Explore tens of thousands of sets crafted by our community.
Security Considerations in Distributed Systems
12
Flashcards
0/12
Session Hijacking
The exploitation of a valid computer session to gain unauthorized access to information or services. Mitigations include secure cookies, session timeouts, and IP binding.
Authentication
The process of verifying the identity of a user or system. Mitigation strategies include the use of multi-factor authentication, strong password policies, and digital certificates.
Spoofing
The act of masquerading as a valid entity through falsification of data (such as IP addresses), thereby gaining an illegitimate advantage. Using packet filtering, authentication, and verification can mitigate spoofing.
Phishing
A cyber attack that uses disguised email as a weapon. Education, anti-phishing software, and email filtering are methods to reduce phishing attempts.
Data Confidentiality
Ensuring that information is accessible only to those authorized to view it. Encryption, secure socket layer, and access controls are key mitigation strategies.
Availability
Ensuring that authorized users have access to information and resources when needed. Strategies include redundancy, failover systems, and DDoS mitigation techniques.
Denial of Service (DoS)
An attack intended to shut down a machine or network, depriving legitimate users from services. Mitigation may include firewalls, load balancers, and anti-DDoS services.
Man-in-the-Middle (MitM) Attack
An attack where the attacker secretly relays and possibly alters the communication between two parties. Use of HTTPS, SSL/TLS, and VPNs can mitigate this risk.
Eavesdropping
Passively intercepting communications between parties. Encryption, secure channels, and VPNs are primary mitigation strategies.
Data Integrity
Maintaining and assuring the accuracy and completeness of data. Mitigation strategies include cryptographic hash functions, digital signatures, and secure protocols like TLS.
Non-repudiation
The assurance that someone cannot deny the validity of something. Digital signatures, audit trails, and secure logs are methods to enforce this.
Authorization
Determining if a user has the right to perform an action or access resources. Mitigation includes role-based access control, principle of least privilege, and access control lists.
© Hypatia.Tech. 2024 All rights reserved.