ITExams Flashcards
A shared resource matrix is a technique commonly used to locate:
A. Malicious code
B. Security flaws
C. Trap doors
D. Covert channels
D. Covert channels
Analyzing resources of a system is one standard for locating covert channels
because the basis of a covert channel is a shared resource.
The following properties must hold for a storage channel to exist:
- Both sending and receiving process must have access to the same attribute of a shared object.
- The sending process must be able to modify the attribute of the shared object.
- The receiving process must be able to reference that attribute of the shared object.
- A mechanism for initiating both processes and properly sequencing their respective accesses to the shared resource must exist.
You are part of a security staff at a highly profitable bank and each day, all traffic on the network is logged for later review. Every Friday when major deposits are made you’re seeing a series of bits placed in the “Urgent Pointer” field of a TCP packet. This is only 16 bits which isn’t much but it concerns you because:
A. This could be a sign of covert channeling in bank network communications and should be investigated.
B. It could be a sign of a damaged network cable causing the issue.
C. It could be a symptom of malfunctioning network card or drivers and the source system should be checked for the problem.
D. It is normal traffic because sometimes the previous fields 16-bit checksum value can over run into the urgent pointer’s 16-bit field causing the condition.
A. This could be a sign of covert channeling in bank network communications and should be investigated.
The Urgent Pointer is used when
some information has to reach the server ASAP.
When the TCP/IP stack at the other end sees a packet using the Urgent Pointer set, it is duty bound
to stop all ongoing activities and immediately send this packet up the stack for immediate processing.
Since the packet is plucked out of the processing queue and acted upon immediately, it is known as
an Out Of Band (OOB)packet and the data is called Out Of Band (OOB) data.
The Urgent Pointer is usually used in
Telnet, where an immediate response (e.g. the echoing of characters) is desirable.
Covert Channels are not directly synonymous with
backdoors
A covert channel is simply using a communication protocol in a way it was not intended to be used or sending data without going through the proper access control mechanisms or channels. For example, in a Mandatory Access Control systems
a user at secret has found a way to communicate information to a user at Confidential without going through the normal channels.
The Urgent Pointer is usually used in Telnet, where an immediate response (e.g. the echoing of characters) is desirable.
Covert Channels are not directly synonymous with backdoors. A covert channel is simply using a communication protocol in a way it was not intended to be used or sending data without going through the proper access control mechanisms or channels. For example, in a Mandatory Access Control systems a user at secret has found a way to communicate information to a user at Confidential without going through the normal channels.
In this case the Urgent bit could be used for a few reasons:
- It could be to attempt a Denial of service where the host receiving a packet with the Urgent bit set will give immediate attention to the request and will be in wait state until the urgent message is receive, if the sender does not send the urgent message then it will simply sit there doing nothing until it times out. Some of the
TCP/IP stacks used to have a 600 seconds time out, which means that for 10 minutes nobody could use the port. By sending thousands of packet with the
URGENT flag set, it would create a very effective denial of service attack. - It could be used as a client server application to transmit data back and forward without going through the proper channels. It would be slow but it is possible to use reserved fields and bits to transmit data outside the normal communication channels.
John is the product manager for an information system. His product has undergone under security review by an IS auditor. John has decided to apply appropriate security controls to reduce the security risks suggested by an IS auditor. Which of the following technique is used by John to treat the identified risk provided by an
IS auditor?
A. Risk Mitigation
B. Risk Acceptance
C. Risk Avoidance
D. Risk transfer
A. Risk Mitigation
Risk mitigation is the practice of
the elimination of, or the significant decrease in the level of risk presented.
A risk assessment, which is a tool for risk management, is
a method of identifying vulnerabilities and threats and assessing the possible impacts to determine where to implement security controls.
A risk assessment is carried out, and the results are analyzed. Risk analysis is used to
ensure that security is cost-effective, relevant, timely, and responsive to threats.