Summary: Security (Pre-Master 2021-2022)
- This + 400k other summaries
- A unique study and practice tool
- Never study anything twice again
- Get the grades you hope for
- 100% sure, 100% understanding
Read the summary and the most important questions on Security (Pre-Master 2021-2022)
-
1 Computer Security
This is a preview. There are 2 more flashcards available for chapter 1
Show more cards here -
Give an example of safety and one of security.
Safety: Tsunami, fire, traffic, power outage...
Security: Terrorism, fraud, theft, abuse, war... -
Who conduct attacks against computer systems?
It goes from script kiddies to nation states.
Script kiddie is a person who uses existing computer scripts or codes to hack into computers. They don't have enough knowledge to write their own. -
What are the intentions to conduct an attack against a computer system?
It can be done for fun (to show off) or for malicious intents (in a stealthy way). -
2 Authentication
This is a preview. There are 18 more flashcards available for chapter 2
Show more cards here -
Name the four types of authentication factors and give an example for each of them.
- Something you are:
Biometrics ,captcha's . - Something you know:
Passwords ,PINs . - Something you have:
Bank card, laptop,Google authenticator code. - Your
context :Distance from car, access to e-mail,geotracking (aka your currentlocation .
- Something you are:
-
What is the term for enforcing multiple authentication factors?
Two-factor or multi-factor authentication. -
Are security questions a form of strong authentication?
No, they areweak .
Questions like yourmother's middle name, yourbirth location ... are easy toguess /find and areprivacy invasive . -
Name an advantage and a disadvantage for the usage of biometrics.
- Advantage :User-friendly .- Disadvantage :Technically challenging and it is only useful inmulti-factor authentication (so not really on its own). -
What is a PIN (personal identification number)?
A (usually short) string of numeric characters. -
What two types of guessing (i.e. for passwords) are there?
-Online guessing : anattacker tries a large number ofusername /password combinations against the login portal to guess thecorrect password .
-Offline guessing : anattacker can get a hash of yourpassword that they can take offline and try to crack it. -
What is end-to-end encryption (E2EE)?
The encryption of messages so only the sender and the receiver can read the messages. This prevents eavesdroppers.
- Higher grades + faster learning
- Never study anything twice
- 100% sure, 100% understanding