InfoSec Exam 1

studied byStudied by 22 people
5.0(1)
Get a hint
Hint

What is a macro?

1 / 127

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

128 Terms

1

What is a macro?

A small program written to do something quickly

New cards
2

How do macros pose a threat?

They can be embedded in documents and used maliciously to obtain access to another machine.

New cards
3

What is a keylogger?

Program that records when a user types on their machine and sends that to the attackers machine

New cards
4

The ___ ___ ___ establishes relationships among documents

Word Wide Web

New cards
5

How do computers communicate?

Using TCP/IP

New cards
6

What is TCP?

Transmission Control Protocol

New cards
7

What is IP?

Internet Protocol

New cards
8

What three things are required for a risk to exist?

An asset, threat, and vulnerability

New cards
9

What is an asset?

Something of value that I want to protect

New cards
10

Can the amount of assets be zero?

No

New cards
11

What is a threat?

An entity that can damage assets

New cards
12

What is a vulnerability?

A weakness in the system that can be exploited by the threat

New cards
13

What is the only ingredient required for risk that we can control?

Vulnerability

New cards
14

What is a risk?

The possibility of suffering damage

New cards
15

(T/F) If there exists only a threat and an asset, but no vulnerabilities, there exists risk.

False

New cards
16

(T/F) If someone steals your data, you no longer have access to it.

False

New cards
17

What does it mean for someone to steal data?

To read data in an unauthorized manner.

New cards
18

What are the three Security Requirements?

Confidentiality, Integrity, and Availability (CIA)

New cards
19

What is confidentiality?

Unauthorized people should not be able to read data.

New cards
20

What is integrity?

Unauthorized people should not be able to modify data

New cards
21

What is availability?

Authorized users must be able to access data whenever they need

New cards
22

How do you measure system availability?

Divide up-time by up-time + down-time

New cards
23

What are the three main parts of a Security Paradigm?

Protect, Detect, and Recover/React

New cards
24

What is included under protect in the Security Paradigm?

Strong password, firewall, security updates, access control, and encryption

New cards
25

What are the pros of Encryption?

Protects against confidentiality violation (i.e. the hacker cannot read what they cannot understand)

New cards
26

What are some cons of encryption?

Does not protect against integrity violations (hacker can modify encryption) and it affects availability

New cards
27

What is included under detect in the Security Paradigm?

Intrusion detection tools, honey pots, logs

New cards
28

What is a honey pot?

A trap for a hacker (such as a fake passwords file, which is monitored to detect who looks at the folder)

New cards
29

How do logs play a role in detection?

They log activity in the system to ensure there’s no funny business going on

New cards
30

What are the limitations of logs?

If you log too much, the system may overwrite the file, but if too little is logged, you may not catch when there is a hacker.

New cards
31

What is Recover/React in the Security Paradigm?

The best practices and knowledge required to recover or react to an event

New cards
32

Why does recovery/react need to be fast and correct?

Fast to ensure availability and correct to ensure integrity

New cards
33

How many values does an attacker need to change to cause a domino effect?

Just one

New cards
34

How can the user recover after an attack?

They must go through and recalculate everything with the correct values

New cards
35

Why must the system be unavailable during recovery?

The hacker can continue doing damage if the system is available.

New cards
36

What is the weakest link in IT Infrastructure?

User Domain

New cards
37

What are the seven domains in IT Infrastructure?

User, Workstation, Local Area Network (LAN), LAN-to-WAN, Wide Area Network (WAN), System/Application, and Remote Access Domains.

New cards
38

What are security policies?

A set of statements that can be implemented to enforce security

New cards
39

What are security mechanisms?

Mechanisms that define how policies can be implemented

New cards
40

What relationship exists between policies and mechanisms?

Many-to-Many

New cards
41

(T/F) A system may have many vulnerabilities, so many security policies are needed. Therefore there needs to be many security mechanisms. 

True

New cards
42

What defines a secure state?

No security violations occur

New cards
43

What causes the system to enter an unsecure state?

When a security mechanism fails.

New cards
44

What can mechanisms guarantee?

That the machine will remain in a secure state, a portion will be either state, OR a portion of the system will remain secure.

New cards
45

What is the broad set of mechanisms?

A bad and possibly evil set of mechanisms that may allow the system to reach an insecure state.

New cards
46

What is a precise set of mechanisms?

An amazing and beautiful set of mechanisms that never allow the system to reach an unsecure state, but is allowed to reach every secure state.

New cards
47

What is the secure set of states?

A subset of secure states

New cards
48

What is risk management?

Balancing the cost of risk vs countermeasures

New cards
49

(T/F) The cost of countermeasures must not exceed the cost of the damage.

True

New cards
50

What is impact?

The amount of damage caused by threats

New cards
51

To understand the risk, we must understand the _____.

Impact

New cards
52

What is an event?

A measurable occurrence which as an impact.

New cards
53

(T/F) An event must be security related.

False

New cards
54

What is an incident?

An event that violates or threatens to violate security policies.

New cards
55

(T/F) An incident must be security related.

True

New cards
56

What is an outsider threat?

A threat that comes from outside of the organization.

New cards
57

What is an insider threat?

A threat that comes from inside of the organization

New cards
58

Does an insider threat or an outsider threat have a higher impact?

Insider threat

New cards
59

What is a quantitative risk assessment?

When financial cost is assessed. Based off of hard data (numeric value)

New cards
60

What is a qualitative risk assessment?

A scenario based assessment based off of soft data. It is difficult to get an exact cost.

New cards
61

What is considered in a qualitative risk assessment?

Impact vs probability of damage occurrence

New cards
62

What are the three types of hackers?

Black Hat, White Hat, and Grey Hat

New cards
63

What are black hat hackers?

Hackers that have advanced skills and access systems in an unauthorized way.

New cards
64

What are white hat hackers?

Hackers that have advanced skills but access systems in an authorized way.

New cards
65

What is the objective of black hat hackers?

Financial gain

New cards
66

What is the objective of white hat hackers?

To test system vulnerability

New cards
67

What are grey hat hackers?

Hackers that have medium skills, who could become a black hat or white hat

New cards
68

What is a birthday attack?

When a hashed password file is compromised.

New cards
69

What is a dictionary password attack?

Running words from the dictionary to crack a password (brute force)

New cards
70

What is IP spoofing?

When an attacker spoofs an IP address such that it appears that the source is a trusted location.

New cards
71

What is session high jacking?

When a valid user logs in and an attacker takes control of the system.

New cards
72

What is a man-in-the-middle attack?

When an attacker intercepts packets in between the target and the rest of the network.

New cards
73

What is a replay attack?

When an attack sends a message over and over again (such as requesting a user to login multiple times to get their password)

New cards
74

What are the four parts of access control?

Identification, Authentication, Authorization, and Accountability

New cards
75

What is authentication in access control?

The way the system verifies that a user is who they claim to be

New cards
76

What is identification in access control?

Assigning an identity to each user

New cards
77

What is authorization in access control?

What a user can or cannot do (ex: admin vs regular user)

New cards
78

What is accountability in access control?

The way the system checks user activities log

New cards
79

What are the four ways we can authenticate a user?

By what the user knows, what the user has, what the user is, and where the user is

New cards
80

What is a password?

A string of characters

New cards
81

What is a password domain?

Defines the specifications for a password (ex: 8 characters, A-Z, etc)

New cards
82

What is the Authentication Information?

A set of passwords chosen by users

New cards
83

What are the four parts of a password system?

Authentication info, authentication function, complimentary info, and complimentary function

New cards
84

What is an authentication function?

The interface where the system allows the user to login. (i.e. what is provided to the user)

New cards
85

What is the complimentary function?

A one-way function which modifies the password from the authentication information.

New cards
86

How does a password system work?

The user enters in their info using the authentication function. The password is then the authentication information. Then, the complimentary function takes the password, and does a one-way modification on the password. If the user is setting their password, the modified password is then stored in the complimentary info. If the user is logging in, then the modified password is checked against existing passwords stored in the complimentary info.

New cards
87

What is the complimentary info?

The user info stored in the system.

New cards
88

What is the authentication info?

What the user provides to the system.

New cards
89

What are the two methods of password attacks?

Guessing the password or knowing/figuring out the complementary function and get access to complimentary info

New cards
90

What is a type 1 Dictionary attack?

When the complementary function & complementary info are used to find a password

New cards
91

How do you defend against a type 1 dictionary attack?

Hiding the complimentary function and/or complimentary info

New cards
92

What is a type 2 dictionary attack?

When the attacker uses the authentication function to find a password

New cards
93

How to defend against type 2 dictionary attack?

After n failed attempts, take action (ex: lock account for some time period)

New cards
94

How do you calculate the number of possible passwords?

(number of character options)^(password length)

New cards
95

Assume there are N number of passwords in the password domain. An attacker can guess G number of passwords per minute. The attacker tries for T minutes. 

What is the total number of passwords the attacker can try?

TG (time * passwords per minute)

New cards
96

Assume there are N number of passwords in the password domain. An attacker can guess G number of passwords per minute. The attacker tries for T minutes. 

What is the probability of the attacker breaking the password?

P>= (TG)/N (Probability is greater than or equal to time * passwords per minute over the number of passwords)

New cards
97

Assume there are N number of passwords in the password domain. An attacker can guess G number of passwords per minute. The attacker tries for T minutes. 

What factors can we control?

We cannot control T, can try to control G but not really, but we can control N (number of passwords in domain)

New cards
98

How can we reduce the probability of an attacker breaking a password?

By increasing the password domain

New cards
99

What are the three types of passwords?

User selected, computer generated, and pronounceable passwords

New cards
100

What are user selected passwords?

Typically something easier for the user to remember. They tend to be easy to break.

New cards

Explore top notes

note Note
studied byStudied by 26 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 79 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 10 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 8100 people
Updated ... ago
4.8 Stars(53)
note Note
studied byStudied by 122 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 19 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 391 people
Updated ... ago
4.1 Stars(7)
note Note
studied byStudied by 645 people
Updated ... ago
5.0 Stars(3)

Explore top flashcards

flashcards Flashcard21 terms
studied byStudied by 2 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard132 terms
studied byStudied by 36 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard77 terms
studied byStudied by 4 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard71 terms
studied byStudied by 23 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard67 terms
studied byStudied by 10 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard40 terms
studied byStudied by 79 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard20 terms
studied byStudied by 5 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard79 terms
studied byStudied by 26 people
Updated ... ago
5.0 Stars(2)