Logo
Pattern

Discover published sets by community

Explore tens of thousands of sets crafted by our community.

Security Considerations in Distributed Systems

12

Flashcards

0/12

Still learning
StarStarStarStar

Session Hijacking

StarStarStarStar

The exploitation of a valid computer session to gain unauthorized access to information or services. Mitigations include secure cookies, session timeouts, and IP binding.

StarStarStarStar

Authentication

StarStarStarStar

The process of verifying the identity of a user or system. Mitigation strategies include the use of multi-factor authentication, strong password policies, and digital certificates.

StarStarStarStar

Spoofing

StarStarStarStar

The act of masquerading as a valid entity through falsification of data (such as IP addresses), thereby gaining an illegitimate advantage. Using packet filtering, authentication, and verification can mitigate spoofing.

StarStarStarStar

Phishing

StarStarStarStar

A cyber attack that uses disguised email as a weapon. Education, anti-phishing software, and email filtering are methods to reduce phishing attempts.

StarStarStarStar

Data Confidentiality

StarStarStarStar

Ensuring that information is accessible only to those authorized to view it. Encryption, secure socket layer, and access controls are key mitigation strategies.

StarStarStarStar

Availability

StarStarStarStar

Ensuring that authorized users have access to information and resources when needed. Strategies include redundancy, failover systems, and DDoS mitigation techniques.

StarStarStarStar

Denial of Service (DoS)

StarStarStarStar

An attack intended to shut down a machine or network, depriving legitimate users from services. Mitigation may include firewalls, load balancers, and anti-DDoS services.

StarStarStarStar

Man-in-the-Middle (MitM) Attack

StarStarStarStar

An attack where the attacker secretly relays and possibly alters the communication between two parties. Use of HTTPS, SSL/TLS, and VPNs can mitigate this risk.

StarStarStarStar

Eavesdropping

StarStarStarStar

Passively intercepting communications between parties. Encryption, secure channels, and VPNs are primary mitigation strategies.

StarStarStarStar

Data Integrity

StarStarStarStar

Maintaining and assuring the accuracy and completeness of data. Mitigation strategies include cryptographic hash functions, digital signatures, and secure protocols like TLS.

StarStarStarStar

Non-repudiation

StarStarStarStar

The assurance that someone cannot deny the validity of something. Digital signatures, audit trails, and secure logs are methods to enforce this.

StarStarStarStar

Authorization

StarStarStarStar

Determining if a user has the right to perform an action or access resources. Mitigation includes role-based access control, principle of least privilege, and access control lists.

Know
0
Still learning
Click to flip
Know
0
Logo

© Hypatia.Tech. 2024 All rights reserved.