Cybersecurity Threats and Principles
50 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following is an example of a confidentiality threat?

  • Distributed denial of service attack
  • Data theft (correct)
  • Virus
  • Ransomware
  • Ransomware primarily affects the integrity of data.

    True

    What are the two key principles that should be established according to authentication and authorization standards?

    Strong authentication and proper access permissions

    An attacker might launch a ______ to make a system unavailable to its users.

    <p>Distributed denial of service attack</p> Signup and view all the answers

    Which of the following is NOT a threat to integrity?

    <p>Cyber bullying</p> Signup and view all the answers

    Match the security threats with their categories:

    <p>Virus = Software threat Ransomware = Availability threat Data theft = Confidentiality threat Distributed denial of service = Availability threat</p> Signup and view all the answers

    Security updates should be applied as soon as they become available.

    <p>True</p> Signup and view all the answers

    What does proper system infrastructure management entail?

    <p>Proper configuration and timely security updates</p> Signup and view all the answers

    What is the main purpose of operational security?

    <p>To help users maintain security</p> Signup and view all the answers

    Multi-factor authentication increases the likelihood of an intruder gaining access to the system with stolen credentials.

    <p>False</p> Signup and view all the answers

    What should be implemented to ensure you keep undamaged copies of program and data files?

    <p>Backup policies</p> Signup and view all the answers

    SQL poisoning attacks take advantage of situations where user input is used as part of an ______.

    <p>SQL command</p> Signup and view all the answers

    Match the following types of attacks with their descriptions:

    <p>Buffer overflow attacks = Involves exceeding memory allocation limits SQL poisoning attacks = Uses malicious SQL to gain database access User command logging = Tracks user commands for security reviews Auto-logout = Automatically logs users out after inactivity</p> Signup and view all the answers

    Which of the following is NOT a strategy for minimizing the effects of an attack?

    <p>Ignoring unauthorized access</p> Signup and view all the answers

    Injection attacks utilize valid input fields to execute malicious code.

    <p>True</p> Signup and view all the answers

    What is one common type of injection attack?

    <p>SQL poisoning</p> Signup and view all the answers

    What is the main goal of user lockout attacks?

    <p>Lock users out to deny them access to the service</p> Signup and view all the answers

    Brute force attacks typically involve attackers using weak passwords.

    <p>True</p> Signup and view all the answers

    What is authentication?

    <p>The process of ensuring that a user is who they claim to be.</p> Signup and view all the answers

    Attackers create different passwords and try to login with each of these in a ________ attack.

    <p>brute force</p> Signup and view all the answers

    Match the type of attack with its definition:

    <p>User lockout attack = Locks users out after failed authentication attempts Brute force attack = Attempts multiple password combinations to gain access Authentication = Process of verifying user identity Denial of service attack = Prevents legitimate users from accessing services</p> Signup and view all the answers

    What outcome may occur if accounts are not locked after failed validation attempts?

    <p>Brute-force attacks on the system</p> Signup and view all the answers

    Authentication is only necessary for software that does not contain user information.

    <p>False</p> Signup and view all the answers

    What tactic do attackers often use to speed up brute force attacks?

    <p>Using lists of common passwords.</p> Signup and view all the answers

    What does allocating users to groups in access control manage?

    <p>Group-based permissions</p> Signup and view all the answers

    Encryption transforms readable data into an unreadable format.

    <p>True</p> Signup and view all the answers

    What is used by the encryption algorithm to transform data?

    <p>a secret key</p> Signup and view all the answers

    Modern encryption techniques can make data practically __________ using current technology.

    <p>uncrackable</p> Signup and view all the answers

    Match the following resources with their corresponding permissions:

    <p>Resource A = Read Resource B = Execute Resource C = Create, Delete Resource D = Read, Edit</p> Signup and view all the answers

    What potential future technology may necessitate a new approach to encryption on the Internet?

    <p>Quantum computing</p> Signup and view all the answers

    All encryption methods used today are guaranteed to remain secure indefinitely.

    <p>False</p> Signup and view all the answers

    What is the reverse process of encryption called?

    <p>decryption</p> Signup and view all the answers

    What does the public key of the CA include?

    <p>Key size and encryption algorithm</p> Signup and view all the answers

    The public key can be used to encrypt the digital signature.

    <p>False</p> Signup and view all the answers

    What does TLS stand for?

    <p>Transport Layer Security</p> Signup and view all the answers

    The server's public key is included in the digital __________ sent to the client.

    <p>certificate</p> Signup and view all the answers

    What is the purpose of the RS and RC numbers generated during the TLS process?

    <p>They help compute the symmetric key for data encryption.</p> Signup and view all the answers

    What is a primary function of a Key Management System (KMS)?

    <p>Maintaining encryption keys</p> Signup and view all the answers

    To verify the identity of the client, the server encrypts the RS using its public key.

    <p>False</p> Signup and view all the answers

    Data protection regulations do not require archival data to be encrypted.

    <p>False</p> Signup and view all the answers

    What is the minimum retention period for tax and company data in the UK?

    <p>six years</p> Signup and view all the answers

    What needs to be checked regarding the digital certificate sent from the server?

    <p>Issuer and validity</p> Signup and view all the answers

    Younger people tend to be less inhibited about sharing personal information on ______.

    <p>social networks</p> Signup and view all the answers

    Data is exchanged using a __________ key computed from RS and RC.

    <p>symmetric</p> Signup and view all the answers

    Why should encryption keys be changed regularly?

    <p>To reduce the risk of security breaches</p> Signup and view all the answers

    Match the following components with their roles in TLS:

    <p>Public key = Used to decrypt the digital signature Private key = Encrypts the RS Digital certificate = Includes the server's public key Symmetric key = Used to encrypt data during the session</p> Signup and view all the answers

    Match the following terms with their correct definitions:

    <p>Encryption = The process of converting data into a secure format Key Management System = A system for managing encryption keys Archival Data = Data retained for compliance and reference Privacy = The appropriate use of personal information by third parties</p> Signup and view all the answers

    The process ends after the exchange of data using the symmetric key.

    <p>True</p> Signup and view all the answers

    Cultural and age differences influence individuals' views on privacy.

    <p>True</p> Signup and view all the answers

    What should be maintained by KMS for decrypting backup data and archives?

    <p>multiple, timestamped versions of keys</p> Signup and view all the answers

    Study Notes

    Introduction to System Analysis and Design

    • BIS301 is an introductory course to System Analysis and Design
    • Lecture notes are based, in part, on work by Ian Sommerville

    Software Security

    • Software security is a high priority for developers and users
    • Failure to prioritize security leads to losses from malicious attacks
    • Attacks can put product providers out of business
    • Customer data compromise leads to subscription cancellations
    • Recovery from attacks requires significant time and effort, better spent on software security

    Types of Security Threats

    • Availability Threats: Attempt to deny access to legitimate users. Example: Distributed Denial of Service (DDoS) attack
    • Integrity Threats: Attempt to damage the system or its data. Example: Viruses or Ransomware
    • Confidentiality Threats: Attempt to gain access to private information. Example: Data theft

    System Infrastructure Stack

    • Operational Environment
    • Application
    • Frameworks and application libraries
    • Browsers and messaging
    • System libraries
    • Database
    • Operating system
    • Software infrastructure
    • Network

    Security Management

    • Authentication and Authorization: Establish standards and procedures to ensure strong authentication and proper access permissions
    • System Infrastructure Management: Ensure proper configuration and timely application of security updates to patch vulnerabilities
    • Attack Monitoring: Regularly check for unauthorized access and put in place resistance strategies to minimize the effects of detected attacks
    • Backup: Implement policies to keep undamaged copies of program and data files

    Operational Security

    • Focuses on helping users maintain security
    • User attacks trick users into disclosing credentials or accessing malware-laden websites (e.g., key-logging systems)
    • Security Procedures/Practices:
      • Auto-logout: Addresses the problem of users forgetting to log out of shared computers
      • User command logging: Discovers actions taken by users that damage system resources, either deliberately or accidentally.
      • Multi-factor authentication: Reduces the chance of intruders gaining access with stolen credentials

    Injection Attacks

    • Malicious users inject malicious code or commands into input fields/database commands, executing these commands.
    • This may damage the system or leak system data to attackers
    • Examples include buffer overflow attacks and SQL poisoning attacks

    SQL Poisoning Attacks

    • Attacks exploit input to an SQL command
    • Malicious users utilize form input fields to insert SQL fragments that affect data access
    • This allows the attacker to get the desired information

    Cross-Site Scripting Attacks

    • Another form of injection attack
    • Attacker inserts malicious JavaScript code into web pages
    • Scripts executed when pages are loaded or when pages interact with the server
    • Potential for stealing customer information or directing users to malicious websites
    • Can steal cookies, enabling session hijacking attacks
    • Avoidable with input validation

    Session Hijacking Attacks

    • Attackers get hold of a session cookie to impersonate legitimate users
    • Involves capturing traffic between client and server
    • Session Hijacking can also be done by malicious scripts (like cross-site scripting attacks)
    • The attacker gets access to the session content and potentially compromise the entire session

    Actions to Reduce the Likelihood of Hacking

    • Traffic Encryption: Encrypt network traffic (e.g., use https, not http) to make it harder to monitor session cookies
    • Multi-factor Authentication: Require multiple forms of authentication before a user accesses a resource or performs an action. (Example: password + one-time passcode)
    • Short Timeouts: Limit session length, requiring new authentication after inactivity reduces chances for exploitation of accounts after legitimate users forget to log out.

    Denial of Service Attacks

    • Attack intends to make a system unavailable
    • Distributed Denial-of-Service (DDoS) attacks are the most common type
    • Involve numerous hijacked computers in a botnet sending flood of requests to a system, overwhelming it and denying legitimate users access
    • Other types target user authentication, locking users out for failed login attempts or using email addresses to gain unauthorized access

    Brute-Force Attacks

    • Attackers try multiple combinations of login names and passwords to gain unauthorized access to the system.
    • Use brute force to gain unauthorized access to a system or account
    • Some attackers use a string generator to create all possible combinations of symbols
    • To speed things up, some attackers start by trying common passwords

    Authentication

    • Verifying the identity of a user.
    • Essential for protecting sensitive information
    • Different methods depending on the system
    • Example: Knowledgeable, possession, attribute-based
    • Usage of authentication to learn about users helps personalize their product experience

    Authentication Approaches

    • Knowledge: Using something the user knows. Example: password
    • Possession: Using something the user has. Example: a mobile device
    • Attribute: Using something inherent to the user. Example: fingerprint

    Authentication Methods

    • Knowledge-based: Using secret/personal information
    • Possession-based: Using a physical device such as mobile phone
    • Attribute-based: Using unique biological attributes such as fingerprint

    Weaknesses of Password-Based Authentication

    • Insecure passwords: Passwords that are easy-to guess are vulnerable
    • Phishing attacks: Scams that trick users into giving up passwords or login credentials
    • Password reuse: Using the same password for multiple services
    • Forgotten passwords: Security risks if password recovery mechanisms are not robust or easily exploited

    Federated Identity

    • Authentication approach using external authentication services
    • Example "Login with Google" and "Login with Facebook"
    • One set of credentials stored by a trusted service
    • Easier for users and reduces chances of security breaches

    Authorization

    • Determining which resources a user is permitted to access based on their identity and access control policies.
    • Examples:
      • Shared Folder permissions on Dropbox
      • Defining who has access to information and resources and the types of access.

    Access Control Policies

    • Rules defining what information and programs are accessible and how.
    • Important for legal compliance and technical reasons.
    • Data protection rules limit information accessible to users.
    • Security breaches from incomplete or noncompliant policies can have legal implications
    • Can be used as the starting point for setting up a complete access control scheme. Example: access rights for different users or different groups (e.g., students)

    Access Control Lists (ACLs)

    • Tables that link users with resources and specify permissible actions.
    • Can become large; groups and permissions are more efficient
    • Example: reviewers can read and annotate a document without edit or delete access

    Encryption

    • Making a document unreadable by applying transformation rules
    • A secret key is the basis for transformation

    Symmetric Encryption

    • Same key used for encrypting and decrypting
    • Secure message exchange requires secure key exchange
    • Security risk if the key is compromised.

    Asymmetric Encryption

    • Different keys for encryption and decryption
    • Public key for encryption, private key for decryption
    • Public keys are publicly available
    • Private keys are kept secure.
    • Used for authentication and secure communication.

    Encryption and Authentication

    • Asymmetric encryption can verify sender identity
    • Sender uses recipient's public key for encryption
    • Recipient uses recipient's private key for decryption

    TLS and Digital Certificates

    • https protocol for secure communication over web
    • Includes a Layer for Encryption called TLS (Transport Layer Security)
    • Use of digital certificates for server validation.
    • CA (Certificate Authority) issues and validates certificates.

    Encryption Levels

    • Application, database, files, media.
    • Data will be encrypted and decrypted at different levels.

    Key Management

    • Process of securely generating, storing, and distributing encryption keys.
    • KMS (Key Management System) is a specialized database for key management.
    • Important for protecting data.

    Long-Term Key Storage

    • Need to maintain encryption keys for long periods (e.g., financial records)
    • Archival data should use separate keys to reduce security risk
    • Key management systems need backup and timestamped key versions

    Privacy

    • Social concept, encompassing collection, use, and dissemination of personal information
    • Importance varies across cultures and demographics.
    • Legal and/or ethical considerations

    Business Reasons for Privacy

    • Compliance with privacy laws is critical for sales
    • Protects business products from legal action (e.g., lawsuits)
    • Reputational damage when privacy is violated

    Data Protection Laws

    • Laws protecting individual privacy, limiting data collection use, etc
    • GDPR affects all companies collecting user data
    • Companies responsible for securely storing, managing and distributing data.

    Data Protection Principles

    • Key aspects that must be upheld

    Privacy Policy

    • Defines how an organization collects, stores, and uses sensitive data
    • Must be auditable, written in plain language.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    Test your knowledge on various cybersecurity threats, including confidentiality and integrity concerns. This quiz will also cover key principles related to authentication and authorization standards. Assess your understanding of proper system management practices as well.

    More Like This

    Cybersecurity Threats Quiz
    5 questions

    Cybersecurity Threats Quiz

    MesmerizingPrairieDog avatar
    MesmerizingPrairieDog
    Threats and protection mechanisms
    31 questions
    Basics of Cybersecurity: Threats & Vulnerabilities
    48 questions
    Use Quizgecko on...
    Browser
    Browser