Exam Paper Flashcards

1
Q

Difference between authentication and Identification

A

authentication : verify the identity, what user have

Identification : Identify the user, who the user is

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Difference between subject and object

A

Subject : An active entity within an IT system
eg. Process running under a user identity.
Used when discussing operational systems enforcing
policies

Object : Files or Resources
eg. Memory, printer, directories

Subject would have control on an object according to r,w,x permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How firewall can improve network security and what their main limitation are

A

• Implements ‘single point’ security measures
• Security event monitoring through packet
analysis and logging
• Network-based access control through
implementation of a rule set
• Defends a protected network against parties
accessing services that should only be available
internally

Limitation :
• Cannot protect against attacks that bypass the firewall like tunneling
• Cannot protect against internal threats or insiders
• Network firewalls cannot always protect against
the transfer of virus-infected programs or files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

One-way hash function and how it is used in Access Control

A

Takes a message of any length, and returns a
pseudorandom hash of fixed length.
Encrypt password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Explain TOCTTOU

A

Time of check to time of use
Repeated Authentication
Authenticate user before and during a session
For example, in banking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Trusted Computing Base

A

“The totality of protection mechanisms within a
computer system responsible for enforcing a security
policy”

  • One of more components
  • Enforce a unified security policy over a product or
    system
  • Correct enforcement depends on components within
    as well as input from administrators

Hardware – Dedicated registers for defining privileges
• Operating system kernel – E.g. Virtual Machine
Hypervisor
• Operating system – Windows security reference monitor
• Services Layer – JVM, .NET
• Application Layer – Firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explain CIA and 2 Additional Properties

A

Confidentiality : Prevent of data disclosure
Integrity : Prevent data modification
Accessibility : Prevent data withholding
Accountability : Users should be held responsible for their actions
Non - Repudiation : non foregable evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Software Vulnerability

A

Points is software that is vulnerable and can be attacked.

Malwares, Viruses , Trojan. Bug in software that can be exploited. eg. Heartbleed in SSL.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Man - in - the - middle Attack and Example

A

ARP Cache Poisoning.

We can simply send an unrequested ARP reply,
and overwrite the MAC address in a hosts ARP
cache with our own

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Functionality in a botnet and example in DDOS

A

group of hijacked Internet-connected devices, each injected with malware used to control it from a remote location without the knowledge of the device’s rightful owner

Can be used for TCP Syn flooding for DDOS. ordered to rapidly access a website as part of a larger DDoS attack.

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

“Layer Below Attack”

A

Accessing the layer below the layer that is secured. Messing with the hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Four types of threat vectors

A

Email
Webpage
Software Vulnerability
Chatrooms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are intrusion detection systems? Compare host based and network based.

A
  • Detects possible intrusion attempts
  • Generates alerts and logs for administrators

Host-based (HIDS):
• Monitors the characteristics of a single host to find
suspicious activity including resource / app usage
• In many ways modern Anti-virus does this
- Single computer

Network-based (NIDS):
• Monitors network traffic and analyses a variety of
packets from different protocols to identify suspicious
activity
- Network of computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Describe and compare “accountability” and “nonrepudiation”

A

accountabiity : user responsible for their actions. keep a log
Non-repudiation : unforgeable evidence that someone did something. eg. digital certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Access Control List (ACL) Where it is used and what are its disadvantage.

A

Used to show what subject is allowed to do to the named file.
Stored with an object itself, corresponding to a
column of an ACL.
eg. game.exe | Alice : r,w,e | Bob r,e
-Difficult to get an overview
-Tedious to set up
-Management of individual subjects is hard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Denial Of Service and Example

A

• A denial of service attack is an attempt to make a
machine or network resource unavailable to its
authorised / intended users
• This will usually involve flooding a machine with
enough requests that it can’t serve its legitimate
purpose
• E.g. Ping flood
• A distributed denial of service occurs where there
is more than one attacking machine

17
Q

TCP syn flooding

A
• Attacker initiates a genuine
connection but then
immediately breaks it
• Attacker never finishes 3-way
handshake
• Victim is busy with the timeout
• Attacker initiates large number
of syn requests
• Victim reaches its half-open
connection limit
• Denial of service
18
Q

Single Sign On

A

user authentication process that permits an user to enter one name and password in order to access multiple applications.

19
Q

Onion Model Diagram

A
Application 
Services
OS
Kernal
Hardware
20
Q

Race Conditions

A

• With concurrent threads or processes, timing can
lead to security vulnerabilities:
- Space between no access and opening file.
Prevent by turning it into one system call

21
Q

Unix file permission

A
Octal Representation
Inodes store security representation
4 - Read
2 - Write 
1 - Execute
User-Group-Others
22
Q

2 Different Password attack and Prevention

A

Online

  • On login terminal
  • Phishing?
  • Logging attempts. Limit

Offline

  • When password hash file is obtained
  • Brute forced
  • Complex password
23
Q

XSRF Attack

A

Cross-site Request Forgery
• When a user puts in an HTTP request, they
will also send any relevant session cookies
• E.g. an SID from having logged in
• If the user has already authenticated, a
malicious URL can then perform some
action on their account

Prevent by using synchroniser tokens

24
Q

Cookie Stealing

A
Cookies are small text
files used to provide
persistence.
• Session – Deleted when
the browser exits,
contain no expiration
date
• Persistent – Expire at a
given time

• Obtaining this cookie – Cookie Stealing –
lets you hijack their session

25
Q

2 Different ways Cryptography is Applied

A

DH KEX

Hash Function

26
Q

Steps in public key encryption

A

Asymmetric Encryption
Eg : Diffie Hellman KEX
• Two keys, a public key and a private key
• It is computationally inpractical to calculate a private
from a public key
• In practice this is achieved through intractable
mathematical problems