COMP607_Final Revision2024

Exam Structure

  • Sections and Marks:

    1. Section 1: Multiple Choice - 20 Marks (Suggested time: 20 Minutes)

    2. Section 2: Short Answer - 20 Marks (Suggested time: 20 Minutes)

    3. Section 3: Long Answer - 60 Marks (Suggested time: 80 Minutes)

Principles of Information Security

  • Confidentiality:

    • Description: Protects data from unauthorized access.

    • Example: Encrypted information viewable only to authorized users with the key.

  • Integrity:

    • Description: Maintains the accuracy and completeness of data.

    • Example: Data altered only by authorized users with the key.

  • Availability:

    • Description: Ensures data is accessible to authorized users.

    • Example: Authorized users have access to decryption key.

  • Authenticity:

    • Description: Verifies the identity of users.

    • Example: Cryptographic methods authenticate sender identity.

  • Non-repudiation:

    • Description: Prevents denial of actions taken by a user.

    • Example: Cryptographic evidence ensures user action can’t be denied.

Cryptography Fundamentals

Symmetric Encryption

  • Description: Both sender (A) and receiver (B) share a secret key for communication.

  • Key Transfer Security:

    • Risks arise if the key is sent in plaintext (e.g., an attacker can intercept).

  • Secure Communication Requirement:

    • A secure method for sharing the key must be implemented.

Cryptographic Hashing

  • Purpose: Generates a unique hash for a set of data, representing its contents.

  • Properties:

    • One-way process (cannot be reversed).

    • Ensures data integrity (unaltered original form).

Asymmetric Cryptographic Algorithms

  • Process Description:

    • Involves a public key for encryption and a private key for decryption.

    • Public Key Infrastructure (PKI) utilizes public/private key pairs to secure communications.

Malicious Software

  • Definition: Any software designed to harm or exploit a computer system or network.

  • Types:

    • Viruses, worms, trojan horses, ransomware

  • Distinctions:

    • Worm: Operates independently and can replicate itself.

    • Virus: Requires a host to execute and cannot operate on its own.

Social Engineering Attacks

Techniques Used

  • Authority: Impersonating authority figures.

  • Intimidation: Coercing users under threat.

  • Consensus: Manipulating through peer influence.

  • Scarcity: Creating false urgency.

  • Familiarity: Pretending to have an established relationship.

Defense Strategies Against Attacks

Fundamental Principles

  • Layering: Utilizing multiple layers of security.

  • Limiting: Restricting access to sensitive resources.

  • Diversity: Varying security measures to prevent predictable failures.

  • Obscurity: Hiding security assets and systems.

  • Simplicity: Keeping security systems straightforward for efficiency.

Authentication Mechanisms

AAA Framework

  • Authentication: Identifying users (e.g., password use).

  • Authorization: Confirming permissions to perform tasks.

  • Accounting: Tracking resource usage per user session.

Biometrics

Types of Biometrics

  • Standard Biometrics: Using unique physical traits (e.g., fingerprints, iris scans).

  • Behavioral Biometrics: Analysis of user behavior (e.g., voice patterns).

  • Cognitive Biometrics: Based on personal experiences and memories.

Wireless Network Security

Blurred Edges in Security

  • Issue: WLANs introduce multiple data entry points, complicating hard network edges.

  • Risk: Attackers can exploit weak security settings on access points (APs).

Wireless Attacks

Types of Attacks

  • Rogue Access Points: Unauthorized APs allowing bypass of network security.

  • Evil Twin: Fake AP masquerading as a legitimate one to capture data.

Wireless Security Protocols

WPA/WPA2 Overview

  • WPA Personal:

    • Authentication: PSK, Security level: Low-Medium

    • Encryption: TKIP, Security level: Medium

  • WPA2 Personal:

    • Authentication: PSK, Security level: Medium

    • Encryption: AES-CCMP, Security level: High

Business Continuity Planning

Strategies

  • Site Redundancy: Planning for entire site failures.

    • Hot Site: Fully operational and ready for immediate use.

    • Cold Site: Empty facility, equipped by user on demand.

    • Warm Site: Partially configured with necessary equipment; lacks active connections.

Risk Management Strategies

Methods

  • Acceptance: Acknowledging risks without action.

  • Transference: Shifting risk to third parties (e.g., insurance).

  • Avoidance: Not engaging in risky activities.

  • Mitigation: Taking steps to reduce risk severity.

Data Handling Recommendations

Data Types and Handling

  • Confidential: Highest sensitivity, access limited to pre-approved users.

  • Private: Medium sensitivity, need-to-know access.

  • Sensitive: High potential for harm if disclosed, restricted access.

  • Public: Free for all public consumption.

  • PII/PHI: Must be secured as perlegal requirements.