Security Flashcards

(55 cards)

1
Q

What is the primary goal of cybersecurity?

A

Protecting a computing asset from harm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are some computer assests?

A

● Computer hardware
● Software
● Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are some harms?

A

● Physical damage
● Unauthorised change, unauthorised use
● Denial of service
● Theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does “harms” mean in the context of cybersecurity?

A

Any negative impact on computing assets, such as physical damage, unauthorized change or use, denial of service, or theft.
-> may not be for monetary reasons but usually some benefit to someone in causing it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define computer assets.

A

● Anything the computer system controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are risks?

A

● What could go wrong? – a hazard
● What would be the consequences?
● What are the chances of it happening?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How do we naively measure risk?

A

risk = expected cost x probability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why is the risk calculation naive?

A

Cannot always estimate cost of an incident nor the probability of it happening.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the qualitive measures of risk?

A
  1. negligible
  2. minor
  3. major
  4. survivable
  5. existential
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are threats?

A

Something that tries to break system security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How are threats studied?

A

In a threat model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What do threats show?

A

The attack points of a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How are threats ranked?

A

By risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is an attack in system security?

A

An attempt to exploit a threat by technical or non‑technical means.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is an attack vector?

A

The path or exploit used to carry out an attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Example of a direct attack?

A

Stealing a password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Example of an indirect attack?

A

Sending a virus email that steals the password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does identity mean in security?

A

Proving you are who you say you are.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What does identity decide about information?

A

What you are allowed to see (information hiding).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does identity decide about actions?

A

What you are allowed to do (agency).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is privacy in security?

A

Only people with permission can see the information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are the degrees of privacy?

A
  • Not knowing what the information is.
  • Not knowing it exists at all.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Why is hidden information safer?

A

It’s hard to attack something you don’t know exists.

24
Q

What is authentication?

A

Proving a claimed identity.
Showing you are who you say you are.

25
What does “Identify yourself” mean in security?
It is a request for authentication.
26
How do countries differ in real‑life authentication?
Some have mandatory ID cards, others don’t. Having one is a prime target for theft though.
27
What is the challenge moving from real‑world to digital authentication?
Digital tokens can be copied; physical tokens are harder to reproduce.
28
Why is digital authentication harder?
No physical presence, so it’s hard to validate possession.
29
What is anonymity in security?
Preventing identity from being linked to a person, actions, or data.
30
Why might anonymity be important?
To allow criticism of authority, legal but controversial actions, or avoid consequences.
31
How can risks of anonymity change?
Risks for an individual may change over time.
32
What is the problem with digital footprints?
They tend to last forever, making anonymity harder.
33
What is an agent in security?
The actor that does things once authenticated. This can be a person or a piece of software.
34
What is agency in security?
The things an agent can do once authenticated.
35
What is limiting agency called?
Access control.
36
What is non‑repudiation?
The inability to deny that an action happened and that it was performed by some agent.
37
Why is non‑repudiation important?
It is essential for services where actions must be committed and cannot be undone.
38
Example of subtlety in non‑repudiation?
Paying cash (harder to prove) vs paying with a credit card (recorded, harder to deny).
39
What is trust in security?
A combination of identity and agency.
40
What questions does trust answer?
Should this person be allowed to perform this action? Should I believe information from this person?
41
How can trust be decided?
Based on an agent’s prior actions, not just fixed rules.
42
Does trust work in anonymous situations?
Yes as users can be “up‑voted” and allowed to do more.
43
Why must trust be monitored?
To detect abuse and revoke trust before harm happens.
44
What is a vulnerability in security?
An aspect of a system that provides a way for a threat. Example: An unencrypted disc drive, a router with a default password.
45
What are socio‑technical vulnerabilities?
Weaknesses involving people and systems together.
46
Example of socio‑technical vulnerability (networks)?
Open wireless networks for customer access.
47
What are some security goals of secure communications?
- confidentiality - authentication of who we are talking to
48
How do we do authentication in secure communications?
1. Authenticate once, however we want to 2. Retain and re-use the fact we did authenticate
49
How do web APIs ensure authentication?
1. Alice authenticates using whatever mechanism 2. Server returns bearer token to Alice -> says has been authenticated 3. Everytime Alice returns to the server, she now has that token
50
What is a risk associated with bearer tokens?
1. If another user acquires the token, they can now enter the secure server without having to authenticate.
51
How do capabilities increase bearer token security?
1. bearer tokens now encode the exact operations that can be performed with it -> what it is capable of performing 2. Since the server can create them only, only packets with the correct signature can be used
52
What are symmetric keys?
Alice and Bob share the same key which they use to encrypt and decrypt each other's traffic. - Fast - Efficient - Hard to manage
53
How do we deal with the management issues of symmetric keys?
Securing a single exchange and throwing it away when we tear-down the connection. Still get the speed benefits without having to later manage. E.g. interacting with a mail server.
54
What is the Diffie-Hellman key exchange (basic idea)?
Uses public-key ideas to exchange a non-public key. Basic idea: 1. Take a shared basis - can even be public 2. Each side adds some secret element 3. Synthesis a common secret 4. Don't disclose enough information for the common secret to be retrieved
55