Computer Security Midterm

studied byStudied by 5 people
5.0(1)
Get a hint
Hint

Computer Security

1 / 99

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

100 Terms

1

Computer Security

Protection of information and systems from unauthorized access, use, disclosure, disruption, or destruction.

New cards
2

CIA Triad

Ensures confidentiality, integrity, and availability.

New cards
3

Security Analyst

Career path associated with CIS 4367: Computer Security.

New cards
4

Cryptographer

Career path associated with CIS 4362: Applied Cryptography.

New cards
5

Digital Forensics Examiner

Career path associated with CIS 4203: Digital Forensics.

New cards
6

Ethical Hacker

Career path associated with CIS 4204: Ethical Hacking.

New cards
7

Certified in Cybersecurity (CC)

An important certification in cybersecurity.

New cards
8

Certified Information Systems Security Professional (CISSP)

An important certification in cybersecurity.

New cards
9

Certified Ethical Hacker (CEH)

An important certification in cybersecurity.

New cards
10

Digital Forensics Certifications

An important certification in cybersecurity.

New cards
11

Collegiate Penetration Testing Competition (CPTC)

A popular cybersecurity competition.

New cards
12

Collegiate Cyber Defense Competition (CCDC)

A popular cybersecurity competition.

New cards
13

National Cyber League (NCL)

A popular cybersecurity competition.

New cards
14

Confidentiality

Protects information access and disclosure.

New cards
15

Integrity

Protects information from unauthorized modification.

New cards
16

Availability

Ensures reliable access to information.

New cards
17

Active Attacks

Includes replay, masquerade, tamper, denial of service (DoS).

New cards
18

Passive Attacks

Includes sniffing (listening to communications).

New cards
19

Attack surfaces

Includes network: open ports/services, software: code receiving inputs, human: social engineering attacks.

New cards
20

Symmetric Cipher

uses the same key for both encryption and decryption.

New cards
21

Secure Use of Symmetric Ciphers

The encryption key must be kept secure, and both the sender and receiver must have securely obtained copies of the key.

New cards
22

Brute-Force Attack

tries all possible keys until the correct one is found.

New cards
23

Block Ciphers

Encrypt data in fixed-size blocks (e.g., 64 or 128 bits).

New cards
24

Stream Ciphers

Encrypt data bit-by-bit or byte-by-byte.

New cards
25

Hash Function

Generates a fixed-length output from input data, ensuring data integrity.

New cards
26

Message Authentication Code (MAC)

Used to ensure the authenticity and integrity of a message.

New cards
27

Advanced Encryption Standard (AES)

More secure and efficient than DES, using block sizes of 128 bits and key lengths of 128, 192, or 256 bits.

New cards
28

Data Encryption Standard (DES)

Uses a 64-bit block size and a 56-bit key, making it vulnerable to brute-force attacks.

New cards
29

Secure Hash Function Properties

Must be efficient to compute, one-way, second pre-image resistant, and collision resistant.

New cards
30

Public-Key Cryptography

Uses two keys: a public key for encryption and a private key for decryption.

New cards
31

Digital Signature

Created by encrypting a hash of a message with the sender's private key.

New cards
32

Certificate Authority (CA)

Issues public-key certificates that bind a public key to the identity of its owner.

New cards
33

Diffie-Hellman Key Exchange

A method for securely exchanging cryptographic keys over a public channel.

New cards
34

Digital Envelope

Used to securely send a symmetric key by encrypting it with the recipient's public key.

New cards
35

Elliptic-Curve Cryptography (ECC)

Provides equivalent security to other cryptosystems but with much smaller key sizes.

New cards
36

Random Number vs. Pseudorandom Number

enerated from a truly nondeterministic process, vs is generated algorithmically.

New cards
37

User authentication

the process of determining the validity of one or more authenticators used to claim a digital identity, ensuring a subject is in control of the technologies used for authentication.

New cards
38

Functions of user authentication

The user identifies themselves by presenting one or more authenticators, and the system verifies these authenticators.

New cards
39

Requirements for identification and authentication security

Identify information system users, processes, or devices, and authenticate their identities.

New cards
40

Derived security requirements for authentication

Use multifactor authentication, employ replay-resistant mechanisms, prevent identifier reuse, disable inactive identifiers, enforce password policies, and store passwords cryptographically.

New cards
41

Multifactor authentication (MFA)

MFA requires using at least two types of authenticators from different categories: something you know, something you have, something you are, or how you behave.

New cards
42

Types of authenticators in user authentication

Something you know (e.g., password), something you have (e.g., ID badge), something you are (e.g., fingerprint), and how you behave (e.g., voice pattern).

New cards
43

Identity Assurance Levels (IAL)

IALs are qualitative measures for identity proofing, ranging from no identity proofing (IAL0) to IAL3, which requires in-person or supervised identity proofing.

New cards
44

Vulnerability of password-based authentication

Password-based authentication is vulnerable to attacks such as dictionary attacks, phishing, shoulder surfing, and session hijacking.

New cards
45

Hashed password

A hashed password is a password that has been converted into a fixed-length string of characters through a hash function, making it harder to reverse-engineer.

New cards
46

Purpose of salt in password hashing

Salt is used in password hashing to add randomness, making it harder for attackers to use precomputed hash values (e.g., rainbow tables) to crack passwords.

New cards
47

Shadow password file in Unix/Linux systems

The shadow password file stores hashed passwords and is only accessible to privileged users, enhancing the security of stored passwords.

New cards
48

Dictionary attack in password cracking

A dictionary attack involves trying a large list of common passwords against a password file to find matches.

New cards
49

Types of card-based tokens used in authentication

Card-based tokens include embossed cards, magnetic stripe cards, memory cards, and smart cards (contact or contactless).

New cards
50

Drawbacks of memory cards used for authentication

Memory cards require a special reader, can be lost, and may cause user dissatisfaction due to inconvenience.

New cards
51

Smart token

A smart token includes an embedded microcontroller and can process data, unlike memory cards that can only store data.

New cards
52

Categories of authentication protocols for smart tokens

The categories are static, dynamic password generator, and challenge-response protocols.

New cards
53

Biometric authentication

Biometric authentication uses unique physical characteristics such as fingerprints, facial features, or retinal patterns to authenticate users.

New cards
54

Common threats in remote user authentication

Common threats include host attacks, client attacks, eavesdropping, replay attacks, trojan horses, and denial-of-service attacks.

New cards
55

Improving security in remote user authentication

Using challenge-response protocols can counter threats such as eavesdropping and replay attacks.

New cards
56

Examples of biometric characteristics used in authentication

Examples include facial recognition, fingerprints, hand geometry, retinal patterns, and voice recognition.

New cards
57

Access Control (AC)

Access Control refers to the process of granting or denying specific requests to obtain and use information, enter physical facilities, or use system resources according to a security policy.

New cards
58

Classes of subjects in access control

The three classes are: Owner (the individual with the most control over the resource), Group (a set of individuals with identical access rights), and World (Others) (everyone else with the least amount of access).

New cards
59

Categories of access control policies

The four typical categories of access control policies are Discretionary Access Control (DAC), Mandatory Access Control (MAC), Role-Based Access Control (RBAC), and Attribute-Based Access Control (ABAC).

New cards
60

Discretionary Access Control (DAC)

DAC restricts access based on the identity of subjects or their group membership. Access rights can be passed to other subjects and are commonly implemented with access matrices.

New cards
61

Access Control List (ACL)

ACL lists subjects and their access rights for a resource.

New cards
62

Capability Ticket

A Capability Ticket specifies authorized objects and operations for a subject.

New cards
63

Role-Based Access Control (RBAC)

RBAC assigns permissions based on the roles that users have within an organization. It simplifies access control by grouping access rights into roles instead of assigning rights to individual users.

New cards
64

Attribute-Based Access Control (ABAC)

ABAC grants access based on attributes of subjects, objects, and environmental conditions, allowing more flexibility and control than RBAC or DAC.

New cards
65

Access Control List (ACL) vs ABAC

Trust is derived from multiple sources based on attributes of subjects, objects, and the environment.

New cards
66

Graham-Denning model commands

1. Transfer access rights 2. Grant access rights 3. Delete access rights 4. Read access rights 5. Create an object 6. Destroy an object 7. Create a subject 8. Destroy a subject

New cards
67

Identity, Credential, and Access Management (ICAM)

ICAM is responsible for creating and managing trusted digital identities, binding them to credentials, and managing access to an organization's resources.

New cards
68

Key elements of Access Management

1. Resource management 2. Privilege management 3. Policy management

New cards
69

Identity Federation in ICAM

It allows organizations to trust digital identities and credentials issued by external entities, facilitating cross-organization collaboration.

New cards
70

Policy rule in ABAC

A policy rule is a boolean function that grants or denies access based on attributes of subjects, objects, and the environment.

New cards
71

Database security

Organizational databases concentrate sensitive information such as user credentials and financial data, making them valuable and vulnerable to attacks.

New cards
72

Challenges in database security

Complex DBMSs often lack sufficient protection, can consist of heterogeneous databases, and may not have full-time security personnel.

New cards
73

Database Management System (DBMS)

A suite of programs for constructing and maintaining databases, offering facilities for querying databases and supporting multiple users and applications.

New cards
74

Relational Database

A collection of tables (relations) consisting of rows and columns, where each column holds specific data and each row contains values for each column.

New cards
75

Primary Key

A unique identifier for each row in a table, consisting of one or more columns.

New cards
76

SQL (Structured Query Language)

A standardized language used to define schema, manipulate, and query data in a relational database.

New cards
77

SQL Injection (SQLi)

A network-based attack where malicious SQL commands are injected to exploit vulnerabilities in web applications, often to extract or modify data.

New cards
78

Types of SQLi attacks

Inband attacks (using the same channel for SQL injection and data retrieval) and Inferential attacks (using trial and error to deduce information).

New cards
79

Countermeasures against SQLi attacks

Defensive coding practices, parameterized query insertion, and detection methods like signature-based and anomaly-based systems.

New cards
80

Database Access Control

A system that determines what parts of a database users can access and what rights they have (e.g., create, delete, query, etc.).

New cards
81

Types of database access administration

Centralized, ownership-based, and decentralized administration.

New cards
82

SQL-based access control commands

The `GRANT` command to assign access and the `REVOKE` command to remove access rights.

New cards
83

Role-Based Access Control (RBAC) in databases

A method of managing access by assigning permissions to roles and assigning users to those roles, rather than managing individual user permissions.

New cards
84

Database Encryption

A security measure where data is encrypted to protect it as the last line of defense, though it can add overhead and make data search more difficult.

New cards
85

Homomorphic encryption

A technique that allows computations to be performed on encrypted data, producing results that are identical to those from unencrypted data.

New cards
86

Data Center

A facility housing servers, storage devices, and network equipment, generally with backup power, environmental controls, and security measures.

New cards
87

Key security techniques for data center assets

Encryption, firewalls, multi-factor authentication, and physical security measures like surveillance and security zones.

New cards
88

Telecommunications Industry Association TIA-492 standard

It specifies the minimum requirements for telecommunications infrastructure in data centers, including network security and system redundancy.

New cards
89

Malware

Classified based on how it spreads or propagates to targets (e.g., viruses, worms, trojans) and the actions or payloads it performs on targets (e.g., data corruption, stealing information).

New cards
90

Parasitic malware

Needs a host program (e.g., viruses).

New cards
91

Independent malware

Self-contained programs (e.g., worms, trojans, bots).

New cards
92

Attack Kit (Exploit Kit or Crimeware)

A set of tools that ease the development and deployment of malware, allowing attackers to generate new malware variants with different propagation and payload mechanisms.

New cards
93

Common sources of malware attacks

Individuals, hacker groups, criminals (including organized crime), state-sponsored organizations, and national government agencies.

New cards
94

Advanced Persistent Threats (APTs)

Well-resourced and persistent attacks using a variety of intrusion technologies, typically attributed to state-sponsored organizations aiming for business or political motives.

New cards
95

Characteristics of Advanced Persistent Threats (APTs)

Advanced: Use sophisticated techniques and tools; Persistent: Long-term, continuous efforts; Threats: Intend to completely compromise targets.

New cards
96

Virus

A piece of software that infects programs by injecting a copy of itself, replicates, and spreads to other programs, executing secretly when the host program runs.

New cards
97

Components of a virus

1. Infection mechanism (vector): How it spreads; 2. Trigger (logic bomb): Conditions for payload activation; 3. Payload: The malicious action performed.

New cards
98

Typical phases of a virus lifecycle

1. Dormant phase: Virus is idle; 2. Triggering phase: Virus is activated; 3. Propagation phase: Virus replicates and spreads; 4. Execution phase: Payload is delivered.

New cards
99

Macro virus

A virus that uses macro or scripting code within documents (like Word or Excel files) to execute and propagate when the document is opened.

New cards
100

Worm

A standalone malware that replicates itself to spread to other systems, often exploiting vulnerabilities, whereas a virus requires a host program to spread.

New cards

Explore top notes

note Note
studied byStudied by 9 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 8 people
Updated ... ago
4.0 Stars(1)
note Note
studied byStudied by 39 people
Updated ... ago
4.5 Stars(2)
note Note
studied byStudied by 11 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 4 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 14 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 19 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 154 people
Updated ... ago
5.0 Stars(2)

Explore top flashcards

flashcards Flashcard70 terms
studied byStudied by 3 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard300 terms
studied byStudied by 48 people
Updated ... ago
5.0 Stars(3)
flashcards Flashcard53 terms
studied byStudied by 21 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard21 terms
studied byStudied by 4 people
Updated ... ago
5.0 Stars(2)
flashcards Flashcard36 terms
studied byStudied by 14 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard74 terms
studied byStudied by 9 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard23 terms
studied byStudied by 1 person
Updated ... ago
5.0 Stars(1)
flashcards Flashcard20 terms
studied byStudied by 3 people
Updated ... ago
5.0 Stars(3)