CIS 2337 Midterm review

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
GameKnowt Play
New
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/192

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

193 Terms

1
New cards

Computer Security

Methods, techniques, ans tools used to ensure a computer system is secure.

2
New cards

Critical Infrastructure

Infrastructure whose loss/impairment would have severe repercussions.

3
New cards

Elite Hacker

Skills necessary to discover and exploit new vulnerabilities.

4
New cards

Hacker

someone who accesses a computer or network illegally

5
New cards

Hacking

Intentionally accesses a computer without authorization or exceeds authorized access.

6
New cards

Hacktivist

a politically motivated hacker who uses the Internet to send a political message of some kind.

7
New cards

Highly structured threat

Threat backed by the time and resources to allow any form of attack

8
New cards

information warfare

the use of information security techniques, both offensive and defensive, when combating an opponent

9
New cards

Morris worm

One of first internet crimes. Infected computer systems until they could no longer run.

10
New cards

script kiddie

An unskilled user who downloads automated attack software to attack computers

11
New cards

Structured threat

Threat with reasonable financial backing and can last a few days or more. More time to penetrate and attack.

12
New cards

Unstructured Threat

Threat with no significant resources/ability

13
New cards

A friend of yours has just been hired by an organization as its computer security officer. Your friend is a bit nervous about this new job and has come to you, knowing that you are taking a computer security class, to ask your advice on measures that can be taken that might help prevent an intrusion. What three things can you suggest that are simple but can tremendously help limit the possibility of an attack?

C I A - Confidentiality, integrity, and availability

14
New cards

Discuss the major difference between a target of opportunity attack and a targeted attack. Which do you believe is the more common one?

A target of opportunity attack is usually victim due to HW/SW vulnerabilities. A targeted attack is when the victim is specifically targeted for some reason.

Target of opportunity attack is more common because most attackers exploit vulnerabilities.

15
New cards

Reread the various examples of computer crimes at the beginning of this chapter. Categorize each as either a crime where the computer was the target of the criminal activity or a crime in which the computer was a tool in accomplishing the criminal activity.

1)The Morris Worm (November 1988) - target

6) Solar Sunrise (February 1998) - target

7) The Melissa Virus (March 1999) - tool

8) The Love Letter Virus (May 2000) - tool

9) The Code Red Worm (2001) - tool

11) The Slammer Worm (2003) - target

13) Conficker (2008) - target

16
New cards

Property

"No-write-down" rule; doesn't allow user to write to a file with a lower security class, preserving confidentiality

17
New cards

Access control

Ability to control whether a subject can interact with an object

18
New cards

Auditability

The property of an item that makes it available for verification upon inspection.

19
New cards

availability

Devices must be present and accessible when subject wants to access them.

20
New cards

Bell-LaPadula security model

Addresses data confidentiality

21
New cards

Biba security model

Integrity issues; data with higher integrity level is more reliable and accurate

22
New cards

Brewer-Nash model

Controlling read and write access based on conflict of interest rules

23
New cards

Clark Wilson security model

Uses transactions as a basis for rules

24
New cards

Complete Mediation

Every access attempt is checked

25
New cards

Confidentiality

Ensures that those who have permission can access data

26
New cards

Default Deny

Deny access by default and grant access when specific permissions exists.

27
New cards

diversity of defense

Different kinds of defense

28
New cards

Economy of Mechanism

Keep it simple stupid

29
New cards

Fail-safe defaults

If something fails, it goes to a safe state

30
New cards

Hacking

Attempts to gain unauthorized entry into a computer system or network.

31
New cards

Host Security

Protect each individual computer and device

32
New cards

Implicit Deny

AKA default deny

33
New cards

Integrity

Generation and modification of data

34
New cards

Layered Security

Using multiple diverse defense at differing points

35
New cards

Least common mechanism

Mechanisms used to access resources should be dedicated not shared

36
New cards

Least privilege

Subject should only have NECESSARY rights and privileges to perform task

37
New cards

Low-Water-Mark policy

(No red down) prevents unauthorized modifications

38
New cards

Network security

Protection of computers and devices within a network

39
New cards

Nonrepudiation

Ability to verify a msg has been sent and received and the sender can be ID and verified

40
New cards

Open Design

Protection of an object should not rely upon secrecy of protection mechanism

41
New cards

operational model of computer security

protection = prevention + (detection + response)

42
New cards

Phreaking

Hacking used by telephone companies to operate its network

43
New cards

Psychological acceptability

User's acceptance of security measures

44
New cards

Ring policy

Allows any subject to read any object regardless of level of integrity and without lowering integrity level

45
New cards

Security through obscurity

Protection by hiding it

46
New cards

Separation of duties

Separation of privilege among people

47
New cards

Separation of privilege

Protection mechanism that uses more than one piece of info to make access decisions

48
New cards

Simple security rule

No subject can read info from an object with a higher security classification

49
New cards

Your company has decided to increase the authentication security by requiring remote employees to use a security token as well as a password to log onto the network. The employees are grumbling about the new requirements because they don't want to have to carry around the token with them and don't understand why it's necessary. Write a brief memo to the staff to educate them on the general ways that authentication can be performed. Then explain why your company has decided to use security tokens in addition to passwords.

An extra layer of authentication can help prevent intrusions since they have been on a rise.

50
New cards

The new CEO for your company just retired from the military and wants to use some of the same computer systems and security software she used while with the military. Explain to her the reasons that confidentiality-based security models are not adequate for all environments. Provide at least two examples of environments where a confidentiality-based security model is not sufficient.

Information system model helps bridge gap between what is said and implementation

51
New cards

Describe why the concept of "security through obscurity" is generally considered a bad principle to rely on. Provide some real-world examples of where you have seen this principle used.

It's like hiding money under a bed. The only protection is that other do not know where it is.

52
New cards

Hash

The unique signature created by a hashing algorithm.

53
New cards

collision attack

Attacker's finds 2 different messages that hash to the same value

54
New cards

Cryptology

Study of cryptography and cryptanalysis, study of secrets

55
New cards

cryptography (n)

secret writing; the encoding and decoding of messages

56
New cards

Cryptosystem

Any system that encrypts and decrypts

57
New cards

Cryptanalysis

Process of analyzing available info in an attempt to decrypt

58
New cards

Differential Cryptanalysis

Comparing input plaintext to output ciphertext to determine the key used to encrypt

59
New cards

Linear Cryptanalysis

Put plaintext through simple cipher to try and deduce what the key likely is.

60
New cards

digital signature

a means of electronically signing a document with data that cannot be forged

61
New cards

digital rights management (DRM)

protection of digitally distributed intellectual property

62
New cards

Multiple Encryption

The use of multiple layers of encryption to improve encryption strength.

63
New cards

Entropy

Randomness in a system

64
New cards

Confusion

Principle to affect the randomness of output

65
New cards

Difussion

Change in one character of plaintext should cause multiple changes in ciphertext

66
New cards

Cryptographic system

Process of turning plaintext and ciphertext using an algorithm and a key

67
New cards

Algorithm

A specific repeatable method of performaning a task

68
New cards

Perfect forward secrecy

Property of public keys system where the key derived from another key is not compromised

69
New cards

Shared secret

Sender and receiver have same key

70
New cards

Ephemeral Keys

Keys used only once

71
New cards

Key space

A set of every possible key value

72
New cards

Key stretching

Mechanism that takes weak keys and stretches them to make the system more secure.

73
New cards

Key Management

The process of controlling the secret keys used in encryption.

74
New cards

Cipher

Pair of algorithm and key used to communicate secretly

75
New cards

Shift cypher

One letter is shifted a set number of places for another letter ; used by Romans

76
New cards

Stream cypher

Enciphers plaintext in a stream bit by bit; RC4

77
New cards

Vigenere cipher

an advanced type of substitution cipher that uses a simple polyalphabetic code. Depends on a password.

78
New cards

Block cypher (DES)

Segments input into blocks and adds extra padding to last block.

79
New cards

Data encryption standard

Standard cryptographic algorithm (1973)

80
New cards

Trapdoor functions

Functions difficult to process without the key but easy to process when you have the key

81
New cards

Transportation

The changing of the order of items

82
New cards

Steganography

Hiding the existence of data within a text, audio, image, or video file.

83
New cards

Pseudorandom numbers

A number that appears to be random but is generated by a formula.

84
New cards

NIST

National institute of standards and technology

85
New cards

SHA

Secure Hash Algorithm; hash algorithms of NIST and NSA

86
New cards

digital certificate

an electronic document that associates credentials with a public key

87
New cards

Certificate Practice Statement (CPS)

A technical document that describes in detail how the CA uses and manages certificates.

88
New cards

Certificate Server

Service that issues certificates

89
New cards

Registration Authority (RA)

This performs certificate registration services on behalf of a CA.

90
New cards

Local registration authority (LRA)

Closer to end users

91
New cards

End-entity certificates

Issues by CA to a specific subject

92
New cards

CA certificate

issued by one CA to another CA; the second CA can, in turn, then issue certificates to an end entity

93
New cards

Cross-certification certificate

Mechanism in which one CA can issue certificate allowing its users to trust another CA

94
New cards

How does polyalphabetic substitution work

Depends on a password; when the password matches it enciphers, if not long enough it repeats until it matches

95
New cards

Why is asymmetric encryption called public key encryption?

It uses 2 keys: a private key and a public key

96
New cards

Describe cryptanalysis

Process of attempting to break a cryptographic system.

97
New cards

Describe pros and cons of establishing a key archiving system for a small/medium business

Pros: save resources/time, efficiency, recycle and monetize, optimum performance and storage, cheaper, backup and recovery is better, less overhead, and archives data

Cons: will archived be accessible in future?, storage mechanisms will change over time, natural disasters

98
New cards

Why implement a Public key infrastructure solution?

Enables the creation of a trustee environment through the internet.

99
New cards

Steps to verify a certificates validity.

Keys are exchanged by passing certificates

100
New cards

How do you obtain a certificate?

Register

Public and private key lair generated

Key pair stores in key store

Copy of public key and data sent to CA

CA generate digital certificate containing public key and other info

Certificate sent to user