CS4203 Flashcards
Asset Definition
Anything the computer system controls
How do buisnesses measure risk?
risk = expected cost x probability
Why does risk = expected cost x probability not work?
- cannot always estimate cost of something happening
- cannot always estimate probability
What is a qualitative way of measuring risk?
Create categories for hazards e.g. negligible, minor, major, survivable, existential.
What is a threat actor?
Could be company, state, hacker, etc.
What is a threat model?
Points of attack against a system. prioritised by risk, vulnerabilities and countermeasures.
What is an attack?
The execution of a threat using an attack vector by a threat actor.
What is a threat?
A way in which the system could be comprimised.
What is Identity?
Who you are.
What is an attack vector?
A specific vulnerability in the system that can be used in an attack against the system.
What is agency?
The things that you are allowed to do. (connected to identity)
What is privacy?
The requirement that information only be seen by those who have permission to see it.
What is authentication?
Proving a claim to an identity.
What is Anonymity?
Prevent something from being associated with an identity.
Can scripts act as users?
Yes and in fact it is very hard to distinguish between a person and a bot (sciprt acting as a user)
What is non-repudiation?
The inability to deny that you did something.
What is trust?
A combination fo agency and identity.
What is reputation?
Trust in an agent migrates from one system to another.
What is a vulnerability?
Aspects of a system that provide a mechanism for a threat.
What is a security model?
A precise statement of the rules that the system should implement and the properties it should maintain.
Why do you need a security model?
Security is a whole system issue, therefore everyone needs awareness of the risks, policies and warning signs.
List some consequences of being attacked?
- Locked out of systems
- Damage, time take to re-build and check integrity
- Reputation damage to the company
- Fines
- Lawsuits
- GDPR violation
Why can new technology be a bad idea?
- users will use it incorrectly unless they have training
- users will have to change their behaviour which they will resist
- extra security measures will not be liked and will be circumvented where possible
What are some criticisms of security models?
- might describe policies you cannot enforce
- cannot identify every threat this way
- cannot list every system component
- how do you introduce new components
- how do policies map to files and permissions?
- does the OD provide the needed service
What is the military model for information access?
Individuals and assets have a sensitivity level which describes their permissions.
What are some pros and cons of the military information model?
Cons:
- Might be forced to fragment documents as people need access to parts but not other sections
Pros:
- Easy to move people/documents to different sections, so fewer mistakes when changing security levels
What are ACLs?
Access Control Lists - to each asset associate a list of users and their permissions.
Pros and cons of ACLs?
Cons:
- relies on identity
- looks at assets independantly (how do you make sure everything is consistent?)
- What is the difference between write and append?
What is RBAC?
Role-Based Access Control - A user is given a role, permissions are associated with roles and not users.
What are some pros and cons of RBAC?
Cons:
- basic form is just like ACLs
- Can build very general structures but these could get too complicated to maintain
- need ways to move between roles
- what if a role is revoked
Pros:
What are NIST’s five functions?
Identify
Protect
Detect
Respond
Recover
What are some critiques of NISTs five functions?
- Focus on the process rather than the mechanism
- Lots of mechanisms could be used in each of the functions
What are some features of cryptography other than encryption and decryption?
- can be used to authenticate someone (public-private key)
- therefore provides non-repudiation
What is the goal of encryption?
Make some data computationally
infeasible to read in an appropriate interval
What are the cipher styles and what are they suited to?
Stream (data encrypted as it is generated) - suited to network transmissions
Block (data encrypted all in one go) - suited to files
Why should you use open source ciphers?
- creating a cipher is very specialised
- if you make your own you are almost guaranteed to program in weaknesses that will be exploited
- best algorithms are open source anyway so there is no need
What are the pros and cons of symmetric key encryption?
Pros:
- Use the same key to talk to different people
- very fast
Cons:
- Don’t know exactly who sent the message if lots of people
use the same key
- How do we get the keys in the first place?
- Can we remove a key from someone?
What is a keyserver?
A repository for public keys
Pros and cons of asymmetric encryption?
Pros:
- Message can’t be read unless attacker gets access to
receiver’s private key
- Key distribution is easy
- can be used to authenticate users
Cons:
- Orders of magnitude more complex than symmetric-key
encryption
What is signing in the context of encrypted messages?
Use a private key to encrypt a message or a seperate section of text, which can then be decrypted with your public key in order to check that you are who you say you are.
How could a keyserver be attacked?
Replace someone’s key woth your own.
What makes passwords insecure?
- They need to be used by humans and therefore both memorable and unpredictable.
- if you use words then lower entropy because of the english language and the likelyhood of two letters being next to each other
What is entropy?
The measure of disorder of a system.
What is Shannon entropy?
The number of bits needed to transmit a message X of lenght n. Used for error-correction codingg and compression.
What us a replay attack?
If you get the password once then you can use it against the service you want to attack.
What is reuse?
People use the same password on multiple services.
What is a key logger?
Records all of the keys a user enters.
Why do policies need to take into ccount human limitations?
People can only remember so much. Don’t mandate that they cannot write down passwords and then force them to remember 5 passwords each with 25 random alphanumeric characters
Pros and cons of biometrics?
Pros:
- cannot forget it (always with you, part of you)
- Hard to fake
Cons:
- needs to be stable enough for authentication
- needs to be unintrusive
- lookalikes
- fake fingerprints
- hold the person to the camera/fingerprint reader
- once compromised, very hard to regain security (valid person cannot change their biometrics)
Draw the OS structure.
Layers:
- Processes (accessing library and standard library) (multiple)
- Library (multiple)
- Standard Library
- Kernel
- Drivers
- Firmware
- Hardware
What is kernel space?
Has unrestricted access to everything. Root/admin privilages.
What is user space (userland)?
Access resources through the kernel. User privilages, all privilaged operations through the kernel.
What are the points of vulnerability in an OS?
- Accessing other running processes
- Accessing data inappropriately
- Accessing hardware resources inappropriately
- Where did that library come from?
- What does that driver do?
- What does that hardware do?
What is isolation?
Processes are kept seperate, with their own memory and list of open files.
What security does isolation provide?
A fault in one
program can’t corrupt the memory of another.
How can processes interact even with isolation?
Explicity through pipes, sockets or shared blocks of memory.
Implicitly by changing files they both have access to.
What are the responsibilities of thekernel and the user?
User:
- All of the programs and the languages
- trust the kernel to isolate from malicious code
Kernel:
- The data structures and functions that need to be standardised for all users and processes
What are traps?
Mechanism for crossing the trust boundary into kernel space.
What is a kernel-beneath-the-kernel?
A security microkernel:
- Hold sensitive data securely,
potentially even from the kernel
- Sometimes provides checks as to
what software can be loaded,
including kernels
- Isolate security features into as small as possible a code
footprint – which can then be checked extensively
How does Unix describe permissions?
Create groups to describe permissions, each user can be in multiple groups.
What is Security-Enhances Linux?
An extension to ordinary Linux that adds better RBAC in place of/alongside groups and file
permissions
What are common services?
Anything the OS provides is available to all processes “as standard”
What is full-disk encryption?
Use crypto as standard so that all files are encrypted at rest, with no user involvement.
Two virtual machines running on the same physical machine have some differences. What are they?
Each has its own kernel and therefore potentially a different operating system and a different sets of users, groups, permissions.
What manages the virtual machines running on a host?
The hypervisor.
What is a container?
An isolated userland, instead of a VM. Same kernel, but different libraries, etc.
What is the virtual upgrade problem?
Updating the host doesn’t
upgrade the VMs or containers. May end up with outdated, security-compromised software running, and may not even know it.
What are the challenges of digital cash?
- No double spending
- No duplication
- No repudiation
- Paying for the infrastructure
How does bitcoin keep transactions secure?
- cryptographic hash
- nonce is found which makes it hash to a specific value (0)
- now if transaction is altered the nonce and hash won’t map to 0.
- even if you can change one block, each block is connected to another block which will now not match up
Are you anonymous when using bitcoin?
Technically yes, your public identity is just your wallet. However might be able to identify you based on your transactions or if your identity is mapped to your walet then all of your transactions are visible. Also moving crypto into a bank means it will be linked to you.
How does accessing remote machines impact security?
- Fundamentally less information about users
- More points of attack
- Often more value in a given attack:
attack the bank rather than just
one customer - Greater anonymity, harder to track
What is DDoS?
A (Distributed) Denial of Service attack. Prevent anyone from accessing the server, attack a router nearby, or flood with fake traffic to prevent the real trafffic from being processed.
What are back doors?
A way to log-into or control a system other than through the normal secured channels.
When would you want a back door?
A vendor or provider needs to
get in when there’s a problem for the usual route. For use in exceptional cases, so should come with exceptional requirements
What does ssh use for identification?
A keypair/certificates
How can you identify a machine?
MAC or IP address
What is a DNS?
Domain Name System - maps structured network and machine names to IP addresses, gives info to anyone who asks.
What is DNS poisoning?
Change a DNS entry and all lookups can be sent to a different machine
What is a Man-in-the-middle attack?
Machine sitting between a user and a legitimate server. Pass information on but only after stealing something. Relies on the (in)ability to identify a specific
machine
What is a suplpy-chain attack?
Instead of attacking the target, attack a service that it uses or downloads software from.
What is a DMZ?
A Demilitarised Zone of untrusted services. Basically an area between two firewalls, allows some untrusted clients to connect to DMZ, but not through to the intranet.
What is confidentiality in terms of a message?
Traffic can only be read by the sender and the indended recipient.
What is anonymity in terms of a message?
Only the sender and intended receiver know of the existence of the message
What is authentication in terms of a message?
Both sender and receiver can demonstrate that they are who they say they are.
What is integrity in terms of a message?
The message arrives uncorrupted