Liendo.Omar.Test 4 Part 1

advertisement
IST 462
Test 4
Part 1
1.
NAME OMAR LIENDO
Define the term “risk management.”
Risk management is a systematic approach to control the risks associated with different
threats.
2.
A risk management study consists of five tasks. Name each of these tasks and give an
explanation of what each task involves.
Asset Identification – Inventorying of assets that are to be protected
Threat Identification – Identifies all the possible threats.
Vulnerability Appraisal – Identifies how the threats may exploit a vulnerability to attack
the asset.
Cost Appraisal– Estimates how much the company would lose if that asset is attacked.
Risk Mitigation: Asks the question: “What do we do with the risk we found?”
3.
What is the purpose of an attack tree?
Provide a visual interpretation of a risk.
4.
Suppose that the goal of an attack is to cause your file server to crash. Name two items
that might appear on Level 2 of an attack tree.
5.
Explain how you can calculate the anticipated loss from an attack using the Single Loss
Expectancy (SLE) formula.
With the formula: Asset Value * Exposure Factor
6.
What is “risk mitigation?”
Risk mitigation is the step where we need to decide what we are going to do with a risk
that we have found.
7.
How does “penetration testing” evaluate the security of a computer network?
Penetration testing pretends to send malicious attacks to a system in order to test it and
find vulnerabilities.
8.
What is a “privilege audit?”
Privilege audit is the analysis of privileges given to users. It studies which users have
access to what in a determined network.
9.
In a Windows environment, if a person has READ access to a Word file, explain all the
operations that person may perform on that file.
The person may only open the file without making any modifications to it and also can
copy with file. However, the copied file will still be read only.
10.
How have we seen the principle of “inheritance” demonstrated on our file server
Blackhawk?
In our class folder. Dr. Cozart has not given us access to certain folders; therefore, we do
not have access to any subfolders and/or files that are found inside of the “parent folder”
11.
Give an example of a security application log.
Norton 360 Antivirus keeps a log of everything it does including threats found and
cleared, as well as when did system scans occurred.
12.
What does the term “usage audit” refer to?
Usage audit refers to the analysis of usage of files, folders, and resources in a network. It
allows us to see what specific objects have been accessed by who and when as well as
how often.
13.
Name and describe the three general monitoring methodologies that are used to examine
network traffic and activities.
Action based – (Uses Statistics) to create a behavior baseline and monitors new behavior.
If a behavior is way outside of the baseline, then a signal is flagged.
Signature based – Compares behaviors to predetermined signatures
Behavior based – Is the best one as it takes an active role instead of reactive
14.
Define the term “cryptography.”
Cryptography transforms some plaintext into an unintelligible format when transmitted
just so the message’s content cannot be read by attackers.
15.
Who was one of the most famous ancient cryptographers? What method of encryption
did he use?
Julius Caesar and he replaced each character of a message with the 3rd letter that follows
in the alphabet. Example: A = D or G = J.
16.
Does a hash function protect the integrity of information? Explain.
Yes. Has functions are used strictly for comparison purposes. If the hash of the
downloaded (received) file equals the hash of the sender, then, the integrity of the
information has been preserved.
17.
How do symmetric and asymmetric cryptographic algorithms differ?
Symmetric uses only one common key for encrypting and decrypting a message while
Asymmetric cryptographic algorithms uses two different keys that are mathematically
related: Public and Private.
18.
Which type of algorithm from Question 17 is more secure? What makes this type more
secure?
Asymmetric is more secure because it uses two different keys. The public key which can
be seen by whoever, even attackers, and the private key which is used to decrypt the
message. The private key is unique to each recipient.
19.
Determine the cipher-text using a transposition cipher that rearranges letters without
changing them. Use a key of: MERCERUNIV and the plaintext is: OUR EXAM IS ON
MONDAY MAY THIRD FROM TWO TIL FIVE PM
UMHOXDDLENRISAMEONTWMIMOVROITAAFFMYRIOYTP
20.
Suppose Alice wants to send an encrypted message to Bob using an asymmetric
cryptographic algorithm. Explain what key Bob uses to decode the message.
Bob uses his private key to decode the message. Also, Alice will use Bob’s public key to
encrypt the message.
Download