Computer Security at EPFL - EPF Lausanne

Flashcards and summaries for Computer Security at the EPFL - EPF Lausanne

Arrow Arrow

It’s completely free

studysmarter schule studium
d

4.5 /5

studysmarter schule studium
d

4.8 /5

studysmarter schule studium
d

4.5 /5

studysmarter schule studium
d

4.8 /5

Study with flashcards and summaries for the course Computer Security at the EPFL - EPF Lausanne

Exemplary flashcards for Computer Security at the EPFL - EPF Lausanne on StudySmarter:

Which one of these are threats?

Exemplary flashcards for Computer Security at the EPFL - EPF Lausanne on StudySmarter:

Which one of these are harms?

Exemplary flashcards for Computer Security at the EPFL - EPF Lausanne on StudySmarter:

Which one of these are vulnerabilities?

Exemplary flashcards for Computer Security at the EPFL - EPF Lausanne on StudySmarter:

Why is testing hopelessly inadequate for showing the absence of bugs?

Exemplary flashcards for Computer Security at the EPFL - EPF Lausanne on StudySmarter:

A company publishes the design of its security software product in a manual that accompanies the executable software. In what ways does this satisfy the principle of open design? In what ways does it not?

Exemplary flashcards for Computer Security at the EPFL - EPF Lausanne on StudySmarter:

Explain, in terms of the security principles, why it is not a good idea to revert the execution of a program that writes in memory regions that was not allocated for this program to reserve more memory. What is a better option than reverting in terms of security ?

Exemplary flashcards for Computer Security at the EPFL - EPF Lausanne on StudySmarter:

The IC Building elevator requires card key access to go to the 4th floor. The door connecting the stairs and the 4th floor opens without a card. Which of the following security principles is missing in this design?

Exemplary flashcards for Computer Security at the EPFL - EPF Lausanne on StudySmarter:

Is this a security problem?

Exemplary flashcards for Computer Security at the EPFL - EPF Lausanne on StudySmarter:

When is there a security problem?

Exemplary flashcards for Computer Security at the EPFL - EPF Lausanne on StudySmarter:

What principle is supported by user Nobody in UNIX? Justify your an- swer.

Exemplary flashcards for Computer Security at the EPFL - EPF Lausanne on StudySmarter:

Are the following compositions of security mechanisms defense in depth?

Exemplary flashcards for Computer Security at the EPFL - EPF Lausanne on StudySmarter:

Which one of the following compositions of security mechanisms are weakest link?

Your peers in the course Computer Security at the EPFL - EPF Lausanne create and share summaries, flashcards, study plans and other learning materials with the intelligent StudySmarter learning app.

Get started now!

Flashcard Flashcard

Exemplary flashcards for Computer Security at the EPFL - EPF Lausanne on StudySmarter:

Computer Security

Which one of these are threats?

Credit card numbers are stolen

Computer Security

Which one of these are harms?
Thieves can enter into a lab to steal equipment

Computer Security

Which one of these are vulnerabilities?
Thieves can enter into a lab to steal equipment

Computer Security

Why is testing hopelessly inadequate for showing the absence of bugs?

“Showing absence of bugs” implies that one is able to prove that there is NO bug in a program. However, it is hard, and arguably impossible, to test for all possible failure conditions. Also, many problems are caused by combinations of bugs. Thus, even when one finds a problem it may not be possible to identify all the bugs that cause the error.

Computer Security

A company publishes the design of its security software product in a manual that accompanies the executable software. In what ways does this satisfy the principle of open design? In what ways does it not?

Satisfies the principle: The publication of a manual explaining the design is indeed open, as it is possible for everyone to understand the functionality that the software is intended to provide. Does not satisfy the principle: However, the software itself is not open. Thus, one cannot fully apply the Linus law: one cannot look at the code, thus one cannot find bugs in the implementation. Therefore, it cannot take advantage of the positive aspects promoted by the principle of open design.

Computer Security

Explain, in terms of the security principles, why it is not a good idea to revert the execution of a program that writes in memory regions that was not allocated for this program to reserve more memory. What is a better option than reverting in terms of security ?

No, it is not a good idea because it is very difficult to guarantee that everything in the system will roll back correctly (the more difficult as the complexity of the system increases). This violates the fail-safe default principle. The safe solution is what programs already do: stop and exit with an error to inform the user that something has gone wrong, and to avoid creating more damage in the system.

Computer Security

The IC Building elevator requires card key access to go to the 4th floor. The door connecting the stairs and the 4th floor opens without a card. Which of the following security principles is missing in this design?

Fail-safe defaults

Computer Security

Is this a security problem?

I need to send a wireless signal in an environment where there may be obstacles (walls, rain, ...)

Computer Security

When is there a security problem?
When an adversary wants to actively and purposely break, steal, harm something (exploiting a vulnerability)

Computer Security

What principle is supported by user Nobody in UNIX? Justify your an- swer.

The Nobody user supports the least privilege principle. Such an account ensures that programs run with the minimum set of permissions possible so that if compromised (or buggy) they cannot do any damage to the system.

Computer Security

Are the following compositions of security mechanisms defense in depth?

Then PIN/PUK authentication system for SIM cards. If you forget your PIN you can use a PUK

Computer Security

Which one of the following compositions of security mechanisms are weakest link?
A door closed with three different types of locks

Sign up for free to see all flashcards and summaries for Computer Security at the EPFL - EPF Lausanne

Singup Image Singup Image
Wave

Other courses from your degree program

For your degree program Computer Security at the EPFL - EPF Lausanne there are already many courses on StudySmarter, waiting for you to join them. Get access to flashcards, summaries, and much more.

Back to EPFL - EPF Lausanne overview page

What is StudySmarter?

What is StudySmarter?

StudySmarter is an intelligent learning tool for students. With StudySmarter you can easily and efficiently create flashcards, summaries, mind maps, study plans and more. Create your own flashcards e.g. for Computer Security at the EPFL - EPF Lausanne or access thousands of learning materials created by your fellow students. Whether at your own university or at other universities. Hundreds of thousands of students use StudySmarter to efficiently prepare for their exams. Available on the Web, Android & iOS. It’s completely free.

Awards

Best EdTech Startup in Europe

Awards
Awards

EUROPEAN YOUTH AWARD IN SMART LEARNING

Awards
Awards

BEST EDTECH STARTUP IN GERMANY

Awards
Awards

Best EdTech Startup in Europe

Awards
Awards

EUROPEAN YOUTH AWARD IN SMART LEARNING

Awards
Awards

BEST EDTECH STARTUP IN GERMANY

Awards
X

StudySmarter - The study app for students

StudySmarter

4.5 Stars 1100 Rating
Start now!
X

Good grades at university? No problem with StudySmarter!

89% of StudySmarter users achieve better grades at university.

50 Mio Flashcards & Summaries
Create your own content with Smart Tools
Individual Learning-Plan

Learn with over 1 million users on StudySmarter.

Already registered? Just go to Login