CSB - Lecture 1

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/44

flashcard set

Earn XP

Description and Tags

These are all the content questions

Last updated 6:10 PM on 4/30/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

45 Terms

1
New cards

What is logging in systems?

Tracking and recording actions/events in a system

2
New cards

What is the standard purpose of logs?

To record system activity for debugging, monitoring, auditing, and security

3
New cards

What should be considered when deciding what to log?

Log as much as possible while respecting privacy

4
New cards

Why must logs be protected?

Attackers may delete or modify them to hide activity

5
New cards

What does append-only logging mean?

Existing log data cannot be modified, only new data added

6
New cards

Why should logs be stored redundantly and securely?

To prevent loss or tampering after compromise

7
New cards

What is proof-carrying code?

Code that carries a proof of correctness or authorisation with it

8
New cards

Why is proof-carrying code efficient?

Checking proofs is faster than deriving them

9
New cards

What is authentication?

Verifying identity before granting access

10
New cards

What are the three authentication factors?

Something you know, have, and are

11
New cards

Give examples of "something you know."

Passwords, PINs, and security questions

12
New cards

Give examples of "something you have."

Keys, smart cards, tokens, and badges

13
New cards

Give examples of "something you are."

Biometrics like fingerprints, face, iris, and voice

14
New cards

What are behavioural biometrics?

Patterns like mouse movement or usage habits

15
New cards

What is MFA?

Using two or more authentication factors

16
New cards

Why use salts in password storage?

To randomise hashes and prevent precomputed attacks

17
New cards

Why use strong hashing (e.g. bcrypt)?

To make brute-force attacks computationally expensive

18
New cards

Why must password practices evolve?

Because attack methods improve over time

19
New cards

What are authentication keys typically based on?

Digital signatures (e.g. PGP)

20
New cards

What is a key challenge with authentication keys?

Loss, revocation (replacement), and distribution

21
New cards

Why are biometrics hard to reset?

They are permanent (e.g. fingerprints)

22
New cards

What accessibility issue exists with biometrics?

Not everyone can provide usable biometric data

23
New cards

What privacy concern exists with biometrics?

They store permanent personal data

24
New cards

What accuracy issues exist in biometrics?

False positives and false negatives

25
New cards

What is federated identity management?

Delegating authentication to a third party

26
New cards

Give examples of federated identity systems.

Kerberos, LDAP, and OAuth2

27
New cards

What is an advantage of federated identity?

Centralized management and easier implementation

28
New cards

What is a disadvantage of federated identity?

Single point of failure and privacy concerns

29
New cards

What is a replay attack?

Reusing a captured authentication message

30
New cards

What is a timestamp replay attack?

Replaying a message within a valid time window

31
New cards

What is a backward replay?

Exploiting symmetric encryption where messages are indistinguishable

32
New cards

What is the impact of replay attacks?

Full impersonation and account access

33
New cards

What is an impersonation attack?

Attacker pretends to be a legitimate user by replaying sessions

34
New cards

What can an attacker do after impersonation?

Send messages, access data, and act with user privileges

35
New cards

What is authorisation?

Determining access rights after authentication

36
New cards

What is distributed access control?

Using third parties and trust chains to decide access

37
New cards

What is a "can-say" rule?

A delegation of authority to assert claims

38
New cards

What is confidentiality?

Preventing unauthorised access to information

39
New cards

What is integrity?

Ensuring data is only modified in authorised ways

40
New cards

What is availability?

Systems are accessible to authorised users when needed

41
New cards

What is accountability?

Actions can be traced to a specific entity

42
New cards

"Repudiation" is an attack specifically listed as a threat to which security property?

Integrity

43
New cards

"The release of message contents" and "Traffic analysis" are both examples of what?

Passive Attacks

44
New cards

According to the NIST definition, "Computer Security" focuses on protecting which three objectives?

Integrity, Availability, and Confidentiality

45
New cards

What is the difference between a "Security Mechanism" and a "Security Service"?

A mechanism is a process designed to detect/prevent attacks; a service uses mechanisms to enhance data security.