Chapter 3: Security Engineering Flashcards

1
Q

5 Symmetric Block Cyphers

A

EDB, CBC, DES, 3DES, AES last two are bay far most common 3DES very processor intensive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Abstraction

A

hides unnecessary data from user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

access control matrix

A

a table defining what accesss permission exist between subject and object.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AES

A

Most common ecryption algorithm

what block cypher does bla bla bla:

AES

default standard for most apps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AES Finalists

A

MARSRC6Rijndael - Winner!SerpentTwofishAES has four functions: SubBytes, ShiftRows, MixColumns, and AddRoundKey.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AES winner from 5 finalists

A

Rijndael was chosen and became aes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AH

A

Authentication Header provides Auth and integrity for each packet of network data. provideds dig. signature protects against replay attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Algorithm

A

a collection of all the math functions can be performed.

block of data goes though a bunch of math functions…

we want confusion…good strong math.

diffusion plain text intesperced with cypher text adds to confusion…

Permutation- rounds of encryption.

Kerkoff… principle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ALU

A

Algorithmetic logic unit and control unit performs math functions fed by the control unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Aspects of Asym Cryptography

A

PAIN

Privacy, Authenticity, Integritiy, Non- Repudiationdd

Privacy = Every - user has a key pair private and public.

the two key’s are mathimatically related..

aka public key cryptography

Authenticity = sender encrypts with private key (random info) like time of day sent.

Integrity - Hashing comapre hashing that no change has happened.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Asymmetric Crypto - Inegrity Examples

A

MD5, SHA-1, SHA 256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Bell-Lapadula

A

It is focused on maintaining the confidentiality of objects. Protecting confidentiality means not allowing users at a lower security level to access objects at a higher security level.no read up no write down

*****all about confidentiality protecing gov secrets!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Bibba

A

Integrity of Information no read down no write up.

“Down Data is Dirty”

worried about integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Birthday Attack

A

Attempt to cause hash collisions.

it is based on the idea that it is easier to find two hashes that happen to match than to produce a specfic hash. “dump luck”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Block Cyphers

A

Symmetric Encryption encrypt blocks of data each round 56bit for DES, 128,192, 256 for AES

uses:

Confusion: carried out through substitution

Diffusion: is carried out though transpositon

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Blowfish & Twofish

A

Blowfish and Twofish are symmetric block ciphers created by teams led by Bruce Schneier, author of Applied Cryptography. Blowfish uses 32- through 448-bit (the default is 128) keys to encrypt 64 bits of data. Twofish was an AES finalist, encrypting 128-bit blocks using 128- through 256-bit keys. Both are open algorithms, unpatented, and freely available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Bollard

A

A security barrier for a car.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Brewer-Nash

A

aka chinese wall avoid conflict of interest by assigning someone to one item.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

burn rating

A

2 hrs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Ceasar Cipher

A
  • Simple Substitution
  • Shift Characters 3 spaces
  • A=D, B=E, C=F, etc
  • Substitusion Ciphers are subject to pattern analysis.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Chaining Feedback in Stream Modes called feedback

A

seeds the previous encrypted block into the next block to be encrypted. This destroys patterns in the resulting ciphertext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Chosen Ciphertext Attack

A

An attacker can see whatever they want in palin or ciphertext. They have compromised a workstation. Sometimes called a lunchtime or midnight attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

chosen plaintext attack

A

attacker can see the full text excrypted and decrypted. Usually the attacker has initiated the message.

you now have both and can compare them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Cipher

A

a crypographic algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Cipher Block Chaining

A

is a block mode of DES that XOR’s the previous encrypted block of ciphertext to the the next block of plaintext to be encrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Ciphertext Only Attack

A

Attacker has captured encrypted text on the network. Usually means all the attacker can do it brute force. not very successful

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Clark-Wilson

A

users access object via contrained programs/user interface

enforece well-formed trasactions throught the access triple

Helps to enforce integrity of the data

“keep users out of your stuff or they’ll break it.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Clipper Chip

A

encryption in telecom devices skipjack key used went defunct in ‘96

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Collision

A

When two different documents product teh same hash it is called a collision.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Common Asymmetric alorithms 6

“buddy system”

**importamento**

A
  • DSA
  • RSA
  • ECC (Elipitcal Curve Crypto)
  • El Gamal
  • Diffie Hellman
  • Knapsack

If it ain’t in the list then it is symmetric

Write down before test

RSA and DSA - “the SA bros”

ECC and El Gamal “start with e’s”

DH (Diffie Hellman) and Knapsack - doogie hauser has a knapsack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

common criteria

A

iternationally agreed upon standard for describing and testing security of IT products

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Confusion

A

Good strong math complex math for substitution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

CPTED

A

CPTED (Crime Prevention Through Environmental DesignProvides instruction on direction of the use of:Organizational (People)Mechanical (Technology, hardware)Natural Design (landscaping, natural environment)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

CPU Cycles

A
  • Fetch - retrieves instruction from application
  • Decode - control unit deciphers teh instruction and directs data from sys memory to ALU
  • Execute - control and alu performs the math
  • Store - result is stored in memory.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

cpu modes

A

priveledge more level 0

user mode level 3 - non root

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Cryptoanalysis

A

Science of breaking ecrypted messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Cryptography

A

Secret Writing - communication that can only be understood by recipient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Cryptology

A

Science of Secure communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

CSRF

A

uses session ID

grab session information if you

cross site request fogery

takes advantage of a website’s trust in a user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

DAC

A

Discretionary Access Control

  • Security of an object is as the owner’s discretions
  • Access is granted through and ACL (access control list)
  • Commonly implemented in commercial products and all client based systemes
  • Identity Based

***Microsoft uses this…all about the owner.

linux and unix

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Datacenter Location

A

Not in basement because of floods Not on first floor because of trafficNot on top floor because of fireIdeally on 2nd or 3rd floorShould be located in center of the building to avoid data emanation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

CipherText

A

PlainText +Initialization Vextor + Algorithm(aka Cipher) + Key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Deluge System

A

Same as dry pipe but sprinker head is open - releases much water faaaaaaast. no good for data processing environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

DES Electronic Code Book

A

does not use an initialization vector or chaining and patterns can be clearly visible in the resulting ciphertext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Diffie-Hellman

A

First asymmetric alogrithm

Key agreement allows two parties to securely agree on a symmetric key via a public channel like the internet, with no prior key exchange.

secure key agreements without pre-shared secrets.

we can agree on the 5h number based on the info we already have.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Diffusion

A

Permutations Rounds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Digital Certificate

A

x.509 v4 stardard

provides authenticity of a servers public key.

via hash the compare the has

encrypted by the certificate authority.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Digital Signature

A

Hash + Sender Private key…

standard.guarantee’s non-repuditaion = integ & auth

require PKI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Discrete Algorithm

A

Discrete logarithms apply logarithms to ((((GROUPS)))), which is a much harder problem to solve. This one-way function is the basis of the Diffie-Hellman and ElGamal asymmetric algorithms. a logarithm is the opposite of exponentiation…much harder to compute.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Door Security

A

Hinges should be protectedHinges internal to the door provide protection for the hinges while still allowing door to open outwardlyPanic bar allows for quick evacuationKick plate provides cosmetic protection for doorStrike plate—T-shaped component of lock which provides reinforcementIn the event of power failure, electronic doors can:Fail secure: Fails locked. No evacuation. Only in facilities where value of what is being protected exceeds human lifeFail Soft: Opens outward, but door is locked to bar returnFail Safe: Door fails open (easiest to evacuate)On the CISSP exam never choose fail secure . Fail soft/safe is the best choice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

DRAM

A

less expensive uses capacitors can leak charge

requires constant charge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Drawbacks to Symmetric Cryptography

A

out of band key exchange

not scalable

no authenticity, Integrity or Non-Repudiation

we only get privacy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

ECC

A

Elliptical Curve Cryptography

Asymmetric

Based on plotting point upon a curve

super fast and efficient..only designed to work with certain enviornments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

eeprom

A

being able to flash the bios with software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

electromechanical alarms

A

Most commonRely on a connection being brokenmagnet on door and frame. Alarm sounds if the connection is brokenWeight based systems based on the same concept

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Elliptic Curve Algorithm

A

much stronger per bit than systems using discrete algorithms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Enigma Machine

A

Enigma Machine/Purple Machines

used by germans and japs.

add rotors to incrase comlexity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Exclusive or XOR

A

Bits are different answer is 1 same answer is 0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Facility Considerations CPTED

A

Improve Surveillance: Improve visibility and eliminate concealment opportunitiesAccess Control:Actively control traffic, direct visitors, limit accessTerritoriality:Providing the impression of a well-tended building provides a deterrentActivity Support:Ensure all areas of the facility are occupied at least occasionally. Use activities like meetings, luncheons to populate these area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Fail Soft

A

door works as normal allows people out not in.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Fencing

A

Controls entrance accessCan be costly and unsightlyHeights provide degrees of protection3-4 feet – deters casual trespassers 5-7 feet – too high to climb easily (preventive)8 feet with 3 strands of barbed wire – (preventive) Will discourage all but the most determined intruder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Firmware

A

PROM (Programmable Read-Only Memory) can be written to once, typically at the factory. EPROM (Erasable Programmable Read-Only Memory) and EEPROM (Electrically Erasable Programmable Read-Only Memory) may be “flashed,” or erased and written to multiple times.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Goals in Protecting Property

A

Most important goal is to protect life, property and operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

halon

A

halon good fatal to people though…

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

HASH

A

one way math = for integritiyhash on both sides sender/receiver to ensure integrity

assurance it hasn’t been corrupted.

all hash are fixed length..

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Hash Collision

A

two pieces of text/documents create the same hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

HASH MAC

A

Message agreed upon symmetric key + agreed upon hash never truly as good as dig sig. with it true non repudiation reasonalble assurance of authenticity without the overhead of a PKI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Hashing Algorithms 3 main- know bit lengths 4 less known

A

MD5 128 bits

SHA1 160 bits

SHA -256

Less common:RipeMD, Tiger, Whirlpool Haval

one way math..

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Haval

A

hash of various length uses principles of md5…

70
Q

How many ways are Hashes

A

One- Way

71
Q

Humidity

A

Humidity should be around 50%Too high causes condensation/rustToo low causes ESD (Electro static discharge aka static electricity

72
Q

hypervisor

A

key to virtualization security it is the traffic cop for virtualization

73
Q

IaaS

A

linux server hosting

74
Q

IKE

A

Internet Key Exchange negotiates the algorithm selection process or the two sides of the ipsec tunnel.

75
Q

Initialization Vector

A

Used in some symmetric cyphers to ensure that the first encrypted block of data is random

make sure initial number is random..go from there.

sudo random number

similar to “seed” or a “salt”

76
Q

International Data Encryption Algorithm

A

a block cipher designed as an international replacement to DES. The IDEA algorithm is patented in many countries. It uses a 128-bit key and 64-bit block size.

77
Q

IPsec

A

An Encapsulation Framework.

tunnel mode and transport mode

Internet Protocol Security is a suite of protocols that provice a cryptographic layer to both IPv4 & 6 IPsec includes 3 primary sub-protocols:

Authentication Header (AH) - runs ICV integrity check value ie hash on the header (doesn’t work with NAT) - non-repudiation

Encapsulating Security Payload (ESP). - you need it for privacy - encryption

Internet Key Exchange (IKE) key management config of security associations and security paramater indexes.

78
Q

IPSec Sub - Protocols 3

A

AH - non-repudiation

ESP - Encryption

testable: any indication you need confidentiality you need ESP

IKE - key management for security parameter and associations is the rodey…comes out ahead of the show and sets everything up.

two subs: oakly- diffe hellman

isakamp manages keys, security associations.

79
Q

IPsec Transport Mode

A

only the packet is encapsulated.

ESP transport mode only encrypts the data (and not the original headers); this is commonly used when the sending and receiving system can “speak” IPsec natively

80
Q

IPSec Tunnel Mode

A

Tunnel mode is used by security gateways (which can provide point-to-point IPsec tunnels). whole packet is encapsulated.

ESP tunnel mode encrypts the entire packet, including the original packet headers. ESP

most secure mode….greater security.

81
Q

ITSEC

A

first successful euro evaluation model

82
Q

Kerkoff Principle

A

Let the algorithms be open

more people looking at it the better!

83
Q

Known Key Attack

A

cryptanalyst knows something about the key

84
Q

Known Plaintext

A

A known plaintext attack relies on recovering and analyzing a matching plaintext and ciphertext pair: the goal is to derive the key that was used.

85
Q

Known PlainText Attack

A

the attacker has captured cipher text, but also knows what a portion of the message is in plain text (like an automatic signature)

figure out how the key encrypts based on some known data.

86
Q

Lattice Security Model

A

upper lower access limits on subject and object.

In a lattice model, there are pairs of elements that have the least upper bound of values and greatest lower bound of values.

87
Q

External Consistency

A

Ensures that the data stored in the database is consistent with the real word.

88
Q

Layered Defense

A

Outer PerimeterBuilding Grounds and ConstructionIngress/EgressInterior

89
Q

levels of evaluation EAL

A

EAL 4 is what most companies go for no total overkill

90
Q

Linear crytanalysis

A

cryptanalyst finds large amounts of plaintext/ciphertext pairs created with the same key. the pairs are studied to derive information about the key.

91
Q

MAC

A

Higher Security

heart and sould is label.

  • Data owners cannot grant access
  • OS makes teh decision based on a security label system
  • Subject label must cominate the object label.
  • Rules for access are configured by the security officer and enforced by the OS.

Labels are written in stone

Gov. Organiztions use…ie confidential label.

92
Q

MAC - Cryptography

A

Message Authentication Code - less overhead than PKI Integrity and reasonable authenticity.

Hash Messaged and Shared Symetric Key with is a HMAC has mac…have symmetric key issues…got to share it…

Message + Symmetric (shared) key + hashing algorithm = HMAC

*does not provide true authenticity*

93
Q

masking

A

mask out inportant data.

94
Q

MD5

A

128bit hash not secure replaced by MD6

95
Q

Meet in the middle attack

A

A known plaintext attack relies on recovering and analyzing a matching plaintext and ciphertext pair: the goal is to derive the key that was used.

96
Q

Meet in the middle attack

A

these attacks are targeted towards algorithms like 3des where there are muliple keys. an attacker tries to learn what each key does individually.

97
Q

monoalphabetic cipher

A

uses one alphabet: a specific letter (like “E”) is substituted for another (like “X”).

98
Q

Montreal Protocal

A

got rid of halon cause of ozone.

99
Q

Most secure windows

A

polycarbonate

100
Q

multi - core cpu

A

for multi threading…

101
Q

multi programming

A

did not allow for isolation of individual processes. hard for multiple programs to run at the same time….they had to be written to deal with other programs.

102
Q

Multi Threading

A

is the ability to perform more than one thread at a time. is was done via OS but to get true MT. we need mult. processors.

103
Q

multiprocessing

A

mult processes on mult cpu’s

104
Q

multitasking

A

mult tasking allowed for the true isolation of resources each application was running in its own space and could be isolated.

105
Q

Nonce

A

to add uniqueness add randomness trwart replay attack

106
Q

OCSP

testable :)

A

Online Certification Status Protocol- streamlines the process of verifying whether or not a cert has been revoked.

107
Q

One Way Function Factoring Prime Numbers

A

typical in asymmetric alogrithms example: Factoring prime numbers An example of a one-way function is factoring a composite number into its primes. Multiplying the prime number 6269 by the prime number 7883 results in the composite number 49,418,527. That “way” is quite easy to compute, taking milliseconds on a calculator. Answering the question “which prime number times which prime number equals 49,418,527” is much more difficult. That problem is called factoring, and no shortcut has been found for hundreds of years. This is the basis of the RSA algorithm.

108
Q

OWASP

A

The Open Web Application Security Project (OWASP; see http:// www.owasp.org) represents one of the best application security resources. OWASP provides a tremendous number of free resources dedicated to improving organizations’ application security posture. One of their best-known projects is the OWASP Top 10 project, which provides consensus guidance on what are considered ten most significant app risks

109
Q

PasS

A

web service hosting

110
Q

Permutation/Transposition

A

provides diffusion by rearranging the characters of the plaintext, anagram style. “ATTACKATDAWN” can be rearranged to “CAAKDTANTATW,” for example. Substitution and permutation are often combined.

111
Q

PGP

A

pretty good privacy

symmetric block cypher

uses IDEA alogrithm instead of AES

“PGP is a good idea”

112
Q

PIDAS Fencing

A

Perimeter Intrusion Detection and Assessment SystemDetects if someone tries to climb a fence or damage the fenceMesh-wire fence with a passive cable vibration sensor that sets off an alarm if detected

113
Q

pipelining

A

multiple steps into one unit.

114
Q

PKI

A

Public Key Infrastructure

115
Q

polyaphabetic ciphier

A

Uses Multiple alphabets.

116
Q

Polyinstantiation

A

two different objects that have the same name

multiple instances of an event.

Enter fasle information for sensitive data.

a Big work for lying.. :)

117
Q

Positive airflow

A

HVAC Positive Airflow (Contaminants/smoke should flow out, not in)

118
Q

Power issues terms

A

Power ExcessSpike: Momentary high voltageSurge: Prolonged high voltagePower DegradationSag: Momentary degradationBrownout: Prolonged degradationPower LossFault: Temporary outageBlackout: Prolonged outage

119
Q

Pre-Action System

A

combo of wet and dry pipe

120
Q

process

A

from an executable program

121
Q

RBAC

A

used to prevent priveledge creep.

based on role of organization…not like the indivuals like DAC.

122
Q

RC4

A

Stream Cypher

123
Q

RC5 & RC6

A

RC5 and RC6 are symmetric block ciphers by RSA Laboratories. RC5 uses 32- (testing purposes), 64- (replacement for DES), or 128-bit blocks. The key size ranges from 0 to 2040 bits. RC6 was an AES finalist. It is based on RC5, altered to meet the AES requirements. It is also stronger than RC5, encrypting 128-bit blocks using 128-, 192-, or 256-bit keys.

124
Q

Ref Monitor

A

mediates access between subject/objects

125
Q

ring model

A

4 rings 0 - kernel1 - other os components2 - device drivers3 - user apps

126
Q

ROM

A

memory that maintains without power bios is a ROM

Read only memory

127
Q

RSA

A

named for Rivest, Shamir, Adleman creators

Current Standard for Dig. Signatures

once doc get hashed RSA encrypts hash with senders private key.

**factorization** trap door function

one way math…

128
Q

S/MIME

A

(Multipurpose Internet Mail Extensions) provides a standard way to format e-mail, including characters, sets, and attachments. S/ MIME (Secure/ MIME) leverages PKI to encrypt and authenticate MIME-encoded e-mail. The client or client’s e-mail server (called an S/ MIME gateway) may perform the encryption.

129
Q

SaaS

A

software as a service: webmail

130
Q

SBox

A

substitution round for block cypher all driven by the key. for number of rounds…etc.

131
Q

Scytale

A

based on rod size

tape wrapped around rod.

132
Q

Secuirty Services Provided by Cryptography

A

P - Prevents unauthorized disclosure of info.

A - Authenticity: Verifies the claimed indentity

I - Integrity: detects modification or corruption

N - Non - repudiation: combine uthenticity and integrity a user can’t dispute sent message and its contents.

PAIN

133
Q

Security Association

A

made of of a destinsation address and spi

(security parameter index) for IPSec sub protocol IKE - ISAKMP

unique identifier for every secure connection.

this is a socket for a secure connection.

2 one for outgoing and one for incoming.

134
Q

Security Domain

A

a list of objects a subject is allowed to access

135
Q

Service Oriented Architecture

A

neutral services so vendors can communicate with eath other…

136
Q

SHA-1

A

160bit hash

137
Q

Single DES

A

Single DES is the original implementation of DES, encrypting 64-bit blocks of data with a 56-bit key, using 16 rounds of encryption. The work factor required to break DES was reasonable in 1976, but advances in CPU speed and parallel architecture have made DES weak to a brute-force key attack today, where every possible key is generated and attempted. Triple DES Triple DES applies single DES encryption

138
Q

SRAM

A

more expensive uses small latches flip-flops and fast

holds it info without power…use for cache.

139
Q

SSL/TLS

A

know this phrase:

Asymmetric Key Exchange

Symmetric Data Exchange

need symmetric for speed.

public key encrypts the clients session key

both parties have secure channel with symmetric key…like secure cb radios…

  1. client set up secure session
  2. server sends certificate
  3. client decrypts the servers cert using the public key from the trusted CA.
  4. server decrypts session key using its private key and estblished secure session.

client

140
Q

Stream Cypher

A

1 bit at a time XOR, transpositon or substituion

141
Q

Substitution

A

Crypto Substitution replaces one character for another

142
Q

Symmetric Algorithm

A

ie: Private Key, Shared key, Secret Key, Session Key - (limited time)

Same key to encrypt and decrypt

Stream Cypher - very fast not as secuire used in hardware. Only know RC4

Block Cypher - slower AES = standard /3DES still around not used as much

143
Q

Symmetric Stream Cypher

A

RC4

144
Q

Target Hardening

A

four D’sDeterDelayDetectDeny

145
Q

TCSEC

A

trusted computing evaluation criterea ie the orange book one of the first security standards implemented most tings are based from that.c - discretionary controlsb - mand. controlsa - verified protection all of b plus addl…

146
Q

temp

A

nice constant temp.dd

147
Q

threads

A

child threads from a parent process

148
Q

TOCTOU

A

Time of Check/ Time of Use (TOCTOU) attacks are also called race conditions: an attacker attempts to alter a condition after it has been checked by the operating system, but before it is used. Maintenance Hooks

149
Q

Triple DES

A

Triple DES applies single DES encryption three times per block. Formally called the “Triple Data Encryption Algorithm” (TDEA) and commonly called “TDES” or “3DES,” it became a recommended standard in 1999. 48 Rounds - Kurt :)

150
Q

Trusted Computer Base

A

Originated from orange book.

Security Perimiter - delineates trussted and the untrusted components in a computer system.

Reference Monitor - mediates access between subject and objects

Security kernel - enformant of ref monitor

is defined as the total combination of protection mechanisms within a computer system.

151
Q

Type C

A

need to be in electrical fires tested quartly

152
Q

Ubiquitous Computing

A

Wireless Networking

RFID

NFC - wireless keys in hotel

LBS - location based security.

153
Q

UL325

A

Class I: Ornamental/ResidentialClass II: Commercial usage where general public access is expected: Gated community, self-storage facilityClass III: Industrial Usage where limited access is expected. Example: A WarehouseClass IV: Restricted access: Prisons, military

154
Q

Vernam Cipher

A
  • One time pad
  • only mathematically unbreakable form of cryptography.

key must be used only once

pad must be at leas as long as the message

key pad is statistacally unpredictable

key pad must be delivered and stored securely.

one tiem key rsa…evey minute…etc.

155
Q

Vignere

A
  • First polyaplphabetic cipher
  • key word is agreed upon ahead of time
  • First letter fo teh key is matched up against fist letter of the message and so on.
156
Q

Virtual Memory

A

provides virtual address mapping between apps and hardware memory

157
Q

Volumetric detection

A

More expensive (used for higher value assetsPhoto-electric: Changes in light—no windowsAcoustic systems: detect certain frequencies of sounds

158
Q

What block cypher does bla bla bla

A

Guess AES default standard.

159
Q

What Makes up a Ciphertext

A

Plaintext + Initialization Vector + Algorithm + Key

160
Q

what type of crytopgraphy does tls use

A

best hybrid.

if not that then asymmetric…

161
Q

what type of cryptography use for data exchange

A

symmetric cryptography.

for key exchange it it asymmetric.

162
Q

whats the forumla for the number of keys in an asymetric enviornment

A

2N

163
Q

Which fence will deter a determined intruder

A

8 feet with 3 strands of barbed wire – (preventive) Will discourage all but the most determined intruder

164
Q

who is responsible for the safety of employees

A

Senior Management

165
Q

Work Factor

A

How long it will take to break a cryptosystmem. (decrypt cyphertext without key)

166
Q

x.509 v.4

A

the Standard digital certificate format for Pub. key interface PKI.

stardarized….

167
Q

XOR

A

Steam Ciphers XOR

exclusive or

plain text + key

Values:

same = 0

diffrent =1

168
Q

XSS

A

client side threat

cross site scripting

attacker takes control of a trusted website. with a code injection.

question: cross site scripting takes advantage of a user trust of a website.

169
Q

Refencence Monitor

A

defined as an abstract machine that mediates all access to objects by subjects to ensure that subjects have the necessary access rights and to protect objects from unauthorized access

170
Q

Access control - Dominate

A

Higher or equal to access class. The reason is the term dominates refers to a subject being authorized to perform an operation if the access class of the subject is higher or dominates the access class of the object requested.

171
Q

Rainbow Attack

A

Rainbow attacks involve using pre-computed hashes of their password equivalents.

Basically we take a rainbow table; a list of passwords and hash value equivalents and just compare the hashes we see on the wire (Or file elsewhere like in the SAM file or in the process lsass.exe memory space) to the list of pre-computed cleartext password equivalents in the rainbow table for instant cleartext passwords.

Mitigation: Password salting involves adding random characters to the password hash making the attack infeasible. There are millions of possible salt values which means you would need one 67 GB database for each of the possible.

172
Q

ISO 9126

A

is a standard to assist in evaluating the quality of a product

The functions are those that satisfy stated or implied needs.
Suitability
Accuracy
Interoperability
Security
Functionality Compliance