Information security is the preservation of confidentiality, integrity and availability of information; in addition, other properties such as authenticity, accountability, non-repudiation and reliability can also be involved.
Availability is the property of being accessible and usable upon demand by an authorized entity.
DDoS attack
Authorization is to specify access and usage permissions for entities, roles or processes.
Information Security Management System.
Authorization is to specify access and usage permissions for entities, roles or processes
1 - Security controls are practical mechanisms, actions, tools or procedures that are used to provide security services.
2 - Physical controls, with relevant example
3 - Technical controls, with relevant example
4 - Administrative controls, with relevant example
1 - Preventive controls, with relevant example
2 - Detective controls, with relevant example
3 - Corrective controls, with relevant example
Indicate if their exists attacks for each one of them.
MD5: Attacks exist
SHA-1: Attacks exist
SHA-2: No attacks exist
SHA-3: No attacks exist
224, 256, 384 or 512 bits
Outline the steps that Alice must follow when creating MAC(M), and the steps that recipient Bob must follow for verifying MAC(M).
MAC generation by Alice:
i. Alice prepares message M.
ii. Alice applies the secure MAC algorithm MACfunc with input parameters M and k to produce MAC(M) = MACfunc(M,k).
iii. Alice transmits message M and MAC(M) to Bob, together with her unique name and specification of the MAC algorithm she used.
MAC validation by Bob:
i. Bob receives message M’ (denoted as M’, not M, because from Bob’s point of view the message origin is still uncertain), as well as MAC(M).
ii. Bob applies MACfunc on M’ to produce MAC(M’ ) = MACfunc(M’,k).
iii. Bob checks whether MAC(M) =? MAC(M’). If TRUE, then MAC(M) is valid, meaning that M’ = M. Bob therefore is convinced that Alice sent message M. If FALSE, then the signature MAC(M) is invalid, meaning that M’ ≠ M. Bob therefore does not know who created the received message M’. He might then decide to reject the message, or use it knowing that its
iii) The recipient can authenticate the message origin
Briefly explain the meaning of this proposition ?
If the system is trusted, then it is relied upon to enforce the security policy. So the security policy will be broken when the trusted system does not work as expected. A non-trusted system on the other hand is not relied upon to enforce the security policy, so when it breaks it does not lead to a breach of security policy.
List these three main TPM-supported services:
i) List of potential threat agents. ii) Chain of escalation
iii) Security awareness guidelines.
iv) List of known security vulnerabilities
v) Criteria for calling the police.
vi) List of ranked security risks.
vii) Who has the responsibility to make decisions.
viii) List of systems that can be taken offline.
ii - Chain of escalation.
v - Criteria for calling the police.
vii - Who has the responsibility to make decisions.
viii - List of systems that can be taken offline.
IR teams
- Permanent IR team, where the IR members’ principal job role is to handle security incidents
IR activities:
The user must view the certification path of the received server certificate, and know the difference between a Browser PKI root certificate and the internal proxy root certificate used for validation. If the certification path leads to an authentic root certificate of the Browser PKI, then there is no TLS inspection. If the certification path leads to the internal proxy root CA, then there is TLS inspection.
OWASP: Open Web Application Security Project 1p for: The OWASP Top 10 describes the most critical and common web application security flaws currently found in online applications.