3. Security Engineering Flashcards

1
Q

Define TCB

A

Trusted computer base

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define Security perimeter

A

Delineates the trusted and untreated components of a computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define reference monitor

A

An abstract machine concept that mediates all access between subjects and objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the two execution types?

A

Cooperative multitasking- does not allow for individual or isolation process.

Pre-emptive multitasking - allowed for true isolation of resources. Each task runs on its own space and processor time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the two CPU modes?

A

User state - (Problem Mode) - processor operates in reduced access to resources.

Privileged (kernel mode) - processor operates in ring 0, which has the highest level of trust.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the three security models?

A
  1. Bell-LaPadula
  2. BIBA
  3. Clark-Wilson
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Basics of Bell-LaPadula

A
  1. Subject cannot read data from a security level higher then its own.
  2. Subject cannot write down to a security level lower then its own.

No read up, no write down.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Basics of BIBA

A
  1. Designed to protect integrity of knowledge base.
  2. Subject cannot read data from object of lower level.
  3. Subject cannot write to an object with a higher level.
  4. A subject cannot call upon a subject at a higher level.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Basics of Clark-Wilson

A
  1. Separation of duties
  2. Enforces well-formed transitions by using the access triple: User>transformation procedure>Constained Data Item
  3. Stops unauthorized users from making changes
  4. Stops authorized users from making improper changes
  5. Maintain internal and external consistency.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define Discretionary Access Control

A

Security of object is at owners control.
Access granted through ACL
Identity based.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define Mandatory Access Control

A

OS makes decision based on a security label system.
Data owners CANNOT grant access
Subjects label must dominate the objects level.
User and data given clearance level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the four common architectures?

A
  1. Distributed computing
  2. Service Oriented Architecture
  3. Internet rich apps
  4. Ubiquitous computing - wireless networking
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the services provided by cryptography

A

PAIN
Privacy: prevents unauthorized disclosure
Authenticity: verifies the claimed identity
Integrity: detects modification or corruption
Non-Repudiation: combines authorization and integrity. User cannot dispute having sent a message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are some examples of symmetric cryptography?

A

Stream, RC-4, Block, AES/3DES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are other names for symmetric cryptography?

A

Private, shared key, secret.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the default standard for cryptography block ciphers?

A

AES

17
Q

Describe asymmetric cryptography.

A

Public key - private key pairs.

18
Q

What are the asymmetric algorithms?

A

RSA and DSA
ECC and El Gamal
Dickie Hellman and knapsack.

If not one of these then it is likely symmetric algorithm.

19
Q

How man bits is the MD5 hashing algorithm?

A

128bit

20
Q

How many bits is the SHA-1 algorithm?

A

160bit

21
Q

How many bits is the SHA-256 algorithm?

A

256bit

22
Q

What is a collision?

A

Two different documents make the same hash.

23
Q

What is a birthday attack?

A

Trying to force a hashing collision.

24
Q

What is an HMAC?

A

Hashed Message Authentication Code

Message+Symmetric Number+hashing algorithm

Gives integrity and reasonable authenticity. But does not provide true authenticity.

25
Q

What is OCSP?

A

Online Certificate Status Protocol.

This streamlines the process of verifying whether or not a certificate has been revoked.

26
Q

What are the two frameworks of IPSec?

A

Tunnel mode: whole packet is encapsulated.

Transport mode: only the payload is encapsulated.

27
Q

What is ESP?

A

Encapsulating security payload.

Provides authenticity and integrity through a MAC.

28
Q

For ANY indication that confidentiality is needed, you must use which exchange?

A

ESP

29
Q

Define AH.

A

Authentication Header.

Provides integrity, authenticity, and non-repudiation through the use of an ICV (Integrity Check Value).

30
Q

List the types of attacks on cryptography.

A
  1. Cipher text only - attacker only has cipher text and must brute force it.
  2. Known plain text - attacker has the cipher text, but knows what some of it is in plain text.
  3. Chosen plaintext - attacker can see the full text encrypted and decrypted.
  4. Chosen ciphertext - attacker can see whatever they want in plain or cypher. Sometimes called a midnight attack.
  5. Meet in the middle - attacker tries to learn what each key does individually (used in 3DES attacks)