TACN1
TACN1
TACN1
Từ viết tắt
IP = Intellectual Property
1.Who was known as the founder of the Internet? What did he develop?
2.Why does the C.I.A. triangle model no longer adequately address the
constantly changing environment?
The threats to the confidentiality, integrity, and availability of information have
evolved into a vast collection of events, including accidental or intentional
damage, destruction, theft, unintended or unauthorized modification, or other
misuse from human or non human threats.
Tấn công là hành động gây hại hoặc làm hỏng thông tin hoặc/ và cái hệ thống ỗ
trợ thông tin đấy. (tức là nó gây hại cho cả thông tin và hệ thống hoặc chỉ gây
hại lên 1 trong 2 thôi)
Consider for a moment some common assumptions about e-mail. When you
receive e-mail, you assume you know the origin of it. This is not always the
case. E-mail spoofing is a problem for many people today. Spoofing the
sender’s address can fool e-mail recipients into thinking that messages are
legitimate traffic, thus inducing them to open e-mail they otherwise might not
have. (khó quá bỏ qua:))))
8. When is information confidentiality? What can you use to protect the
confidentiality of information?
When it is protected from disclosure or exposure to unauthorized individuals or
systems.
+ information classification
+ secure document storage
+ application of general security policies
+ education of information custodians and user
9. How many critical characteristics does information have? What are they?
11. What is an information system? Why is data the main target of intentional
attacks?
13. Which malicious code software programs that hide their true nature and
reveal their designed behavior only when activated?
They are Trojan horses. (có thể hỏi ngược lại Trojan horses là gì, thì câu trả lời
chính là câu hỏi trên này luôn)
They are designed to damage, destroy, or deny service to the target systems.
15. Who are hackers? Which skill levels are divided among hackers?
Hackers are “people who use and create computer software to gain access to
information illegally ”. Two skill levels among hackers. The first is the expert
hacker, or elite hacker and the novice or unskilled hacker.
Câu hỏi thêm : Compare Elite hacker and novice or unskilled hacker
- The expert hacker, or elite hacker, who develops software scripts and program
exploits used by the novice or unskilled hacker.
Novice and unskill hacker who originates nothing but simply steals code,
technique, and attack methods from others.
18. Which mistakes do employees often make when they use information
systems?
It is used when a copy of the SAM (Security Account Manager) data file can be
obtained.
Because very often the programmer who puts it in place also makes the access
exempt from the usual audit logging features of the system.
24. Why are always the manufacturer’s default administrator account names
and passwords changed?
Because if attackers can narrow the fields of target accounts, they can devote
more time and resources to these accounts.
25.Why are many requests made that the target system becomes overloaded
and cannot respond to legitimate requests for service in a DoS attack?
Thêm câu này vì t bị hỏi: Name some techniques that Phishing attacks use?
There are 3 primary techniques: URL manipulation, phone phishing, web site
forgery.
28. How may pharming also exploit the Domain Name System?
Pharming may exploit the DNS by causing it to transform the legitimate host
name into the invalid site’s IP address.
29. What do sometimes attackers do to sway the target for social engineering?
30. In which attack does an attacker monitor packets from the network,
modify them, and insert them back into the network?
It is Spoofing
31.Why does pharming often use Trojans, worms, or other virus technologies
to attack the Internet browser’s address bar?
Pharming use them so that the valid URL typed by users is modified to the
address bar of the illegitimate Web site.
33. In Which attack can the cookie allow the designer to collect information
on how to access password-protected sites?
The most important benefit of application layer filtering is that it can understand
certain applications and protocols (such as File Transfer Protocol (FTP),
Domain Name System (DNS), or Hypertext Transfer Protocol (HTTP))
nếu ko thể nhớ được cả tên thì ghi tên viết tắt thôi
37. What is one of the most effective methods of improving computing security
in the SOHO setting? What method is used for protecting the residential user?
38. Which approach allows the router to prescreen packets to minimize the
network traffic and load on the internal proxy? What is the protocol for
handling TCP traffic via a proxy server?
SOCKS is the protocol for handling TCP traffic via a proxy server
39. Why is NAT able to prevent external attacks from reaching internal
machines with addresses in specified ranges?
It is the additional processing required to manage and verify packets against the
state table.
43. Give the definition of these terms “asset, exploit and exposure”.
Asset: the organization resource that is being protected.
45. How can Email spoofing be defined? Give the explanation to clarify this
act.
E-mail spoofing, the act of sending an e-mail message with a modified field, is a
problem for many people today, because often the modified field is the address
of the originator.
Spoofing the sender’s address can fool e-mail recipients into thinking that
messages are legitimate traffic, so make them open e-mail they otherwise might
not have. Spoofing can also change data being transmitted across a network, as
in the case of UDP packet spoofing, which can enable the attacker to get access
to data stored on computing systems.
• Information classification
The utility of information is the quality or state of having value for some
purpose or user.
50. How can we define the procedures of an IS? What is the importance of
physically securing the IS compared with?
51. What does a computer virus consist of? What happened when
information was transferred by diskettes from system to system?
The code attaches itself to an existing program and takes control of that
program’s access to the targeted computer. The virus-controlled target program
then carries out the virus’s plan by replicating itself into additional targeted
systems.
52. Name some common types of information virrues that you have learnt.
Give their definition.
Trojan horse: hide their true nature and reveal their designed behavior only
when activated.
Trap door: A virus or worm can have a payload that installs a back door or trap
door component in a system, which allows the attacker to access the system at
will with special privileges
54.List two threats in the information area that you have learnt and explain
how do they act?
- Forces of Nature: they usually occur with very little warning and are
beyond the control of people. These threats, which include events such as
fires, floods, earthquakes, lightning, volcanic eruptions and insect
infestations, can disrupt not only the lives of individuals but also the
storage, transmission, and use of information.
- Polymorphic Threat: overtime changes the way it appears to antivirus
software programs, making it undetectable by techniques that look for
preconfigured signatures.
58. Which attacks in information system are the most difficult to defend
against?
59. What is spam? What are its consequences? Give some solutions to deal
with it.
Spam is unsolicited commercial e-mail.
The most significant consequence of spam is the waste of computer and human
resources.
Solutions: Many organizations attempt to cope with the flood of spam by using
e-mail filtering technologies. Other organizations simply tell the users of the
mail system to delete unwanted messages.
It is sniffer.
The word “cryptography” is derived from the Greek words kryptos, meaning
hidden, and graphien, meaning to write.
Reversing this process and retrieving the original readable information is called
decryption or deciphering.
63. How many goals does cryptography have? What are they? Let’s describe
one of these goals.
64. When was cryptography changed from dark art into a science based on
mathematics? Who changed it? Which algorithms are the most widely used in
the world among crypto algorithms?
In 1861 - 1865.
RSA algorithms is the most widely used in the world among crypto algorithms.
65. What did Whitefield Diffie and Martin Hellman introduce? What is one of
the most significant contributions provided by public-key cryptography?
66. What is IPS? What can it do? What is an intrusion detection system?
It can detect an intrusion and also prevent that intrusion from successfully
attacking the organization by means of an active response.
67. How does an IDS work? How many reasons does an IDPS need
installing?
An IDS works like a burglar alarm in that it detects a violation and activates an
alarm.
An IDS works like a burglar alarm in that it detects a violation (some system
activity analogous to an opened or broken window) and activates an alarm
which can be audible and visual, silent.
69. What is the difference between on-line NIDS and off-line NIDS?
On-line NIDS deals with the network in real time. It analyses the Ethernet
packets and applies some rules, to decide if it is an attack or not, while off-line
NIDS deals with stored data and passes it through some processes to decide if it
is an attack or not.
71. What can happen if intruders succeed in modifying any of the objects the
HIDS monitors?
Nothing can stop such intruders from modifying the HIDS itself – unless
security administrators take appropriate precautions.
72. What does a signature-based IDPS examine? What are the weaknesses of
the signature-based approach? What is the solution to the weaknesses of the
signature-based approach?
Disadvantage:
+ new attack strategies must continually be added into the IDPS’s database
of signatures.
+ a slow, methodical attack might escape detection if the relevant IDPS
attack signature has a shorter time frame.
The advantage of the statistical anomaly-based approach is that the IDPS can
detect new types of attacks, since it looks for abnormal activity of any type.
Disadvantage:
+ may not detect minor changes to system variables and may generate many
false positives.
74. What does a honeypot system contain? What are honeypots? What are
they designed for?
Honeypots are decoy systems designed to lure potential attackers away from
critical systems.
Câu hỏi thêm: What are Honeynets, and padded Cell Systerms?
A padded cell is a honeypot that has been protected so that that it cannot be
easily compromised—in other words, a hardened honeypot.
- The legal implications of using such devices are not well understood.
- Honeypots and padded cells have not yet been shown to be generally useful
security technologies.
77. What is the hardware? List some hardware components you know?
Hardware is the physical technology that houses and executes the software,
stores and transports the data, and provides interfaces for the entry and removal
of information from the system.(dong 17 trang 23)
78. What is a theft? Which type of theft in the information security do you
know?
There are two type of theft in the information security: physical theft, electronic
theft.
(do you know là hỏi ý hiểu của mình, còn khi nào hỏi have you learnt thì là lấy
trong bài)
SQL Injection, Weak Audit, Database protocol vulnerabilities, Weak
authentication, excessive privileges, …
81. What firewall processing modes do you know? Give some information to
support your answers?
The packet-filtering firewall, also simply called a filtering firewall, and it can:
- examine the header information of data packets that come into a network.
- scan network data packets looking for compliance with or violation of the
rules of the firewall’s database.
- inspect packets at the network layer, or Layer 3 of OSI model. If the
device finds a packet that matches a restriction, it stops the packet from
traveling from one network to another.
83. What does IDPS stand for? What do you know about IDPS? What is
IDPS used for?
84. How many IDPS methods do you know? What are they? State your
understanding about the signature- based approach, the statistical-anomaly
approach, and the stateful packet inspection approach.
Three methods:
87. What does the phrase hash function mean? What is it?
Because hash functions confirm message identity and integrity, both of which
are critical functions in e-commerce.
Encryption methodologies that require the same secret key to encipher and
decipher the message are using what is called private key encryption or
symmetric encryption.
Symmetric encryption methods use mathematical operations that can be
programmed into extremely fast computing algorithms so that the encryption
and decryption processes are executed quickly by even small computers
The primary challenge of symmetric key encryption is getting the key to the
receiver, a process that must be conducted out of band to avoid interception.
Asymmetric encryption uses two different but related keys, and either key can
be used to encrypt or decrypt the message
93. What components are integrated for a typical solution PKI to protect the
transmission and reception of secure information?
96. When was cryptography changed from dark art into a science based on
98. What device was developed and used in the early- to mid-20th century to
Enigma
100. Who introduced the idea of public-key cryptography? What are its
algorithms based on? the computational complexity problem. (cái ý này chắc
hỏi nhầm, câu hỏi của nó sẽ là what are its algorithms based on, đáp án là the
computational complexity problem)
101. What device was developed by the Spartans of Greece? When was it
developed?
He invented a device based on two concentric discs that simplified the use of
Caesar ciphers.
103. Which algorithms are the most widely used in the world among crypto
algorithms?
Gilbert S.Vernam
106. What cipher did Julius Caesar use to secure military and government
communications?
William Friedman.