Podcast
Questions and Answers
Which of the following is an example of a confidentiality threat?
Which of the following is an example of a confidentiality threat?
- Distributed denial of service attack
- Data theft (correct)
- Virus
- Ransomware
Ransomware primarily affects the integrity of data.
Ransomware primarily affects the integrity of data.
True (A)
What are the two key principles that should be established according to authentication and authorization standards?
What are the two key principles that should be established according to authentication and authorization standards?
Strong authentication and proper access permissions
An attacker might launch a ______ to make a system unavailable to its users.
An attacker might launch a ______ to make a system unavailable to its users.
Which of the following is NOT a threat to integrity?
Which of the following is NOT a threat to integrity?
Match the security threats with their categories:
Match the security threats with their categories:
Security updates should be applied as soon as they become available.
Security updates should be applied as soon as they become available.
What does proper system infrastructure management entail?
What does proper system infrastructure management entail?
What is the main purpose of operational security?
What is the main purpose of operational security?
Multi-factor authentication increases the likelihood of an intruder gaining access to the system with stolen credentials.
Multi-factor authentication increases the likelihood of an intruder gaining access to the system with stolen credentials.
What should be implemented to ensure you keep undamaged copies of program and data files?
What should be implemented to ensure you keep undamaged copies of program and data files?
SQL poisoning attacks take advantage of situations where user input is used as part of an ______.
SQL poisoning attacks take advantage of situations where user input is used as part of an ______.
Match the following types of attacks with their descriptions:
Match the following types of attacks with their descriptions:
Which of the following is NOT a strategy for minimizing the effects of an attack?
Which of the following is NOT a strategy for minimizing the effects of an attack?
Injection attacks utilize valid input fields to execute malicious code.
Injection attacks utilize valid input fields to execute malicious code.
What is one common type of injection attack?
What is one common type of injection attack?
What is the main goal of user lockout attacks?
What is the main goal of user lockout attacks?
Brute force attacks typically involve attackers using weak passwords.
Brute force attacks typically involve attackers using weak passwords.
What is authentication?
What is authentication?
Attackers create different passwords and try to login with each of these in a ________ attack.
Attackers create different passwords and try to login with each of these in a ________ attack.
Match the type of attack with its definition:
Match the type of attack with its definition:
What outcome may occur if accounts are not locked after failed validation attempts?
What outcome may occur if accounts are not locked after failed validation attempts?
Authentication is only necessary for software that does not contain user information.
Authentication is only necessary for software that does not contain user information.
What tactic do attackers often use to speed up brute force attacks?
What tactic do attackers often use to speed up brute force attacks?
What does allocating users to groups in access control manage?
What does allocating users to groups in access control manage?
Encryption transforms readable data into an unreadable format.
Encryption transforms readable data into an unreadable format.
What is used by the encryption algorithm to transform data?
What is used by the encryption algorithm to transform data?
Modern encryption techniques can make data practically __________ using current technology.
Modern encryption techniques can make data practically __________ using current technology.
Match the following resources with their corresponding permissions:
Match the following resources with their corresponding permissions:
What potential future technology may necessitate a new approach to encryption on the Internet?
What potential future technology may necessitate a new approach to encryption on the Internet?
All encryption methods used today are guaranteed to remain secure indefinitely.
All encryption methods used today are guaranteed to remain secure indefinitely.
What is the reverse process of encryption called?
What is the reverse process of encryption called?
What does the public key of the CA include?
What does the public key of the CA include?
The public key can be used to encrypt the digital signature.
The public key can be used to encrypt the digital signature.
What does TLS stand for?
What does TLS stand for?
The server's public key is included in the digital __________ sent to the client.
The server's public key is included in the digital __________ sent to the client.
What is the purpose of the RS and RC numbers generated during the TLS process?
What is the purpose of the RS and RC numbers generated during the TLS process?
What is a primary function of a Key Management System (KMS)?
What is a primary function of a Key Management System (KMS)?
To verify the identity of the client, the server encrypts the RS using its public key.
To verify the identity of the client, the server encrypts the RS using its public key.
Data protection regulations do not require archival data to be encrypted.
Data protection regulations do not require archival data to be encrypted.
What is the minimum retention period for tax and company data in the UK?
What is the minimum retention period for tax and company data in the UK?
What needs to be checked regarding the digital certificate sent from the server?
What needs to be checked regarding the digital certificate sent from the server?
Younger people tend to be less inhibited about sharing personal information on ______.
Younger people tend to be less inhibited about sharing personal information on ______.
Data is exchanged using a __________ key computed from RS and RC.
Data is exchanged using a __________ key computed from RS and RC.
Why should encryption keys be changed regularly?
Why should encryption keys be changed regularly?
Match the following components with their roles in TLS:
Match the following components with their roles in TLS:
Match the following terms with their correct definitions:
Match the following terms with their correct definitions:
The process ends after the exchange of data using the symmetric key.
The process ends after the exchange of data using the symmetric key.
Cultural and age differences influence individuals' views on privacy.
Cultural and age differences influence individuals' views on privacy.
What should be maintained by KMS for decrypting backup data and archives?
What should be maintained by KMS for decrypting backup data and archives?
Flashcards
Confidentiality threats
Confidentiality threats
An attacker tries to gain access to private information held by the system.
Availability threats
Availability threats
An attacker tries to disrupt the availability of a system or its resources, preventing legitimate users from accessing or using them.
Integrity threats
Integrity threats
An attacker alters or corrupts data, making it inaccurate or unusable.
Ransomware
Ransomware
Signup and view all the flashcards
Distributed denial of service (DDoS) attack
Distributed denial of service (DDoS) attack
Signup and view all the flashcards
Virus
Virus
Signup and view all the flashcards
Authentication and authorization
Authentication and authorization
Signup and view all the flashcards
System infrastructure management
System infrastructure management
Signup and view all the flashcards
Attack Monitoring
Attack Monitoring
Signup and view all the flashcards
Backup Policy
Backup Policy
Signup and view all the flashcards
Operational Security
Operational Security
Signup and view all the flashcards
User Attack
User Attack
Signup and view all the flashcards
Auto-Logout
Auto-Logout
Signup and view all the flashcards
User Command Logging
User Command Logging
Signup and view all the flashcards
Multi-factor Authentication
Multi-factor Authentication
Signup and view all the flashcards
Injection Attack
Injection Attack
Signup and view all the flashcards
Denial of Service (DoS) Attack
Denial of Service (DoS) Attack
Signup and view all the flashcards
User Lockout
User Lockout
Signup and view all the flashcards
User Lockout Attack
User Lockout Attack
Signup and view all the flashcards
Brute Force Attack
Brute Force Attack
Signup and view all the flashcards
Authentication
Authentication
Signup and view all the flashcards
Password Dictionary Attack
Password Dictionary Attack
Signup and view all the flashcards
Rate Limiting
Rate Limiting
Signup and view all the flashcards
Strong Password
Strong Password
Signup and view all the flashcards
Encryption
Encryption
Signup and view all the flashcards
User Groups
User Groups
Signup and view all the flashcards
Access Control List (ACL)
Access Control List (ACL)
Signup and view all the flashcards
Attribute-based access control
Attribute-based access control
Signup and view all the flashcards
Role-based access control (RBAC)
Role-based access control (RBAC)
Signup and view all the flashcards
Symmetric Encryption
Symmetric Encryption
Signup and view all the flashcards
Asymmetric Encryption
Asymmetric Encryption
Signup and view all the flashcards
Secret Key Encryption
Secret Key Encryption
Signup and view all the flashcards
Key Management System (KMS)
Key Management System (KMS)
Signup and view all the flashcards
Key Store
Key Store
Signup and view all the flashcards
Long-Term Key Storage
Long-Term Key Storage
Signup and view all the flashcards
Privacy
Privacy
Signup and view all the flashcards
Third-Party Data Holder
Third-Party Data Holder
Signup and view all the flashcards
Privacy Sensitivity
Privacy Sensitivity
Signup and view all the flashcards
Social Networks
Social Networks
Signup and view all the flashcards
Sharing Personal Information Online
Sharing Personal Information Online
Signup and view all the flashcards
What is the significance of the server's public key in TLS?
What is the significance of the server's public key in TLS?
Signup and view all the flashcards
How does TLS combine symmetric and asymmetric encryption?
How does TLS combine symmetric and asymmetric encryption?
Signup and view all the flashcards
Why is certificate verification critical in TLS?
Why is certificate verification critical in TLS?
Signup and view all the flashcards
What crucial role does the 'RS' play in the TLS handshake?
What crucial role does the 'RS' play in the TLS handshake?
Signup and view all the flashcards
How is the symmetric key computed in TLS?
How is the symmetric key computed in TLS?
Signup and view all the flashcards
What are the key objectives of the TLS handshake?
What are the key objectives of the TLS handshake?
Signup and view all the flashcards
How does the client use the server's public key during the handshake?
How does the client use the server's public key during the handshake?
Signup and view all the flashcards
What is the TLS handshake?
What is the TLS handshake?
Signup and view all the flashcards
How is the public key used in relation to the digital signature?
How is the public key used in relation to the digital signature?
Signup and view all the flashcards
Why is the encryption algorithm important in TLS?
Why is the encryption algorithm important in TLS?
Signup and view all the flashcards
Study Notes
Introduction to System Analysis and Design
- BIS301 is an introductory course to System Analysis and Design
- Lecture notes are based, in part, on work by Ian Sommerville
Software Security
- Software security is a high priority for developers and users
- Failure to prioritize security leads to losses from malicious attacks
- Attacks can put product providers out of business
- Customer data compromise leads to subscription cancellations
- Recovery from attacks requires significant time and effort, better spent on software security
Types of Security Threats
- Availability Threats: Attempt to deny access to legitimate users. Example: Distributed Denial of Service (DDoS) attack
- Integrity Threats: Attempt to damage the system or its data. Example: Viruses or Ransomware
- Confidentiality Threats: Attempt to gain access to private information. Example: Data theft
System Infrastructure Stack
- Operational Environment
- Application
- Frameworks and application libraries
- Browsers and messaging
- System libraries
- Database
- Operating system
- Software infrastructure
- Network
Security Management
- Authentication and Authorization: Establish standards and procedures to ensure strong authentication and proper access permissions
- System Infrastructure Management: Ensure proper configuration and timely application of security updates to patch vulnerabilities
- Attack Monitoring: Regularly check for unauthorized access and put in place resistance strategies to minimize the effects of detected attacks
- Backup: Implement policies to keep undamaged copies of program and data files
Operational Security
- Focuses on helping users maintain security
- User attacks trick users into disclosing credentials or accessing malware-laden websites (e.g., key-logging systems)
- Security Procedures/Practices:
- Auto-logout: Addresses the problem of users forgetting to log out of shared computers
- User command logging: Discovers actions taken by users that damage system resources, either deliberately or accidentally.
- Multi-factor authentication: Reduces the chance of intruders gaining access with stolen credentials
Injection Attacks
- Malicious users inject malicious code or commands into input fields/database commands, executing these commands.
- This may damage the system or leak system data to attackers
- Examples include buffer overflow attacks and SQL poisoning attacks
SQL Poisoning Attacks
- Attacks exploit input to an SQL command
- Malicious users utilize form input fields to insert SQL fragments that affect data access
- This allows the attacker to get the desired information
Cross-Site Scripting Attacks
- Another form of injection attack
- Attacker inserts malicious JavaScript code into web pages
- Scripts executed when pages are loaded or when pages interact with the server
- Potential for stealing customer information or directing users to malicious websites
- Can steal cookies, enabling session hijacking attacks
- Avoidable with input validation
Session Hijacking Attacks
- Attackers get hold of a session cookie to impersonate legitimate users
- Involves capturing traffic between client and server
- Session Hijacking can also be done by malicious scripts (like cross-site scripting attacks)
- The attacker gets access to the session content and potentially compromise the entire session
Actions to Reduce the Likelihood of Hacking
- Traffic Encryption: Encrypt network traffic (e.g., use https, not http) to make it harder to monitor session cookies
- Multi-factor Authentication: Require multiple forms of authentication before a user accesses a resource or performs an action. (Example: password + one-time passcode)
- Short Timeouts: Limit session length, requiring new authentication after inactivity reduces chances for exploitation of accounts after legitimate users forget to log out.
Denial of Service Attacks
- Attack intends to make a system unavailable
- Distributed Denial-of-Service (DDoS) attacks are the most common type
- Involve numerous hijacked computers in a botnet sending flood of requests to a system, overwhelming it and denying legitimate users access
- Other types target user authentication, locking users out for failed login attempts or using email addresses to gain unauthorized access
Brute-Force Attacks
- Attackers try multiple combinations of login names and passwords to gain unauthorized access to the system.
- Use brute force to gain unauthorized access to a system or account
- Some attackers use a string generator to create all possible combinations of symbols
- To speed things up, some attackers start by trying common passwords
Authentication
- Verifying the identity of a user.
- Essential for protecting sensitive information
- Different methods depending on the system
- Example: Knowledgeable, possession, attribute-based
- Usage of authentication to learn about users helps personalize their product experience
Authentication Approaches
- Knowledge: Using something the user knows. Example: password
- Possession: Using something the user has. Example: a mobile device
- Attribute: Using something inherent to the user. Example: fingerprint
Authentication Methods
- Knowledge-based: Using secret/personal information
- Possession-based: Using a physical device such as mobile phone
- Attribute-based: Using unique biological attributes such as fingerprint
Weaknesses of Password-Based Authentication
- Insecure passwords: Passwords that are easy-to guess are vulnerable
- Phishing attacks: Scams that trick users into giving up passwords or login credentials
- Password reuse: Using the same password for multiple services
- Forgotten passwords: Security risks if password recovery mechanisms are not robust or easily exploited
Federated Identity
- Authentication approach using external authentication services
- Example "Login with Google" and "Login with Facebook"
- One set of credentials stored by a trusted service
- Easier for users and reduces chances of security breaches
Authorization
- Determining which resources a user is permitted to access based on their identity and access control policies.
- Examples:
- Shared Folder permissions on Dropbox
- Defining who has access to information and resources and the types of access.
Access Control Policies
- Rules defining what information and programs are accessible and how.
- Important for legal compliance and technical reasons.
- Data protection rules limit information accessible to users.
- Security breaches from incomplete or noncompliant policies can have legal implications
- Can be used as the starting point for setting up a complete access control scheme. Example: access rights for different users or different groups (e.g., students)
Access Control Lists (ACLs)
- Tables that link users with resources and specify permissible actions.
- Can become large; groups and permissions are more efficient
- Example: reviewers can read and annotate a document without edit or delete access
Encryption
- Making a document unreadable by applying transformation rules
- A secret key is the basis for transformation
Symmetric Encryption
- Same key used for encrypting and decrypting
- Secure message exchange requires secure key exchange
- Security risk if the key is compromised.
Asymmetric Encryption
- Different keys for encryption and decryption
- Public key for encryption, private key for decryption
- Public keys are publicly available
- Private keys are kept secure.
- Used for authentication and secure communication.
Encryption and Authentication
- Asymmetric encryption can verify sender identity
- Sender uses recipient's public key for encryption
- Recipient uses recipient's private key for decryption
TLS and Digital Certificates
- https protocol for secure communication over web
- Includes a Layer for Encryption called TLS (Transport Layer Security)
- Use of digital certificates for server validation.
- CA (Certificate Authority) issues and validates certificates.
Encryption Levels
- Application, database, files, media.
- Data will be encrypted and decrypted at different levels.
Key Management
- Process of securely generating, storing, and distributing encryption keys.
- KMS (Key Management System) is a specialized database for key management.
- Important for protecting data.
Long-Term Key Storage
- Need to maintain encryption keys for long periods (e.g., financial records)
- Archival data should use separate keys to reduce security risk
- Key management systems need backup and timestamped key versions
Privacy
- Social concept, encompassing collection, use, and dissemination of personal information
- Importance varies across cultures and demographics.
- Legal and/or ethical considerations
Business Reasons for Privacy
- Compliance with privacy laws is critical for sales
- Protects business products from legal action (e.g., lawsuits)
- Reputational damage when privacy is violated
Data Protection Laws
- Laws protecting individual privacy, limiting data collection use, etc
- GDPR affects all companies collecting user data
- Companies responsible for securely storing, managing and distributing data.
Data Protection Principles
- Key aspects that must be upheld
Privacy Policy
- Defines how an organization collects, stores, and uses sensitive data
- Must be auditable, written in plain language.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.