CSCI262 Deck 1 Flashcards
What is authentication
Authentication is the binding of an identity to a subject
What are threats against password systems
Password guessing. Password exposure. Login trojan programs. Poor passwords. Password Cracking
What is password entropy
It is the randomness and uncertainty of a password
What is the entropy formula
log2N
What is the entropy of a bank PIN
log2(10)*4
What are the qualities of some cryptographic hash functions
One way/pre-image and Collision resistant
What is a one-way/pre-image hash function
Computationally infeaasible that for a given digest Y we can find X such that H(X) = Y
What is a collision resistant hash function
Computationally infeasible to find messages X and ‘X while X!=X such that H(X) = H(‘X)
What is a password salt
Salt is a random value added to a password prior to running it through the hashing algorithm
What is an Access Control
A security policy that specifies who or what may have access to each specific system resource and the type of access that is permitted in each instance
What is Authentication
Verification that the credentials of a user or other system entity are valid
What is Authorisation
The granting of a right or permission to a system entity to access a system resource
What is an Audit
Review or exam of system records and actitvities to ensure compliance with policies
What are 4 types of Access Control policies (acronym)
DAC. MAC. RBAC. ABAC
What does DAC stand for
Discretionary Access Control
What does MAC stand for
Mandatory Access Control
What does RBAC stand for
Role Based Access Control
What does ABAC stand for
Attribute Based Access Control
What is DAC
Users user their own discretion to specify who can access what
What is MAC
Control access based on comparing security levels with security clearances
What is RBAC
Control access based on user’s roles
What is ABAC
Control access based on user’s attributes
How can we show a Access Control matrix in written form. E.g: Process1 READ File 1 and Read / Write File2
A(Process1. File1) ⊇ Read – A(Process1.File2) ⊇ Read – A(Process1.File2) ⊇ Write
What is an advantage of an ACM
Allows for fast and easy determination of the access control rights for any subject-object pair