Podcast
Questions and Answers
Which access control model enables the resource owner to specify access permissions for subjects?
Which access control model enables the resource owner to specify access permissions for subjects?
- Attribute-Based Access Control
- Role-Based Access Control
- Discretionary Access Control (correct)
- Mandatory Access Control
What are the layers of the TCP/IP model from bottom to top?
What are the layers of the TCP/IP model from bottom to top?
- Application, Transport, Internet, Network Interface (correct)
- Link, Internet, Network, Application
- Network, Transport, Link, Internet
- Transport, Network, Application, Session
If the client's private key is Kc = 13 and the public parameter is p = 1013 with generator 2, what is the client's public key?
If the client's private key is Kc = 13 and the public parameter is p = 1013 with generator 2, what is the client's public key?
- 409
- 819
- 154
- 763 (correct)
What shared secret information is exchanged between the client and server if the server's private key is Ks = 11?
What shared secret information is exchanged between the client and server if the server's private key is Ks = 11?
What is the encryption key in hexadecimal form after applying MD5 to the shared secret information with ASCII encoding?
What is the encryption key in hexadecimal form after applying MD5 to the shared secret information with ASCII encoding?
What does the Enigma machine allow for in its encryption process?
What does the Enigma machine allow for in its encryption process?
In the context of the Advanced Encryption Standard (AES), which component is responsible for performing substitutions on the input data?
In the context of the Advanced Encryption Standard (AES), which component is responsible for performing substitutions on the input data?
Which mode of operation does not allow for probabilistic encryption?
Which mode of operation does not allow for probabilistic encryption?
What is indicated by the term 'avalanche effect' in cryptography?
What is indicated by the term 'avalanche effect' in cryptography?
Which statement about MAC algorithms is incorrect?
Which statement about MAC algorithms is incorrect?
When utilizing block ciphers, what is a crucial step to maintain confidentiality?
When utilizing block ciphers, what is a crucial step to maintain confidentiality?
What is the significance of the Rijndael S-box in the AES?
What is the significance of the Rijndael S-box in the AES?
How does the Counter mode (CTR) function in terms of encryption?
How does the Counter mode (CTR) function in terms of encryption?
Which access control model uses attributes of the user, resource, and environment to control access?
Which access control model uses attributes of the user, resource, and environment to control access?
What does a low false nonmatch rate in biometric systems primarily ensure?
What does a low false nonmatch rate in biometric systems primarily ensure?
Is multi-factor authentication generally more secure than single-factor authentication?
Is multi-factor authentication generally more secure than single-factor authentication?
Which statement regarding file permissions is incorrect based on the output of 'ls -l /sbin'?
Which statement regarding file permissions is incorrect based on the output of 'ls -l /sbin'?
Which authentication factor is demonstrated when Martin uses his employee card?
Which authentication factor is demonstrated when Martin uses his employee card?
What is the consequence of restricting user passwords to a length of only 8 digits as done by Olav?
What is the consequence of restricting user passwords to a length of only 8 digits as done by Olav?
Which access control model is most appropriate for granting user access based on job functions?
Which access control model is most appropriate for granting user access based on job functions?
What character set was used in the password entry generated by Windows LAN Manager?
What character set was used in the password entry generated by Windows LAN Manager?
What is the numerical representation of the permission drwxr-xr-x for a directory?
What is the numerical representation of the permission drwxr-xr-x for a directory?
What role does salt play in common password storage techniques?
What role does salt play in common password storage techniques?
What type of entity is described as capable of accessing a resource in an access control system?
What type of entity is described as capable of accessing a resource in an access control system?
What is the default umask value for newly created directories in Linux systems?
What is the default umask value for newly created directories in Linux systems?
How does salted hashing contribute to the security of stored passwords?
How does salted hashing contribute to the security of stored passwords?
What does the term 'false acceptance rate' refer to in biometric authentication?
What does the term 'false acceptance rate' refer to in biometric authentication?
Which access control model compares security labels to determine access rights?
Which access control model compares security labels to determine access rights?
Which of the following best describes the common practice of hashing passwords with a salt?
Which of the following best describes the common practice of hashing passwords with a salt?
What significantly distinguishes public-key cryptography from symmetric encryption?
What significantly distinguishes public-key cryptography from symmetric encryption?
What does a public key certificate primarily consist of?
What does a public key certificate primarily consist of?
Who were the developers behind the RSA public-key scheme?
Who were the developers behind the RSA public-key scheme?
What is the primary purpose of the Diffie-Hellman key exchange algorithm?
What is the primary purpose of the Diffie-Hellman key exchange algorithm?
What is the limitation of the Diffie-Hellman scheme regarding the messages exchanged?
What is the limitation of the Diffie-Hellman scheme regarding the messages exchanged?
What is the main goal of digital signatures in public-key cryptography?
What is the main goal of digital signatures in public-key cryptography?
Which of the following best describes the RSA algorithm's method of operation?
Which of the following best describes the RSA algorithm's method of operation?
In symmetric key cryptography, which statement is true?
In symmetric key cryptography, which statement is true?
What umask value should be set to achieve the desired directory permissions of rwxrwxr--?
What umask value should be set to achieve the desired directory permissions of rwxrwxr--?
What is the first step in establishing a TCP connection using the TCP three-way handshake?
What is the first step in establishing a TCP connection using the TCP three-way handshake?
What does the Server send back after it receives the SYN packet from the Client?
What does the Server send back after it receives the SYN packet from the Client?
Which umask would result in directory permissions of 755?
Which umask would result in directory permissions of 755?
What primary function does DHCP serve in computer networking?
What primary function does DHCP serve in computer networking?
Which umask would result in 774 directory permissions?
Which umask would result in 774 directory permissions?
In the context of TCP connection establishment, what does the acronym 'SYN' stand for?
In the context of TCP connection establishment, what does the acronym 'SYN' stand for?
What is the final step in the TCP three-way handshake after the Client receives the SYN-ACK?
What is the final step in the TCP three-way handshake after the Client receives the SYN-ACK?
Flashcards
Enigma Machine
Enigma Machine
A cipher device used in the 20th century for secret communication.
Probabilistic Encryption
Probabilistic Encryption
Same inputs lead to different outputs in encryption.
AES (Advanced Encryption Standard)
AES (Advanced Encryption Standard)
A symmetric encryption algorithm, iterates on operations (SubBytes etc.).
SubBytes
SubBytes
Signup and view all the flashcards
Rijndael S-box
Rijndael S-box
Signup and view all the flashcards
Block Cipher Modes of Operation
Block Cipher Modes of Operation
Signup and view all the flashcards
Cipher Block Chaining (CBC)
Cipher Block Chaining (CBC)
Signup and view all the flashcards
Electronic Codebook (ECB)
Electronic Codebook (ECB)
Signup and view all the flashcards
Multi-factor authentication (MFA)
Multi-factor authentication (MFA)
Signup and view all the flashcards
User Authentication Factors
User Authentication Factors
Signup and view all the flashcards
Salted Hashing
Salted Hashing
Signup and view all the flashcards
Hashcat
Hashcat
Signup and view all the flashcards
Password Storage
Password Storage
Signup and view all the flashcards
MD5
MD5
Signup and view all the flashcards
Biometric Authentication False Match
Biometric Authentication False Match
Signup and view all the flashcards
Single-factor authentication
Single-factor authentication
Signup and view all the flashcards
Access Control Mechanisms
Access Control Mechanisms
Signup and view all the flashcards
Access Control Model: Discretionary Access Control (DAC)
Access Control Model: Discretionary Access Control (DAC)
Signup and view all the flashcards
Access Control Model: Mandatory Access Control (MAC)
Access Control Model: Mandatory Access Control (MAC)
Signup and view all the flashcards
TCP/IP Model Layers
TCP/IP Model Layers
Signup and view all the flashcards
Diffie-Hellman Key Exchange
Diffie-Hellman Key Exchange
Signup and view all the flashcards
False Nonmatch Rate
False Nonmatch Rate
Signup and view all the flashcards
False Match Rate
False Match Rate
Signup and view all the flashcards
ABAC (Attribute-Based Access Control)
ABAC (Attribute-Based Access Control)
Signup and view all the flashcards
DAC (Discretionary Access Control)
DAC (Discretionary Access Control)
Signup and view all the flashcards
RBAC (Role-Based Access Control)
RBAC (Role-Based Access Control)
Signup and view all the flashcards
MAC (Mandatory Access Control)
MAC (Mandatory Access Control)
Signup and view all the flashcards
Linux File Permissions (drwxr-xr-x)
Linux File Permissions (drwxr-xr-x)
Signup and view all the flashcards
umask (File Permission Mask)
umask (File Permission Mask)
Signup and view all the flashcards
TCP/IP model
TCP/IP model
Signup and view all the flashcards
TCP Three-Way Handshake
TCP Three-Way Handshake
Signup and view all the flashcards
DHCP
DHCP
Signup and view all the flashcards
UMASK
UMASK
Signup and view all the flashcards
Octal Permissions
Octal Permissions
Signup and view all the flashcards
Default Directory Permissions
Default Directory Permissions
Signup and view all the flashcards
Setting Directory Permissions
Setting Directory Permissions
Signup and view all the flashcards
Public-key cryptography
Public-key cryptography
Signup and view all the flashcards
Public-key certificate
Public-key certificate
Signup and view all the flashcards
Digital signature
Digital signature
Signup and view all the flashcards
What is a certificate authority (CA)?
What is a certificate authority (CA)?
Signup and view all the flashcards
How does symmetric key cryptography differ from public-key cryptography?
How does symmetric key cryptography differ from public-key cryptography?
Signup and view all the flashcards
Why is public-key cryptography considered more secure than symmetric key cryptography for key distribution?
Why is public-key cryptography considered more secure than symmetric key cryptography for key distribution?
Signup and view all the flashcards
Study Notes
INF 140 - Introduction to Cyber Security
- Course is structured around quizzes and previous exams
- Modules cover various cybersecurity aspects
- Module 1: Overview of Cybersecurity, encompassing fundamental security design principles and attributes
- Module 2: Cryptographic tools - focusing on symmetric primitives
- Module 3: Cryptographic tools - focusing on public-key cryptography
- Module 4: User authentication
- Module 5: Access control and auditing
- Module 6: Network protocols and attacks
- Module 7: Firewalls
- Module 8: Security protocol - application security and TLS
- Module 9: Network authentication and WLAN security
- Module 10: Intrusion Detection System (IDS)
- Module 11: Malware
Quiz 1 - Overview
- Cybersecurity protects five key attributes of assets in cyberspace
- Authenticity: refers to genuine or verifiable property
- Security design principles: Open design, Principle of least privilege, Separation of privilege, etc
- Layering: multiple, overlapping protection approaches across people, technology, and operational aspects of information systems
- Adversary: Individual, group, organization, or government that conducts or intends detrimental actions against security attributes of assets
- Sabotage: Techniques intended to limit or impair the operational effectiveness of adversarial or undesirable activity within a system
- Weakness/vulnerability: refers to a weakness in an information system, procedures, internal controls, etc
Quiz 2 - Symmetric Crypto
- Key stream: 8-bit stream cipher string 01010011
- Playfair Cipher: encryption matrix used to encrypt plaintext "SECURITY"
Quiz 3 - Asymmetric Crypto
- Public-Key Cryptography (PKC): More secure than symmetric cryptography, offers key sharing convenience, and non-repudiation
- RSA: Integer factorization is a key element of security, public key e must be coprime to n.
Quiz 4 - User Authentication
- Multi-factor authentication: more secure than single-factor authentication
- User authentication methods: What a user knows, is, has, does
- Techniques involved in authentication: user ID, salt, hash(salt, password)
Quiz 5- Access Control
- Access control models: ABAC, DAC, and RBAC, use attributes of user, resources and conditions
- Administrators need to define permissions, policies and security standards for each access control model
Quiz 6 - Network Protocols and Attacks
- TCP/IP layers
- Network devices and protocols.
- Attacks: DOS and DDoS, spoofing
Quiz 7- Firewalls
- Firewall rules to block traffic incoming or outgoing based on source IP, destination IP, destination port, etc
Quiz 8 - Cryptographic Security and TLS
- Protocol for secure communication over TCP
- Handshake protocol, Change Cipher Spec Protocol, Alert Protocol
- HTTPS operates on application layer, TLS/SSL operates in Transport Layer
Quiz 9 - Network Authentication and WLAN Security
- Protocol for authentication: Password-based, Challenge-Handshake (CHAP), Extensible Authentication Protocol (EAP)
- AAA standards: RADIUS, Kerberos
- Public key systems are common in secured access
Quiz 10 - Intrusion Detection System (IDS)
- Intrusion detection and prevention systems (IDS/IPS) detect unauthorized activity in the system
- Intrusions might include: masquerader, misfeasor, clandestine user
- Detection methods include: anomaly detection, and signature detection
Quiz 11 - Malware
- Malicious software (Malware) targeting Confidentiality, Integrity, and availability
- Types of malware include: Adware, Attack Kits, Backdoors, Downloaders, Exploits, Flooders(DoS Client), Keyloggers, Macro Virus, Mobile Code, Rootkits, Spammers, Spyware, and Trojan Horses
- Malware propagation techniques: Social Engineering
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.