Information Security - CRASH COURSE

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/228

flashcard set

Earn XP

Description and Tags

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

229 Terms

1
New cards
Information security
Protecting information administratively, physically, and technically in order to prevent damage, alteration, and leakage of information while being collected, processed, stored, and transmitted information.
2
New cards
Confidentiality (Goal of information security)
The original information is not exposed to unauthorized users while being stored and transmitted.
3
New cards
Integrity (Goal of information security)
The original information is maintained while sending and receiving it, without illegal creation, modification, or deletion.
4
New cards
Availability (Goal of information security)
Authorized users can access and use the requested information when necessary.
5
New cards
Authentication
A method of verifying whether the information exchanged between the sender and receiver, who are the subjects of the information, has not been altered or deleted, and whether the subjects (sender and receiver) are legitimate.
6
New cards
Non-repudiation
Security technology to prevent the repudiation after receiving and sending a message, by verifying the fact of message receiving/sending.
7
New cards
Non-repudiation of origin
The prevention of the sender's claim that the message was not received after actually receiving the message.
8
New cards
Non-repudiation of delivery
The prevention of the receiver’s claim that the message was not delivered after actually sending the message.
9
New cards
Non-repudiation of receipt
The prevention of the receiver's claim that the message was not received after actually receiving the message.
10
New cards
Cryptography
Largely classified into cryptographic techniques and encryption protocol techniques.
11
New cards
Cryptographic techniques
Can be divided into the symmetric key cryptosystem, in which the encryption key and the decryption key are the same, and the public key cryptosystem, in which the encryption key and the decryption key are different, depending on whether the encryption key and the decryption key are the same.
12
New cards
Cryptographic protocols
Protocols that use cryptographic techniques.
13
New cards
Digital signature
The method of providing both data integrity and signature authentication, by performing a hash operation on a specific document, using the signature’s private key.
14
New cards
Hash function (Hash algorithm)
A mathematical function that converts a random string of various sizes into a short hash value (hash code) of fixed length, then outputs it.
15
New cards
Malware (Malicious software)
Software designed to perform malicious actions against computers, file systems, or networks.
16
New cards
Worms
Malware that runs independently. This malware replicates itself and spreads to other computers.
17
New cards
Viruses
Malicious codes that are inserted into the code of another independent program, then make the program perform malicious behavior and spread on its own.
18
New cards
Trojan horse
A program with hidden codes. Although it looks like a normal program, malicious code is executed when the user executes the program.
19
New cards
Firewall
A security solution installed between the public network and the private network to protect the private network from the outside.
20
New cards
Packet filtering gateway (Firewall type)
Determines whether to pass the packet, based on a series of rules.
21
New cards
Proxy server (Firewall type)
Provides authentication to specific hosts to access a private network and allows them to pass the packet.
22
New cards
Intrusion Prevention System (IPS)
A security system that blocks intrusions in real time by detecting unauthorized and abnormal behaviors for the target system (network detection area), and by distinguishing detected illegal behavior.
23
New cards
Virtual Private Network (VPN)
A technology that enables to safely use access control, authentication, and confidentiality services, like a private network when using a public network, without building a physical private network between remote sites.
24
New cards
Single Sign On (SSO)
Enables the user to access another site without a separate authentication procedure after logging in on one site.
25
New cards
Web Application Firewall (WAF)
Located in front of the web server, this security solution monitors incoming traffic with the HTTP/HTTPS protocol and blocks malicious attacks detected against the web application, such as the SQL Injection attack or XSS attack, before it reaches the web server.
26
New cards
Network Access Control (NAC)
When at the endpoint, when a user computer attempts to access the internal network for the first time, the system checks whether the accessing user computer complies with various security policies, such as network user authentication, anti-virus program installation, etc., and controls network access according to the pre-defined security policy, when security policies are not observed.
27
New cards
Wireless Intrusion Prevention System (WIPS)
Automatically detects and blocks access from unauthorized wireless devices by continuously monitoring the wireless LAN operated of a specific organization, and it improves the stability of wireless LAN and enables integrated management.
28
New cards
Enterprise Security Management (ESM)
Designed to provide a consistent and intuitive administrator and user interface by integrating security management functions modularized by function and product.
29
New cards
Security Information Event Management (SIEM)
The SIEM solution establishes an early warning and monitoring system for intelligent threats, which provides correlation analysis and forensic functions in the vast information of big data, by extending the role of the existing ESM from the security domain to the entire enterprise, and by adding corporate compliance response functions, so that those threats can be traced later, instead of only collecting and analyzing logs.
30
New cards
Blockchain
A distributed ledger and is designed with a structure that enables network participants to store and verify data. When transactions occur, transactions that have occurred for a certain period of time (10 minutes) are collected to create a block, in order to verify transaction information, then the blocks are sequentially connected to form a chain.
31
New cards
FIDO (Fast Identity Online Alliance)
Established in July 2012 to set the technical (De facto) standard for the authentication method, using biometrics in the online environment. The FIDO standard separated local user authentication in the user device from remote authentication performed by the service provider's server.
32
New cards
UAF (Universal Authentication Framework) protocol (FIDO 1.0)
Does not store the user's personal information on the server.
33
New cards
U2F (Universal 2nd Factor) protocol (FIDO 1.0)
Improves security using two-factor authentication.
34
New cards
Network segregation
Refers to network blocking, which separates the business network from the external network in order to block illegal access from the external Internet network and to prevent the leakage of internal information.
35
New cards
Fraud Detection System (FDS)
A system that detects suspicious transactions and blocks abnormal financial transactions by comprehensively analyzing device information, access information, and transaction details used in electronic financial transactions.
36
New cards
Quantum cryptography
A cryptographic technology that utilizes the characteristics of mechanics.
37
New cards
Trusted Platform Module (TPM)
A standard established by the TCG (Trusted Computing Group), an international industry standard organization, to overcome the limitations of security technology that only operates with software. This module provides a strong security environment that stores important data that requires security in a secure space separated by hardware, such as the encrypted key, password, digital certificate.
38
New cards
De-identification
The process or method of converting data in such way that an individual cannot be identified.
39
New cards
Re-identification
The process or method of identifying an individual from the de-identified data by combining, analyzing, and processing it with other information.
40
New cards
EU-GDPR (General Data Protection Regulation)
The personal information protection law of the EU (European Union) that took effect from May 25, 2018.
41
New cards
Encryption
The process of converting plain text, which can be seen by anyone, into an incomprehensible form of ciphertext.
42
New cards
Decryption
The process of converting ciphertext back into plaintext, so that it can be understood.
43
New cards
Cryptographic algorithm
The mathematical function used in encryption and decryption processes. The cryptographic algorithm uses a key to perform encryption and decryption.
44
New cards
Private key cryptographic algorithm (Secret key encryption algorithm)
The encryption key used for encryption and the decryption key used for decryption are the same, and that the length of the key may be short, and the speed of encryption and decryption operations is fast.
45
New cards
Block cipher algorithm
Performs the encryption and decryption process, using the cryptographic algorithm that transforms fixed size input blocks into fixed size output blocks using a secret key.
46
New cards
Differential attack (Block cipher attack)
A method of attack on the selected plaintext. This attack technique finds the key used for encryption by using the bit difference of the ciphertext blocks, which corresponds to the difference of two plaintext blocks.
47
New cards
Linear attack (Block cipher attack)
A method of attacking plaintext. This attack technique finds the encryption key by properly linearizing a nonlinear structure inside a cryptographic algorithm.
48
New cards
Brute force attack (Block cipher attack)
An attack technique that finds the encryption key by comparing plaintext and ciphertext by using all possible encryption keys used for encryption.
49
New cards
Statistical attack (Block cipher attack)
An attack technique that decrypts ciphertext using all known statistical data, including statistical data on the frequency of each word used in ciphertext.
50
New cards
Mathematical analysis (Block cipher attack)
An attack technique that decrypts ciphertext using mathematical theories, including statistical methods.
51
New cards
Stream cipher
A method where ciphertext is created by the bitwise XOR operation of the plaintext bit string, and the bit string of the key.
52
New cards
Public key cryptographic algorithm
The sender and receiver use different keys to establish secret communication. The sender encrypts data, using the receiver's public key, and sends the result over the network. The receiver decrypts the encrypted data, using the private key that matches the receiver's public key, to restore the plain text.
53
New cards
Public key
A key that each user discloses and will be used to send data to them.
54
New cards
Private key
A key that can decrypt the information encrypted by their public key, held by the user.
55
New cards
RSA (Rivest, Shamir and Adleman)
A public key cryptosystem used for encryption and authentication. The safety of this system is based on the difficulty of factoring a large integer.
56
New cards
ElGamal
The first public key cryptographic algorithm, based on the difficulty of the discrete algebra problem. When a message is encrypted with ElGamal, its length is doubled. However, different ciphertext is created each time, even though the same message is encrypted because random numbers are used for encryption.
57
New cards
ECC (Elliptic Curve Cryptosystem)
An encryption system based on the discrete logarithm problem on the elliptic curve. Since its safety is high and its speed is fast, it draws attention as a new public key encryption system.
58
New cards
Pre-image resistance (Hash property)
When y is given, it is difficult to find x where h(x)=y.
59
New cards
2nd pre-image resistance (Hash property)
Given h(x)=y, it is difficult to find x where h(x’)=y (however, x#x)).
60
New cards
Collision resistance (Hash property)
It is difficult to find x and x’ (however, x#x’) where h(x)=h(x’).
61
New cards
MD5 (Message Digest Algorithm 5)
A 128-bit hash function used for testing the integrity of the program or file.
62
New cards
SHA (Secure Hash Algorithm)
A set of interlinked hash functions. It was first designed by the National Security Agency (NSA) in 1993.
63
New cards
Salt (Hash function context)
An arbitrary bit string that is added when a hash function generates a hash value.
64
New cards
Salting (Hash function context)
To generate a hash value by adding a bit string to the original message.
65
New cards
Checksum
A type of duplicate test, tests integrity by adding data to obtain a checksum, converting it into a certain bit value, then adding it to the message.
66
New cards
Cyclic Redundancy Check (CRC)
Mainly used as a method of verifying transmission data errors in the communication system, such as the Internet. A checksum is calculated at the sending side, based on polynomials that are easy to detect and corrected errors, and it is sent after adding it to the header.
67
New cards
Message Authentication Code (MAC)
When the sender calculates the hash value using the message as an input, it becomes a message authentication code. If this message authentication code is sent together with the message, the receiver can be confident that the message has not been tampered during transmission.
68
New cards
Password-Based Encryption (PBE)
The hash value, which is obtained by entering the result of combining the password and salt (random number generated using a pseudo-random number generator) into the hash function, is used as an encryption key.
69
New cards
User authentication
Refers to a function that enables the user to prove their identity to the other party over the network.
70
New cards
Message authentication
To check whether the contents of the transmitted message have the original information and are not altered or modified.
71
New cards
Knowledge-based authentication
This method is based on the user's information (“What you know’), and uses various means, such as a PIN (Personal Identification Number), password, account number, etc.
72
New cards
Ownership-based authentication
This method is based on the user's possessions (“What you have’), and uses various means, such as anOTP (One Time Password), smart card, card key, etc.
73
New cards
Presence-based authentication
This method is based on the user’s body or characteristics of their body (“What you are’), and uses various means, such as iris recognition, fingerprint recognition, voice recognition, and face recognition.
74
New cards
One Time Password (OTP)
One of the methods used by the authentication system to authenticate users. This authentication technology uses a one-time password generator that generates and inputs a one-time password for each session.
75
New cards
Challenge-response OTP (Synchronous OTP)
An authentication server generates a random number and sends it to the client, and the client generates a one-time password using the random number as an input value.
76
New cards
Time-synchronous OTP
The authentication server and the client are synchronized, and a one-time password is created by using the time as an input value.
77
New cards
Event-synchronous OTP (Asynchronous OTP)
The authentication count record is shared with the authentication server, and a one-time password is created by using the authentication count as an input value.
78
New cards
Biometric authentication
Authentication technology to extract the measurable physical or behavioral features of a person, using an automated sensor, and to use it as a means of authentication.
79
New cards
Multi-factor authentication
A method of improving the security of authentication by combining multiple authentication technologies to supplement the weakness of a single authentication method.
80
New cards
Electronic signature
A technology that enables the user to sign on an electronic document using the authentication function of encryption technology. The effect of an electronic signature can be obtained by authenticating the identity of the signer, by using the authentication function of the public key cryptographic technique, while authenticating an electronic document to be signed at the same time.
81
New cards
PKI (Public Key Infrastructure)
An infrastructure for managing the public key, which is an essential element for encryption and authentication required for secure transactions. This infrastructure safely distributes encryption and decryption keys, as well as certificates that provide information security services.
82
New cards
Policy Approval Authority (PAA) (PKI component)
Creating and setting up policies and procedures comprehensively used for PKI (Ministry of Security and Public Administration).
83
New cards
Policy Certification Authority (PCA) (PKI component)
Establishing detailed policies for the policy approved by the PAA (Korea Internet & Security Agency).
84
New cards
Certification Authority (CA) (PKI component)
Issuing user's public key certificates and managing the list of revoked certificates (Korea Information Certificate Authority, Koscom, Korea Financial Telecommunications and Clearings Institute, Korea Electronic Certification Authority, KTNET).
85
New cards
Registration Authority (RA) (PKI component)
Doing business for certification authorities and receiving public certificate registration applications (banks, securities companies).
86
New cards
Certificate holder (PKI component)
The owner of the public key certificate who receives a certificate, and signs and encrypts electronic documents.
87
New cards
User (PKI component context)
A user who verifies the authentication path and electronic signature, using the public key of the certification authority.
88
New cards
Public key certificate and CRL repository (PKI component)
Using the certificate standard that complies with the X.509 v3 standard. An electronic file that proves the relationship between the electronic signature verification key and the key owner. A CRL repository to manage the list of revoked certificates.
89
New cards
Session key (PKI context)
A one-time secret key, generated by the sender, to apply the secret key system to the message.
90
New cards
Electronic envelope (PKI context)
The encrypted session key, which is encrypted using the public key of the receiver to safely transmit it.
91
New cards
CRL (Certificate Revocation List)
Refers to the list of certificates revoked by the CA. The list contains the serial number, the revocation date, and the reasons for revocation.
92
New cards
OCSP (Online Certificate Status Protocol)
This protocol makes up for the shortcomings that the CRL should be periodically updated. When the user attempts to gain access, the OCSP protocol immediately answers the validity of the certificate by requesting certificate status information in real time.
93
New cards
Access control
Refers to the task of controlling who can access a system, and which task the user can perform when the user interacts with the system.
94
New cards
Identification (Access control)
A process of identifying a subject using its unique token, that is, a process where the system identifies the subject. (e.g., ID, employee card, biometrics).
95
New cards
Authentication (Access control context)
A process where the subject verifies its identity to the system, that is, a process where the system acknowledges the user who claims his/her identity (e.g., password (knowledge-based), certificate (ownership-based), OTP (ownership-based), biometrics (presence-based)).
96
New cards
Authorization (Access control)
A process when the system controls the task and object, which can be performed and accessed by the authenticated user (e.g, mandatory access control, discretionary access control, role-based access control).
97
New cards
Minimum privilege policy ("Need-to-know" policy)
System subjects should use the minimum amount of information that is needed for their activities.
98
New cards
Maximum privilege policy
This policy is based on the principle of maximum availability that is applied to increase the benefits of data sharing. That is, this policy can be effectively applied to the case when no special protection is needed, due to the high reliability of data exchange with the user.
99
New cards
Mandatory Access Control (MAC)
A security level is given to the subject and a security label is given to the object. Then, it is determined whether the subject in question can access the object, according to the predetermined rule.
100
New cards
Discretionary Access Control (DAC)
Access to an object is controlled by the identity of the subject’s account or the account’s belonging group. The owner of the object determines access permission.