ELEC 377 Flashcards

1
Q

What are the 4 security levels

A

1) Physical
2) Human
3) Network
4) OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which two security levels are outside of OS control

A

1) Physical
2) Human

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are 3 methods to implement physical security

A

1) Bios Password
2) Drive encryption (Can be device level or OS level)
3) Limit who has access to hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are some common Human Security attacks

A

Password Resets
Phishing
Baiting (Free hardware or software that contains viruses)
Tech Support callbacks
Fake services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the CIA of system security

A

C - Confidentiality
I - Integrity
A - Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are confidentiality issues in system security

A

Issues that stem from data problems, such as unauthorized disclosure of data, personal information, corporate R&D, financials or government information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are integrity issues in system security

A

Modification of data such as balances on a credit card, or system modification, such as backdoor servers or software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are availability issues in system security

A

Unauthorized use (leads to loss of CPU cycles)
Denial of service, or a change of password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe: Encryption at rest

A

Data in long term memory ie on a disk or hard drive is encrypted, and only decrypted when in use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is application security

A

Security regarding applications a user installs. Applications may be vulnerable, or may be malicious. These attacks can be prevented by encryption at rest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Security is?

A

Pervasive. Needs to be taken seriously by entire organization, or vulnerabilities will arise.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a stack overflow attack

A

Binary code is written into a buffer, overwriting the return address to point to the buffer, executing that code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the two types of Call/Return

A

intel/PPC/ZOS - Push return address to stack
ARM/NIOS - store return address in link register. If there are nested calls then push return address to stack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a real life example of Stack Overflow attack mentioned in class

A

BMP attack - stack overflow attack on images

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How can we protect against stack overflow

A

Address Randomization - Logical address of data segment and stack segment change each time the process runs
Executability - Make stack pages not executable
Canary Values - Insert values into stack. If those values have been modified when exiting code we know an error is caused and terminate process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Canary Values

A

Usually compiler generated. Random value is provided by OS and read into a global value during process startup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does the Device Driver Interface do?

A

It presents the devices connected to the programs. Devices are usually abstracted into different class such as SATA or SCSI drives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the two main types of devices discussed in class

A

1) Character Devices - Move data 1 byte at a time. Mouse, keyboard Modems
2) Block devices - Devices where the minimum unit of transfer is a block. Discs, tapes, network interfaces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does the /dev directory do

A

The /dev directory stores device files. Device files can only be created by root. Note that in unix everything is masked as a file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How are files in /dev setup

A

inode attributes specify the device. There are no data blocks. Major and minor numbers are used to specify drivers and specific devices respectively.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How do Character Device Drivers work

A

Major numbers connect the device to the driver. There can be multiple files with the same major number and the same or different minors. A process reads and writes to/from the device by reading & writing to/from the device file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the concept of informational security

A

Informational security is the idea that individual pieces of information reveal nothing, but collectively they reveal private information.

19
Q

What are some ways informational attacks take place

A

1) Carefully crafted queries. Asking a specific question that seems harmless but reveals information that may be important.
2) Traffic analysis

20
Q

What is authentication as discussed in class.

A

The question of ensuring the person trying to access information or a system is the person they are saying they are.

21
Q

What are the 3 authentication factors

A

1) Something you know like a password
2) Something you have like a security fob
3) Something you are like biometrics

22
Q

What are some specifications of the 2003 NIST password guidlines

A

1) Use special characters/numbers
2) Periodically change your password

23
Q

What are some problems with periodic password changes and what is the common time limit on password

A

4 months. Due to often changing passwords, people will use variants of their old password. This leads to easier password cracking attempts

24
Q

What were amendments made to the NIST guidelines in 2017

A

Organizations SHOULD not required arbitrary changes. They SHALL forces a change if there is evidence of a compromise.
They SHOULD not impose composition rules.
They SHALL compare to a list of common words and SHALL reject if the password is deemed weak.
SHOULD permit the paste functionality to facilitate the use of password managers

25
Q

What are some common problems with passwords and passphrases

A

1) People use common substitutions that can be easily guessed.
2) People use common words or phrases or significant words/phrases that password crackers can find.

26
Q

What is the general rule for password guidelines

A

THE ONLY THING THAT MATTERS IS LENGTH!!!
thats what she said (;

27
Q

What are some common password vulnerabilities not related to their composition

A

1) Packet sniffing - unencrypted network protocols can be compromised
2) Account sharing
3) Masquerade - A program that looks like a login screen and steals information.
4) Shoulder Surfing
5) ATM skimming

28
Q

What are some issues with biometric security

A

1) External devices can be logged/tracked
2) Biometrics lead to a false sense of security
3) Organizations can make uneducated decisions, or use biometrics for selfish reasons ie recording shoppers in a store.
4) Fake fingers - silicone or gelatin fingers that can mimic the attributes of skin
5) Face masks with photos - can be used to fool bad surveillance systems
6) Biometric systems can reduce anonymity - everyone has photos of everyone else

29
Q

What is the most recent changes made to the NIST guidelines in 2024

A

The recommendations from 2017 are not requirements. More multi factor and risk based authentication information is included.

30
Q

What are some ways websites can verify passwords when logging in, and prevent attacks

A

1) Store passwords in a secure encrypted
2) rate limiting - do not allow user to enter incorrect password many times in a row

31
Q

Linux password manger

32
Q

What is the difference between program threats and system threats

A

Program threats are types of vulnerabilities in programs that may lead to an incident or breach. System threats are the same but apply to systems

33
Q

What is a common threat implemented

A

Back Door attack. A hole left by the programmer to allow for an attack. Usually a hard coded number, password or identifier.

34
Q

How do SUID program attacks work

A

An SUID program is one that runs with administrator. A security check is made before doing an action then the action is done. The attack switches the action between check and do so the functionality the attacker wants is run with admin privilege.

35
Q

Why is parameter checking important to prevent program threats

A

Parameters need to be checked to prevent attackers from passing harmful code through bash scripts, web parameters or SQL injections

36
Q

Name a few system threats

A

1) Key loggers - track inputs and sometimes hardware decisions
2) Trojan Horse - program that pretends to do one thing while doing a different thing on the side.
3) Masquerade - Special type of trojan horse. Common examples are login or web site masquerades.

37
Q

What is the difference between a Virus or Worms

A

Viruses are sophisticated attacks that usually us a trojan horse to begin their attack. Worms are similar to viruses but they break into other systems and copy themselves onto that system. Viruses need human action to spread

38
Q

Why is the term metamorphic sometimes used to refer to Viruses and worms

A

Metamorphic viruses and worms constanly rewrite themselves, by changing lines such as mov eax, 0 to xor eax, eax. This allows them to hide from malware detectors which are signature based.

39
Q

Describe the process of a smurf attack

A

Ping packets are sent between systems. An attacker will lie about their IP address and send a global ping packet which will illicit many responses which are returned to the fake IP address which is actually the address of the target. This overwhelms the target system.

40
Q

What is the difference between a fraggle attack and a smurf attack

A

A fraggle attack uses echo responses instead of ping responses.

41
Q

What is Eavesdropping and what is an attempt to prevent it

A

Eavesdropping is listening in on another users internet traffic. Internet switches are supposed to prevent this however ARP poisoning is a problem

41
Q

What are 4 types of Network attacks that deny service

A

1) Smurf
2) Fraggle
3) ICMP
4) XMas tree

42
Q

What does ARP stand for and what is ARP poisoning.

A

ARP stands for address resolution protocol, and is man in the middle attack in switched environments. A user can change their MAC address to receive another users messages then pass them back to the other user as if nothing is happening.

42
Q

How can ARP poisoning be prevented

A

Logging MAC address changes to prevent sending information after a suspicious change

43
Q

Describe pharming as mentioned in class

A

Pharming attack start by compromising a DNS. They will impersonate a website, track information given, then pass the information on to the normal website and use the information later

44
Q

Define a rootkit as mentioned in class

A

A Root Kit is software used to hide the evidence of system modification. They were originally used by intruders in Unix system to hide backdoor changes

45
Q

Is a rootkit an initial vulnerability

A

No. Rootkits are not how an attacker broke into the system. Sometimes the attacker will patch the attack to prevent the system being taker

46
Q

How can a RootKit be caught?

A

Manually search device drivers & parse disk data structures. Then compare the values found to the values the os displays. If there are discrepancies there is something afoot.