N11. Security Flashcards

1
Q

What is a firewall?

A

Programmable packet filter
- situated on border router
- implements filter policy
Prevents:
- packets leaving site network
- packets entering site network
Access control lists (ACLs) - what is and is not allowed
Deep packet inspection (DPI) - looks beyond header of packet
Stateful packet inspection - looks beyond single packet at flow of packets and monitors state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Disadvantage of firewalls

A

Can be a performance bottleneck

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the difference between security and privacy?

A

Security - protection from things on the wire
Privacy - protection from sharing information that shouldn’t be publicly shared (helps with security but they are distinct, beyond packet layer to application layer)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

List 3 parts of security analysis to consider:

A
  1. Security threats - what to protect against
  2. Security services - to protect against threats
  3. Security mechanisms - algorithms and protocols to implement security services chosen
    (Implementation - specific hardware, software and policy required)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Give examples of common security threats

A

Eavesdropping (traffic monitoring) - inspection of traffic contents, traffic patterns. Control-plane and user-plane.
Traffic modification - changing ‘genuine’ packets, forging of packets and data
Man in the Middle (MitM) - forged identities, fake servers/services, fake clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the secret-key system of key-based cryptography?

A

Secret-key system:

  • single key, k1 == k2
  • used for both encryption and decryption
  • must be known and kept secret by both parties
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the public-key system of key-based cryptography?

A

Public-key system

  • pair of matched keys - one for encryption, one for decryption
  • k1 and k2 different but complementary - one secret, one public
  • harder to break than private-key encryption but more computationally expensive
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How are hash algorithms used in security?

A

Creates a fixed size bit pattern from any input of bits (strong checksum)
1. fixed size hash value as output
2. cannot reproduce original message from hash value
3. very low probability of producing two messages with same hash
Message Authentication Code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Message Authentication Code?

A

Based on hash algorithm, alternative to public-key encryption

  • use secret key k
  • combine secret key with plain text and hash
  • check that MAC output matches expected (even one bit changed indicates tampering with content)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Explain how Digital Signatures are used in security?

A

Digital signature is like a strong, secure checksum
Gives high assurance of message authenticity and integrity
Signature - with public key (create hash, encrypt with secret key, check at receiver using public key) - if hash given to receiver doesn’t match hash from decrypting with public key then document has changed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How are certificates used in security?

A

Certification Authority issues a certificate (and public key to user) and authenticates the certificate with a digital signature.
Certificate contains:
- user ID
- user public key
- dates of validity
- CA’s ID and signature
On receiving a certificate, user should check signature using public key, check for revocation and use directory service (must trust CA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is TLS?

A

Transport Layer Security (formerly SSL)
- originally for secure HTTP sessions - HTTPS
- general API can potentially be used by any protocol over TCP
TLS is end-to-end - sits above normal sockets interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What services does TLS provide?

A
  1. a client to authenticate a server
  2. a serve to authenticate a client (optional)
  3. client and server to select crypto protocols for a communication session
  4. client and server exchange session keys securely
  5. confidential sessions between client and server
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Describe the TLS handshake

A
  1. client hello - TLS options proposed
  2. server hello - TLS options selected by server
  3. server key exchange - certificate (with public key)
  4. server hello complete
  5. client key exchange - sends session key encrypted with server’s public key
  6. client change cipher spec - activate new session state
  7. client finished - secure session established
  8. server change cipher spec - activate new session state
  9. server finished - secure session established
How well did you know this?
1
Not at all
2
3
4
5
Perfectly