CySec Foundations Teil 2
CySec Foundations Teil 2
CySec Foundations Teil 2
Set of flashcards Details
Flashcards | 210 |
---|---|
Language | Deutsch |
Category | Computer Science |
Level | University |
Created / Updated | 31.07.2020 / 10.08.2020 |
Weblink |
https://card2brain.ch/box/20200731_cysec_foundations_teil_2
|
Embed |
<iframe src="https://card2brain.ch/box/20200731_cysec_foundations_teil_2/embed" width="780" height="150" scrolling="no" frameborder="0"></iframe>
|
Is PBKDF2 a viable replacement for SHA-2? If no, why not, if yes, why?
No, it is not.
PBKDF2 = password based key derivation function 2
PBKDF2 uses hash similar to SHA2, but runs it in a loop 5000 times to slow it down
this is good for logins and password, but nowhere else
What is the advantage of Bcrypt over PBKDF2?
It doesn't sit well on a GPU, so it cannot be brute-forced as quickly
What is pseudonymization?
the process of replacing some data with an identifier (pseudonym)
What is the goal of pseudonymization?
to make it more difficult to identify an indivdual from data
What is the right to be forgotten?
an inidividuals right to erasure to have their information removed from processing or use
Tim is analyzing an attack against his company in which the attacker found comments
embedded in HTML code that provided the clues needed to exploit a software vulnerability.
Using the STRIDE model, what type of attack did he uncover?
information disclosure attack
Matthieu recently authored an innovative algorithm for solving a mathematical problem,
and he wants to share it with the world. However, prior to publishing the software code in
a technical journal, he wants to obtain some sort of intellectual property protection. Which
type of protection is best suited to his needs?
copyright law
If Matthieu protects his innovate algorithm through copyright law, what is protected, what is not?
the specefic code is protect, not the idea or the process behind the software
Would degaussing be a suitable data method for destroying data stored on an SSD?
no, since the SSD doesn't have a magnetic flux
How is single loss expectancy (SLE) calculated?
SLE is calculated using the formula SLE = asset value ($) * exposure factor (SLE = AV *
EF).
Which of the following factors change if you implement a countermeasure?
- Exposure factor
- single loss expectancy
- asset value
- annualized rate of occurrence
annualized rate of occurence
What kind of risk response is purchasing cybersecurity breach insurance?
risk transfer
RAID-5 is an example of what type of control?
recovery control
What type of authentication factor is voice pattern recognition?
something you are
What type of authentication factor is the callback to a landline?
something you have
How would you shortly describe the SUID?
The SUID is used to execute a command as the owner of the file instead of the user that issued the command
How would you shortly describe the GUID?
The GUID is used to execute a command as a member of the group owner the file instead of the group of the user who issued the command
What is the difference between a nonce and an IV?
A nonce is a number which main property is that it has to used only once. It doesn’t have
to be neither random, nor secret.
An IV is a number which main property is to be random.
What are the two types of ciphers in symmetric cryptography?
- Stream cipher
- Block cipher
Why is Elliptic Curve Diffie Hellman becoming the standard nowadays?
Shorter keys
What are the two use cases for RSA?
non-secret encryption
digital signing
What does it mean that my cipher adds confusion? How can confusion be added?
A cipher adds confusion when the relationship between the message and the ciphertext is not obvious. e.g. substitution
What does it mean that my cipher adds diffusion? How can diffusion be added?
A cipher adds diffusion when little change in the message results in a big change in the ciphertext. e.g. permutations
Why are most of the most used encryption algorithms, like AES, well documented for
the public?
Because of the Kerckhoffs Principle
Which is the currently most in-use symmetric block cipher?
AES
In order to implement a block cipher, why are ECB and cipher block chaining not recommended?
ECB is not good for repeating patterns
CBC cannot be run parallel
How do Bob and Alice share a key over an insecure channel?
with Diffie-Hellman
What are the parameters shared over Diffie-Hellman?
g
p
g^a mod p
g^b mod p
When RSA is used for signature, which key is used for encryption and which key is used for decryption?
encryption: private
decryption: public
What is a hash collision? Give an example of where to find it
hash collision happens when the hash of two different inputs is the same
can "easily" be found in MD5, possibly found in SHA-1
Which hash method can be used in a secure way at this moment?
SHA-2 256 bits or 512 bits
Is SHA-3 better or worse than SHA-2?
neither, but its based on a different algorithm
Why does SHA-3 exist?
if something happens with SHA-2, SHA-3 can be used
Why is SHA-2 not an appropriate way to store passwords?
too quick -> vulnerable to brute-force attacks
What 2 hashes can be used for storing passwords?
PBKDF2
bcrypt
How does HMAC work?
The message is hashed twice.
First, message is hashed with one part of the key and then with another part of the key
A CA has received a CSR from a webserver.
What does the CSR include?
- public key
- unsigned signature
- signature hash algorithm
A CA has received a Certificate Signing Request from a webserver.
Once verification is completed, what is the CA going to do with that CSR?
- CA creates a x509 cert with
- valid period
- key usage
- signed signature
- and send the cert back to the server
How is a root cert signed and why is it trustworthy?
- it is self signed
- turstworthy because already preinstalled
How can a client trust the issuer of a x509 cert?
by autiding the best practices of the issuer