COMP607_Final Revision2024
Exam Structure
Sections and Marks:
Section 1: Multiple Choice - 20 Marks (Suggested time: 20 Minutes)
Section 2: Short Answer - 20 Marks (Suggested time: 20 Minutes)
Section 3: Long Answer - 60 Marks (Suggested time: 80 Minutes)
Principles of Information Security
Confidentiality:
Description: Protects data from unauthorized access.
Example: Encrypted information viewable only to authorized users with the key.
Integrity:
Description: Maintains the accuracy and completeness of data.
Example: Data altered only by authorized users with the key.
Availability:
Description: Ensures data is accessible to authorized users.
Example: Authorized users have access to decryption key.
Authenticity:
Description: Verifies the identity of users.
Example: Cryptographic methods authenticate sender identity.
Non-repudiation:
Description: Prevents denial of actions taken by a user.
Example: Cryptographic evidence ensures user action can’t be denied.
Cryptography Fundamentals
Symmetric Encryption
Description: Both sender (A) and receiver (B) share a secret key for communication.
Key Transfer Security:
Risks arise if the key is sent in plaintext (e.g., an attacker can intercept).
Secure Communication Requirement:
A secure method for sharing the key must be implemented.
Cryptographic Hashing
Purpose: Generates a unique hash for a set of data, representing its contents.
Properties:
One-way process (cannot be reversed).
Ensures data integrity (unaltered original form).
Asymmetric Cryptographic Algorithms
Process Description:
Involves a public key for encryption and a private key for decryption.
Public Key Infrastructure (PKI) utilizes public/private key pairs to secure communications.
Malicious Software
Definition: Any software designed to harm or exploit a computer system or network.
Types:
Viruses, worms, trojan horses, ransomware
Distinctions:
Worm: Operates independently and can replicate itself.
Virus: Requires a host to execute and cannot operate on its own.
Social Engineering Attacks
Techniques Used
Authority: Impersonating authority figures.
Intimidation: Coercing users under threat.
Consensus: Manipulating through peer influence.
Scarcity: Creating false urgency.
Familiarity: Pretending to have an established relationship.
Defense Strategies Against Attacks
Fundamental Principles
Layering: Utilizing multiple layers of security.
Limiting: Restricting access to sensitive resources.
Diversity: Varying security measures to prevent predictable failures.
Obscurity: Hiding security assets and systems.
Simplicity: Keeping security systems straightforward for efficiency.
Authentication Mechanisms
AAA Framework
Authentication: Identifying users (e.g., password use).
Authorization: Confirming permissions to perform tasks.
Accounting: Tracking resource usage per user session.
Biometrics
Types of Biometrics
Standard Biometrics: Using unique physical traits (e.g., fingerprints, iris scans).
Behavioral Biometrics: Analysis of user behavior (e.g., voice patterns).
Cognitive Biometrics: Based on personal experiences and memories.
Wireless Network Security
Blurred Edges in Security
Issue: WLANs introduce multiple data entry points, complicating hard network edges.
Risk: Attackers can exploit weak security settings on access points (APs).
Wireless Attacks
Types of Attacks
Rogue Access Points: Unauthorized APs allowing bypass of network security.
Evil Twin: Fake AP masquerading as a legitimate one to capture data.
Wireless Security Protocols
WPA/WPA2 Overview
WPA Personal:
Authentication: PSK, Security level: Low-Medium
Encryption: TKIP, Security level: Medium
WPA2 Personal:
Authentication: PSK, Security level: Medium
Encryption: AES-CCMP, Security level: High
Business Continuity Planning
Strategies
Site Redundancy: Planning for entire site failures.
Hot Site: Fully operational and ready for immediate use.
Cold Site: Empty facility, equipped by user on demand.
Warm Site: Partially configured with necessary equipment; lacks active connections.
Risk Management Strategies
Methods
Acceptance: Acknowledging risks without action.
Transference: Shifting risk to third parties (e.g., insurance).
Avoidance: Not engaging in risky activities.
Mitigation: Taking steps to reduce risk severity.
Data Handling Recommendations
Data Types and Handling
Confidential: Highest sensitivity, access limited to pre-approved users.
Private: Medium sensitivity, need-to-know access.
Sensitive: High potential for harm if disclosed, restricted access.
Public: Free for all public consumption.
PII/PHI: Must be secured as perlegal requirements.