Security and Encryption Notes

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/64

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

65 Terms

1
New cards

How may components are there of systems reliability

5

2
New cards

What is the foundation of systems reliability?

security

3
New cards

What contributes to systems reliability (5)?

Security
Privacy
Confidentiality
Availability
Processing Integrity

4
New cards

What is the most important thing to know about Security?

Security is a MANAGEMENT ISSUE

5
New cards

What must management take responsibility for? (4 factors related to security)

Policy development
Effective communication of these policies
Design of appropriate control policies
Monitoring of the system and, if necessary, take corrective actions

6
New cards

shows the relationship between prevention, detection, and response

time based model of security

7
New cards

What is the equation for the time based model of security

P>D+R

8
New cards

What does P stand for in the equation for time based model of security?

time for an attacker to break through the preventative controls

9
New cards

What does D stand for in the equation for time based model of security?

time for company to detect that an attack occurred

10
New cards

What does R stand for in the equation for time based model of security?

time for the company to respond and correct the effects of the attach

11
New cards

When the time based model off security is true then:

security is adequate

12
New cards

multiple layers of controls

defense in depth

13
New cards

What was the example we used in class for defense in depth?

Shrek

14
New cards

What are the layers within defense in depth?

Preventative
Detective
Corrective

15
New cards

What is included in the preventative layers of defense in depth (8)?

Authentication
Authorization
Training
Physical Access
Remote Access and Host and Applications Hardening
Anti-malware
Encryption

16
New cards

ensures that the people using the system are the people that are really using them

Authentication

17
New cards

What are the three ways to authenticate people?

Something you HAVE
Something you KNOW
Some physical characteristic

18
New cards

What is the most common form of authentication?

passwords

19
New cards

What is needed to make a password effective?

Secrecy
Length
Complexity
Unique
Not personal Info
Not common password

20
New cards

What is the problem with passwords that make them sometimes ineffective?

Remembering them

21
New cards

What are the remedies to the ineffectiveness of passwords?

Dont write them down
Passphrase
Multifactor identification

22
New cards

Usually have a short password followed by an additional verification of authentification

multifactor authentication

23
New cards

What is the disadvantage of passphrases

Only have to know the phrase, but it can be stolen in the same way as a password

24
New cards

What is the disadvantage of multifactor authentification

must know/have all the different facets

25
New cards

What is an example of Authorization in SAP?

Roles and profiles (access control matrix)

26
New cards

tells the system what someone is allowed to do

authorization

27
New cards

What does the access control matrix ensure?

separation of duties

28
New cards

process oof taking a message and converting it into cipher text that cannot be read and then decrypt it back into the original message

encryption

29
New cards

What are the problems with symmetric encryption?

Must meet to agree on the key
Must have a key BEFORE message sent
Would need separate keys to everyone you are talking to

30
New cards

means that the key is the same on both sides

symmetric encryption

31
New cards

What is the benefits of symmetric encryption?

Very fast and easy to understand

32
New cards

key that encrypts something is different from the key that decrypts

asymmetric encryption

33
New cards

What is asymmetric based on?

prime number factoring- there is a public code and a private code

34
New cards

When sending something using asymmetric encryption, encrypt based on:

public keys

35
New cards

When sending something using asymmetric encryption, decrypt based on:

private key

36
New cards

The private key is the ___ of the public key

personal prime number factors

37
New cards

How do you make a signature block?

Hash a document and then encrypt with your private key

38
New cards

Gives keys and certificates

key authority

39
New cards

What are the advantages of asymmetric encryption?

Authentication
Don’t need to maintain keys with everyone (use PUBLIC key)
Very secure (due to prime number factoring)
Parties do not have to meet to exchange keys

40
New cards

What are the disadvantages of asymmetric encryption?

People might encrypt it wrong
Very slow

41
New cards

If you encrypt with YOUR public key, then:

only YOU can decrypt it with YOUR private key.

42
New cards

If you encrypt with YOUR private key, then:

anyone can open it with the public key

43
New cards

If you encrypt with someone else’s public key, then:

Only that person can open it

44
New cards

What is the hybrid model of encryption?

Uses asymmetric to transfer a symmetric key for fast data encryption.

45
New cards

What are the advantages to hybrid model of encryption

Fast and effective communication
Secure

46
New cards

What are the four things needed for training to be effective?

Explain why you have these policies and procedures
Explain to employees that we will support them for following training
Explain what to do if someone is pushing them to violate/bend the rules
Explain what fraud/security scams look like so that they can recognize it

47
New cards

convincing someone that they should feel sorry for someone or that they will lose their job

social engineering

48
New cards

What is included in remote access controls?

Fire walls
TCPIP

49
New cards

What we run software on

host

50
New cards

turning off unnecessary features

Hardening

51
New cards

What are the two ways to harden applications

On certain hosts
On certain software

52
New cards

software to make sure there are no malware downloaded

anti malware

53
New cards

What are the 3 detective controls for security?

Log analysis
Intrusion Detection Systems (IDS)
Security Testing (Penetration Tests and Vulnerabilities Scan)

54
New cards

Detective control used to see who accessed the system and what they were accessing; can make reports from this

log analysis

55
New cards

detective control that takes log analysis and automates it to show if people are accessing things that can show it might be an attack; looking for unusual and infrequent activities

Intrusion detection system (IDS)

56
New cards

Detective control; form of security testing where hackers are paid to try and break into system; used to determine where there are/are not controls

Penetration Tests

57
New cards

Detective control; form of security testing where company hires a consultant to come in and look for known problems in the system

Vulnerability scan

58
New cards

What are the corrective controls of security?

Computer Incident Response Teams (CIRT or CERT)
Chief Information Security Officer (CISO)

59
New cards

What is the role of the CIRT/CERT? (4 Steps)

Recognize/identify problem
Contain/minimize/stop risk
Recover/notify/fines
Follow up/monitor and make changes

60
New cards

Who leads the effort of security (bc it is a management issue)

Chief Info Security Officer (CISO)

61
New cards

Who does the CISO report to?

COO or CEO

62
New cards

The CISO must be:

independent of other info systems efforts

63
New cards

What is the job of the CISO?

Evaluate and assess info security environment

64
New cards

deals with other people’s information (think HIPPA/FERPA); how do we protect the info of others

privacy

65
New cards

Dealing with things that belong to the company; how do we ensure that the company’s data stays secret (think secret recipe)

Confidentiality