduce the risk of security breaches (C)</p> Signup and view all the answers

Match the following components with their roles in TLS:

<p>Public key = Used to decrypt the digital signature Private key = Encrypts the RS Digital certificate = Includes the server's public key Symmetric key = Used to encrypt data during the session</p> Signup and view all the answers

Match the following terms with their correct definitions:

<p>Encryption = The process of converting data into a secure format Key Management System = A system for managing encryption keys Archival Data = Data retained for compliance and reference Privacy = The appropriate use of personal information by third parties</p> Signup and view all the answers

The process ends after the exchange of data using the symmetric key.

<p>True (A)</p> Signup and view all the answers

Cultural and age differences influence individuals' views on privacy.

<p>True (A)</p> Signup and view all the answers

What should be maintained by KMS for decrypting backup data and archives?

<p>multiple, timestamped versions of keys</p> Signup and view all the answers

Flashcards

Confidentiality threats

An attacker tries to gain access to private information held by the system.

Availability threats

An attacker tries to disrupt the availability of a system or its resources, preventing legitimate users from accessing or using them.

Integrity threats

An attacker alters or corrupts data, making it inaccurate or unusable.

Ransomware

A type of integrity threat where malicious software encrypts data and demands a ransom for its release.

Signup and view all the flashcards

Distributed denial of service (DDoS) attack

A type of availability threat where an attacker overwhelms a system with requests, making it unavailable to legitimate users.

Signup and view all the flashcards

Virus

A type of integrity threat where malicious software replicates itself and spreads to other systems.

Signup and view all the flashcards

Authentication and authorization

Procedures and standards designed to ensure that users have appropriate access levels and permissions to system resources.

Signup and view all the flashcards

System infrastructure management

Practices for configuring and maintaining system infrastructure to reduce security vulnerabilities.

Signup and view all the flashcards

Attack Monitoring

Regularly checking a system for unauthorized access attempts, which may involve identifying potential threats and implementing mitigation strategies to minimize damage.

Signup and view all the flashcards

Backup Policy

Maintaining copies of data and programs to restore after a system compromise or data loss.

Signup and view all the flashcards

Operational Security

Practices that aim to help users safeguard their accounts and prevent unauthorized access by teaching secure habits and implementing safeguards.

Signup and view all the flashcards

User Attack

A type of cyberattack designed to trick users into disclosing their login information or directing them to malicious websites.

Signup and view all the flashcards

Auto-Logout

A system that automatically logs users out after a period of inactivity, preventing unauthorized access to shared computers.

Signup and view all the flashcards

User Command Logging

A tool for tracking user actions on a system, helping identify misuse or accidental damage.

Signup and view all the flashcards

Multi-factor Authentication

A security method that requires multiple forms of authentication, like passwords and unique codes, to access a system, making it harder for unauthorized users to gain access.

Signup and view all the flashcards

Injection Attack

A type of attack where malicious code or commands are injected through legitimate input fields, exploiting vulnerabilities in software to cause damage or steal data.

Signup and view all the flashcards

Denial of Service (DoS) Attack

A type of security attack that aims to prevent legitimate users from accessing a web application by overwhelming it with requests. Often the attacker uses a network of compromised computers to flood the target system with traffic.

Signup and view all the flashcards

User Lockout

A common authentication policy that locks out a user's account after a certain number of failed login attempts. This is designed to prevent brute force attacks by limiting the number of tries.

Signup and view all the flashcards

User Lockout Attack

A security attack that targets a user's account by trying to guess their password. Attackers often use lists of common passwords or brute force methods to systematically guess passwords.

Signup and view all the flashcards

Brute Force Attack

A type of cyberattack where an attacker attempts to gain access to a system by trying different passwords until the correct one is found. This can be done using automated tools that try various combinations of characters.

Signup and view all the flashcards

Authentication

A method of verifying a user's identity, ensuring that they are who they claim to be. Authentication is critical for maintaining user privacy and security.

Signup and view all the flashcards

Password Dictionary Attack

Using lists of common or leaked passwords during a brute force attack to quickly test if a user has a weak password. Attackers often start with these lists to try and quickly find a match.

Signup and view all the flashcards

Rate Limiting

Websites and applications use this method to prevent attacks from automating brute-force password attempts. Implementations vary, but they often restrict the number of login attempts allowed per unit of time or IP address.

Signup and view all the flashcards

Strong Password

Creating secure passwords that are difficult for attackers to guess. Strong passwords are typically long, contain a mix of uppercase and lowercase letters, numbers, and symbols, and are not easily found in dictionaries or commonly used phrases.

Signup and view all the flashcards

Encryption

The process of transforming data into an unreadable format using an algorithm and a secret key.

Signup and view all the flashcards

User Groups

A group of users with pre-defined permissions assigned to them, allowing for efficient management of access control.

Signup and view all the flashcards

Access Control List (ACL)

A list that defines which users or groups have access to a specific resource and what actions they are allowed to perform.

Signup and view all the flashcards

Attribute-based access control

A technique for managing access control by assigning permissions to resources based on user attributes, such as department or student ID.

Signup and view all the flashcards

Role-based access control (RBAC)

An approach where permissions are assigned based on specific roles or functions within an organization.

Signup and view all the flashcards

Symmetric Encryption

A potentially insecure method of encryption that relies on a publicly known algorithm and a secret key shared between the sender and receiver.

Signup and view all the flashcards

Asymmetric Encryption

A more secure encryption method that uses separate keys for encryption and decryption, enhancing security.

Signup and view all the flashcards

Secret Key Encryption

A method of encryption that uses a shared secret key to encrypt and decrypt data, ensuring confidentiality and authenticity.

Signup and view all the flashcards

Key Management System (KMS)

The system used for storing, managing, and controlling encryption keys.

Signup and view all the flashcards

Key Store

A system where encrypted data is stored and can be decrypted using specific keys.

Signup and view all the flashcards

Long-Term Key Storage

The practice of ensuring that data stored for long periods, like financial records, is securely encrypted.

Signup and view all the flashcards

Privacy

The right to control how personal information is collected, used, and disseminated.

Signup and view all the flashcards

Third-Party Data Holder

An organization that holds personal information belonging to individuals, such as companies or hospitals.

Signup and view all the flashcards

Privacy Sensitivity

The level of comfort individuals have in sharing personal information online, often influenced by age and culture.

Signup and view all the flashcards

Social Networks

Platforms that allow users to connect and share information, often involving personal data.

Signup and view all the flashcards

Sharing Personal Information Online

The practice of disclosing more personal information online than older generations, often associated with early social media adoption.

Signup and view all the flashcards

What is the significance of the server's public key in TLS?

The server's public key is a crucial piece of information included within the digital certificate sent from the server to the client during the TLS handshake. This key is used to establish a secure connection.

Signup and view all the flashcards

How does TLS combine symmetric and asymmetric encryption?

The TLS (Transport Layer Security) protocol leverages both symmetric and asymmetric encryption for secure communication. Symmetric encryption, fast but requiring a shared key, is used for data exchange. Asymmetric encryption, slower but key exchange is secured using public and private keys, is used for initial key exchange.

Signup and view all the flashcards

Why is certificate verification critical in TLS?

Before establishing secure communication through TLS, the client needs to verify that the certificate provided by the server is genuinely issued by a trusted Certificate Authority (CA) and hasn't expired.

Signup and view all the flashcards

What crucial role does the 'RS' play in the TLS handshake?

The 'RS' stands for 'random number' (RS). This large random number is specifically chosen to be unique for each TLS session and is essential for generating the shared symmetric key used in secure communication.

Signup and view all the flashcards

How is the symmetric key computed in TLS?

This is a crucial step where both the server and client use a combination of the randomly generated 'RS' and 'RC' values, along with their corresponding private keys, to derive the same, shared, symmetric key used for secure communication.

Signup and view all the flashcards

What are the key objectives of the TLS handshake?

The TLS handshake proves the server's identity by the client verifying the digital certificate and ensures both parties have the same shared key for secure communication.

Signup and view all the flashcards

How does the client use the server's public key during the handshake?

The client uses the server's public key to decrypt the 'encrypted RS'. This is crucial for secure initial key exchange with the server using asymmetric encryption.

Signup and view all the flashcards

What is the TLS handshake?

The TLS handshake is a process where the client and server establish a secure connection by verifying identities and setting up shared keys for data exchange.

Signup and view all the flashcards

How is the public key used in relation to the digital signature?

The public key, usually provided within a digital certificate, is used to decrypt the digital signature that verifies the certificate's authenticity and integrity. This ensures that the certificate hasn't been tampered with.

Signup and view all the flashcards

Why is the encryption algorithm important in TLS?

The encryption algorithm chosen determines the specific method used to encrypt data during communication. This selection ensures the appropriate level of security for the data exchange process.

Signup and view all the flashcards

Study Notes

Introduction to System Analysis and Design

  • BIS301 is an introductory course to System Analysis and Design
  • Lecture notes are based, in part, on work by Ian Sommerville

Software Security

  • Software security is a high priority for developers and users
  • Failure to prioritize security leads to losses from malicious attacks
  • Attacks can put product providers out of business
  • Customer data compromise leads to subscription cancellations
  • Recovery from attacks requires significant time and effort, better spent on software security

Types of Security Threats

  • Availability Threats: Attempt to deny access to legitimate users. Example: Distributed Denial of Service (DDoS) attack
  • Integrity Threats: Attempt to damage the system or its data. Example: Viruses or Ransomware
  • Confidentiality Threats: Attempt to gain access to private information. Example: Data theft

System Infrastructure Stack

  • Operational Environment
  • Application
  • Frameworks and application libraries
  • Browsers and messaging
  • System libraries
  • Database
  • Operating system
  • Software infrastructure
  • Network

Security Management

  • Authentication and Authorization: Establish standards and procedures to ensure strong authentication and proper access permissions
  • System Infrastructure Management: Ensure proper configuration and timely application of security updates to patch vulnerabilities
  • Attack Monitoring: Regularly check for unauthorized access and put in place resistance strategies to minimize the effects of detected attacks
  • Backup: Implement policies to keep undamaged copies of program and data files

Operational Security

  • Focuses on helping users maintain security
  • User attacks trick users into disclosing credentials or accessing malware-laden websites (e.g., key-logging systems)
  • Security Procedures/Practices:
    • Auto-logout: Addresses the problem of users forgetting to log out of shared computers
    • User command logging: Discovers actions taken by users that damage system resources, either deliberately or accidentally.
    • Multi-factor authentication: Reduces the chance of intruders gaining access with stolen credentials

Injection Attacks

  • Malicious users inject malicious code or commands into input fields/database commands, executing these commands.
  • This may damage the system or leak system data to attackers
  • Examples include buffer overflow attacks and SQL poisoning attacks

SQL Poisoning Attacks

  • Attacks exploit input to an SQL command
  • Malicious users utilize form input fields to insert SQL fragments that affect data access
  • This allows the attacker to get the desired information

Cross-Site Scripting Attacks

  • Another form of injection attack
  • Attacker inserts malicious JavaScript code into web pages
  • Scripts executed when pages are loaded or when pages interact with the server
  • Potential for stealing customer information or directing users to malicious websites
  • Can steal cookies, enabling session hijacking attacks
  • Avoidable with input validation

Session Hijacking Attacks

  • Attackers get hold of a session cookie to impersonate legitimate users
  • Involves capturing traffic between client and server
  • Session Hijacking can also be done by malicious scripts (like cross-site scripting attacks)
  • The attacker gets access to the session content and potentially compromise the entire session

Actions to Reduce the Likelihood of Hacking

  • Traffic Encryption: Encrypt network traffic (e.g., use https, not http) to make it harder to monitor session cookies
  • Multi-factor Authentication: Require multiple forms of authentication before a user accesses a resource or performs an action. (Example: password + one-time passcode)
  • Short Timeouts: Limit session length, requiring new authentication after inactivity reduces chances for exploitation of accounts after legitimate users forget to log out.

Denial of Service Attacks

  • Attack intends to make a system unavailable
  • Distributed Denial-of-Service (DDoS) attacks are the most common type
  • Involve numerous hijacked computers in a botnet sending flood of requests to a system, overwhelming it and denying legitimate users access
  • Other types target user authentication, locking users out for failed login attempts or using email addresses to gain unauthorized access

Brute-Force Attacks

  • Attackers try multiple combinations of login names and passwords to gain unauthorized access to the system.
  • Use brute force to gain unauthorized access to a system or account
  • Some attackers use a string generator to create all possible combinations of symbols
  • To speed things up, some attackers start by trying common passwords

Authentication

  • Verifying the identity of a user.
  • Essential for protecting sensitive information
  • Different methods depending on the system
  • Example: Knowledgeable, possession, attribute-based
  • Usage of authentication to learn about users helps personalize their product experience

Authentication Approaches

  • Knowledge: Using something the user knows. Example: password
  • Possession: Using something the user has. Example: a mobile device
  • Attribute: Using something inherent to the user. Example: fingerprint

Authentication Methods

  • Knowledge-based: Using secret/personal information
  • Possession-based: Using a physical device such as mobile phone
  • Attribute-based: Using unique biological attributes such as fingerprint

Weaknesses of Password-Based Authentication

  • Insecure passwords: Passwords that are easy-to guess are vulnerable
  • Phishing attacks: Scams that trick users into giving up passwords or login credentials
  • Password reuse: Using the same password for multiple services
  • Forgotten passwords: Security risks if password recovery mechanisms are not robust or easily exploited

Federated Identity

  • Authentication approach using external authentication services
  • Example "Login with Google" and "Login with Facebook"
  • One set of credentials stored by a trusted service
  • Easier for users and reduces chances of security breaches

Authorization

  • Determining which resources a user is permitted to access based on their identity and access control policies.
  • Examples:
    • Shared Folder permissions on Dropbox
    • Defining who has access to information and resources and the types of access.

Access Control Policies

  • Rules defining what information and programs are accessible and how.
  • Important for legal compliance and technical reasons.
  • Data protection rules limit information accessible to users.
  • Security breaches from incomplete or noncompliant policies can have legal implications
  • Can be used as the starting point for setting up a complete access control scheme. Example: access rights for different users or different groups (e.g., students)

Access Control Lists (ACLs)

  • Tables that link users with resources and specify permissible actions.
  • Can become large; groups and permissions are more efficient
  • Example: reviewers can read and annotate a document without edit or delete access

Encryption

  • Making a document unreadable by applying transformation rules
  • A secret key is the basis for transformation

Symmetric Encryption

  • Same key used for encrypting and decrypting
  • Secure message exchange requires secure key exchange
  • Security risk if the key is compromised.

Asymmetric Encryption

  • Different keys for encryption and decryption
  • Public key for encryption, private key for decryption
  • Public keys are publicly available
  • Private keys are kept secure.
  • Used for authentication and secure communication.

Encryption and Authentication

  • Asymmetric encryption can verify sender identity
  • Sender uses recipient's public key for encryption
  • Recipient uses recipient's private key for decryption

TLS and Digital Certificates

  • https protocol for secure communication over web
  • Includes a Layer for Encryption called TLS (Transport Layer Security)
  • Use of digital certificates for server validation.
  • CA (Certificate Authority) issues and validates certificates.

Encryption Levels

  • Application, database, files, media.
  • Data will be encrypted and decrypted at different levels.

Key Management

  • Process of securely generating, storing, and distributing encryption keys.
  • KMS (Key Management System) is a specialized database for key management.
  • Important for protecting data.

Long-Term Key Storage

  • Need to maintain encryption keys for long periods (e.g., financial records)
  • Archival data should use separate keys to reduce security risk
  • Key management systems need backup and timestamped key versions

Privacy

  • Social concept, encompassing collection, use, and dissemination of personal information
  • Importance varies across cultures and demographics.
  • Legal and/or ethical considerations

Business Reasons for Privacy

  • Compliance with privacy laws is critical for sales
  • Protects business products from legal action (e.g., lawsuits)
  • Reputational damage when privacy is violated

Data Protection Laws

  • Laws protecting individual privacy, limiting data collection use, etc
  • GDPR affects all companies collecting user data
  • Companies responsible for securely storing, managing and distributing data.

Data Protection Principles

  • Key aspects that must be upheld

Privacy Policy

  • Defines how an organization collects, stores, and uses sensitive data
  • Must be auditable, written in plain language.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Cybersecurity Threats Quiz
5 questions

Cybersecurity Threats Quiz

MesmerizingPrairieDog avatar
MesmerizingPrairieDog
Threats and protection mechanisms
31 questions
Use Quizgecko on...
Browser
Browser