Midterm # 2 Flashcards
Authentication is?
The process of determining whether a user should be allowed access to a system.
Authentication question?
are you who you say you are?
authorization
are you allowed to do that?
The three authentication methods?
Something you know
Something you have
Something you are
How to prevent forward search attack
To prevent a forward search attack on a public key encryption we append random bits to the message before encrypting it
Salt?
Appending a non secret random value known as salt to each password before hashing it.
What is a salt?
a non secret value that causes identical password to hash to different values
What is a two factor authentication?
any authentication method that requires two out of the three “somethings” is known as a two factor authentication
what is the common criteria?
EAL1 through EAL7
what is EAL1
functionally tested
what is EAL2
Structurally Tested
What is EAL3
Methodically Tested and Checked
What is EAL4
Methodically Designed, Tested, and Reviewed
What is EAL5
Semiformally Designed and Tested
What is EAL6
Semiformally Verified Design and Tested
What is EAL7
Formally Verified Design and Tested
What are ACL’s?
Access control lists, columns
What is C-lists?
Capabilities, rows, subject trying to perform an operation
What are the advantages of capabilities?
with capabilities the association between users and files is built into the system. Capabilities are more complex to implement, and have higher overhead
what are the advantages of ACL
ACL based system, which is a separate method for associating users to files is required.
what is the confused deputy?
the confused deputy is a classic security problem. fooled by some other party into misusing its authority. the compiler is acting on Alice’s behalf.
Classification applies to…
Objects
Clearances apply to…
Subjects
Classification and Clearances order?
Top Secret
Secret
Confidential
Unclassified
what is BLP
Bella-LaPadula
What is Bella-LaPadula
is to capture the minimal requirements with respect to confidentiality, that any MLS system must satisfy
BLP consists of two statments
Simple Security Condition,
Property
What is Simple Security Condition
Subject S can read object O if and only if L(O) <= L(S)
What is Property
Star property, Subject S can write objects O if and only if L(S) <= L(O)
what is the point of compartments?
to further restrict information flow “across” security level, compartments enforce he need to know principle.
what is a covert channel?
communication path
what is captcha?
is a test that a human can pass, but a computer can not pass with a probability better than guessing.
what does firewall provide?
firewall provides access control for the network. Each type of firewall filters packets by examining the data up to a particular layer of the network protocol stack.
What are the five layers of packet filter?
application, transport, network, link, physical
what is the advantage of a packet filer
efficiency
concept of firewall?
firewall has no concept of state so each packet is treated independently of all others.
what do packet filters use?
they are configured using access control ists or ACLs
what is a port scan?
Trudy tries to determine which ports are open through the firewall
Application proxy?
the incoming packet is destroyed and a new packet is created in its place when the data passes trough the firewall.
Protocol what is bad?
it is a bad idea to have the two sides in a protocol do exactly the same thing, since this might open the door to an attack. small changes to a protocol can result in big changes in its security.
Remember..
You should not use the same key pair for signing as you use for encryption
how prevent MiM attack?
Alice and Bob can use their shared symmetric key K_AB, to encrypt the diffie hellman exchange
what is timestamp?
a time value
what is the benefit of timestamp?
is that we do not need to waste any messages exchanging nonces, assuming that the current time is known to both Alive and Bob.
Zero knowledge proofs
bobs cave which side
what is Fiat shamir?
relies on the fact that finding a square root modulo N is as difficult as factoring.
Why is it better to hash passwords with a salt than to hash passwords without a salt?
Not a secret, stored with passwords
dictionary attack more difficult
it creates more work for hacker
hacker can not use precomputed work.
why do we hash passwords with a salt rather than encrypt the password file?
store you have to encrypt the key, if you get the password file you get the key.
Password file is a single point of failure
What purpose do timestamps and nonces serve?
challenges used to verify authentication session PREVENT REPLAYS
Advantage of timestamp as compared to a nonce?
MORE EFFICIENT
One significant disadvantage of timestamp as compared to nonce?
CLOCK SKEW
time is a security concern
Lampson’s access control matrix, capabilities?
C-lists, rows and describe permissions for subjects
Lampsons access control matrix, ACLs?
Access control lists, are columns
2 advantages of C-lists over ACL’s
Easy to add or delete
easy to delegate permissions
2 advantages of ACLs over C-lists
Easier to implement
Easy to change permissions
Differences between Authentication and identification?
One to one VS one to many
subject compliance VS non subject compliance (data)
Which is easier and why? authentication or identification?
authentication is easier: Only one way for authentication Already know i am authenticating Comparisons to ONE with identification one to many, comparisons depends on data
Packet fileter
works at the network layer, attacker uses TCP ACK scan