CySec Foundations Teil 2

CySec Foundations Teil 2

CySec Foundations Teil 2


Fichier Détails

Cartes-fiches 210
Langue Deutsch
Catégorie Informatique
Niveau Université
Crée / Actualisé 31.07.2020 / 10.08.2020
Lien de web
https://card2brain.ch/box/20200731_cysec_foundations_teil_2
Intégrer
<iframe src="https://card2brain.ch/box/20200731_cysec_foundations_teil_2/embed" width="780" height="150" scrolling="no" frameborder="0"></iframe>

In TLS 1.3 which is the first message that gets partly encrypted?

Part of the ServerHello is already encrypted

In the TLS 1.3 handshake using 0-RTT resumption, which is the first mesage that gets partly encrypted?

Part of the ClientHello is already encrypted

What is the most commonly used technique to protect against virus attacks?

Signature detection

Which type of attack relies on the difference between the timing of two events?

TIme of check to time of use (TOCTTOU)

Which type of exploit is closely associated with APT attacks?

zero-day attacks

What advanced virus technique modifies the malivious code of a virus on each system it infects?

polymorphic viruses

What type of application vulnerability most directly allows an attacker to modify the contents of a systems memory?

Buffer overflows

When designing firewall rules to prevent IP spoofing, which of the following principles
should you follow?

  • Packets with internal source IP addresses don’t enter the network from the outside.
  • Packets with internal source IP addresses don’t exit the network from the inside.
  • Packets with public IP addresses don’t pass through the router in either direction.
  • Packets with external source IP addresses don’t enter the network from the outside.

 

Packet with internal source IP addresses should not be allowed to enter the network from outside because they are likely spoofed

What are the primary goals and objectives of securtiy?

CIA Triad

CIA Triad:

Which securtiy objective means authorized subjects are granted timely and uninterrupted access to objects?

Availablility

What principle of information security is being violated upon a TCP SYN attack?

TCP SYN attack may result in denial of service -> availability

What ensures that the subject of an activity or event cannot deny that the event occured?

Non-repudiation

Which is the lowest military data classification for classified data?

confidential

Which commercial / business sector data classification is used to control information about individual within an organization?

Private

Name the 5 types of assets organizations have

- Information

- Systems

- Devices

- Facalities

- Personnel

Name the three data states

- Data at Rest

- Data in Transit

- Data in Use

Which are the classes of gov / military classification?

ordered from high to low

Top secret

secret

confidential

sensitive but unclassified

unclassified

What are the classes of business / private classification?

ordered from high to low

Confidential  / Private

Sensitive

Public

Name 5 ways of destroying sensitive data

- Erasing

- Clearing

- Purging

- Degaussing

- Destruction

Name 2 ways of tracing or hiding sensitive data

- Steganography

- Watermarking

What is a threat?

any potential danger to an asset

What is a threat actor?

someone / something thats exploits vulnerabilities

What is threat intelligence?

the knowledge about an existing or emerging threat to assets

What is a threat event?

accidental and intentional exploitations of vulnerabilities

STRIDE

- Spoofing

- Tampering

- Repudiation

- Information disclosure

- Denial of Service

- Elevation of privilege

What is the Exposure Factor (EF)?

represents the percentage of loss that an org would experience if a specific asset were violated

What is the single loss expectancy (SLE)?

cost associated with a single realized risk against a specific asset

SLE = asset value * exposure factor

What is the annualized rate of occurrence (ARO)?

expected frequency with which a specific threat or risk will occur within a single year

What is the annualized loss expectancy (ALE)?

possible yearly cost of all instances of a specific realized threat against a specefic asset

What is a cryptographic key?

a number, usually a very large binary number

What is a nonce?

a unique number each time it's used

used to make sure a key is not used twice

What is an IV?

IV = initialization vector

a random bit string

same length as block size, XORed with the message

What is confusion?

relation between key and plaintext is complicated -> attacker cannot determine key by alterting plaintext slightly

What is diffusion?

1 change in input results in multiple changes in output, e.g. permutation of bytes

What is Kerckhoffs principle?

a cryptographic system is secure, even if everything but the key is public knowledge

Describe the AES algorithm

- create round keys

for each round:

1. input block, XOR with key

2. Substitute bytes

3. Shift rows

4. Mix columns

 

 

Name the 3 modes of operations for block ciphers

- Electronic code book

- cipher block chaining

- counter mode

Why should the Electronic Code Book mode not be used?

weak to redundant data

What does the Cipher Block Chaining mode do differently than ECB?

The output of each block is XORed with the input of the next block

How does the Counter Mode (CTR) work?

a counter is encrypted to produce a stream cipher

not the message is encrypted, a number is and the output is XORed with the message

 

(number = nonce + counter)