Chapter 1 Flashcards

1
Q

Do not Trust a Network Connection

Example: Two computers on a desk connected by an Ethernet cable (No other (wireless) connections exist)
How secure is it?

A

Assuming we have physical security, this network is secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Do not Trust a Network Connection

Assume we cannot protect the physical security of the Ethernet cable…
* Step 1: Obtain a knife
* Step 2: Add RJ45 adapters
* Step 3: Get yourself a computer with two network interfaces
* Step 4: Configure transparent Ethernet bridging

What happens next?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Do not Trust the Network

A
  • In this case, you are not even required to be a physical “man in the middle”
  • An ARP spoofing attack can logically place the attacker between, e.g., Alice and Bob.
  • With tampered ARP tables, packets flow from Alice ↔ Attacker ↔ Bob!
  • Result: There are endless opportunities for any kind of attacker to monitor/interfere with your traffic!
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Types of Attackers

Options for attacks on the message level

Passive vs Active attacks, differentiate.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Attacker Model

  • *
    Attacker model = definition of what an attacker can do and cannot do
    Dolev-Yao attacker model: explain.
A
  • The attacker is or owns the network (all routers, switches, connections)
  • But: The attacker has no control over end systems
  • The attacker can perform any active and passive attack
  • But: The attacker cannot break cryptographic primitives (encryption, signing, hashing, etc.)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The Attacker’s Position in the Network Determines their Capabilities

  • Attackers typically do not control the entire network/Internet.
  • The attacker’s position in the network is crucial and defines which messages can be seen/ what the attacker can do. Possible scenarios?
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Security Goals

Confidentiality, Data Integrity, Authenticity, Controlled Access, Accountability, Availability. Explain them.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Discuss security goals that are in conflict.

A

Integrity vs. Authenticity
Authentication vs. Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Explain the term THREAT, vulnerability, security violation, attack.

A
  • A threat in a communication network is any possible event or sequence of actions that might exploit a vulnerability, leading to a violation of one or more security goals
  • Vulnerability: e.g., a badly configured access control system
  • Threat: e.g., a hacker accesses data protected by the access control system
  • Security violation: e.g., confidentiality of company secrets harmed
  • Attack: The actual realization of a threat
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Threats vs Risk

  • Threats can be more or less
  • When performing a risk analysis or security audit, analysts often consider
  • Often defense strategies are picked after …
  • As a rule of thumb, you try to avoid high rist attacks first
  • Security is expensive (and inconvenient)!
A

“problematic” or “critical”

  • Likelihood: Can the attack be implemented efficiently, which makes it more likely and hence more critical?
  • Resulting damage: Is the attacked target a critical component, which makes the attack more critical?

such an analysis to decide which security measures to take

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Security Violations - Definitions

  • Impersonation:
  • Forgery of information:
  • Modification or loss of (transmitted) information: …
A
  • An entity claims to be another entity (also called “masquerade”)
  • An entity creates new information in the name of another entity
  • Data is being altered or destroyed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Security Violations - Definitions

  • Repudiation
  • Eavesdropping:
  • Authorization Violation:
  • Denial of Service (Sabotage):
A
  • An entity falsely denies its participation in a communication act
  • An entity reads information it is not intended to read
  • An entity uses a service or resources it is not intended to use
  • Any action that aims to reduce the availability and / or correct functioning of services or systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Example 1
* Authorization Violation + Eavesdropping

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Example 2
* Impersonation + Forgery of Information

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  • Denial of service: Example
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Denial of Service + Impersonation + Forgery of Information: Example

A
  • Goal: Alice floods Bob with TCP SYN packets while also covering up her identity
  • Alice@Box$ hping3 –fast –count 42 –rand-source –syn –destport 80 $BOB
  • –rand-source: random spoofed source IP address