Part 1 Flashcards
What are the 3 aspects of the CIA triad?
Confidentiality: No unauthorised reading/learning of data.
Integrity: No unauthorised modification or destruction.
Availability: Timely and reliable access to data.
What is non-repudiation?
The assurance that an entity cannot deny having done an action.
What is authenticity?
Property of being genuine and being able to be verified.
What is accountability?
Property that an action should be able to be traced back to the entity that performed it.
What are the assets of a security system?
Software
Hardware
Data
Communication facilities and networks.
What are the 3 types of vulnerability?
Leaky: Unauthorised access
Unavailable: Slow, using becomes impossible/impractical
Corrupted: wrong thing/wrong answers
What is an attack?
A thread that is carried out.
What are the two attack classifications?
Active: Attempt to alter/affect operation of assets.
Passive: Attempt to learn/make use of information from a system.
What is an inside attack?
An attack initiated by an entity inside the security perimeter.
The entity has authorised access to the system.
What is an outside attack?
An attack initiated by someone outside the security perimeter.
What is a risk?
Measure of the extent to which an asset is threatened by a potential circumstance/event.
The likelihood of occurance.
What is a countermeasure?
An action that mitigates the effects of an attack/risk.
What is encryption?
Transformation of information using a secret.
What is access control?
Rules, policies and mechanisms that limit access to resources to those people/systems with a “need to know”.
What is a “need-to-know” determined by?
Identity
Role
What is authorisation?
Determining whether a person or system is allowed to access resources, based on an access policy.
What is authentication?
Determination of role/identity.
How can an entity be authentication?
Something they have (smart card)
Something they know (password)
Something they are (biometrics)
What is physical security?
The physical barriers and restrictions used to improve the security of resources and components.
What are examples of physical security?
Copper meshes in walls
Locks
Placement of computers in windowless rooms.
Sound dampening materials.
What are backups?
Periodic archiving of data to enable restoration in the event of failure.
What are checksums?
Functions turning a file into a numerical value.
What does a checksum function rely on?
The whole file.
Flipping a single bit should change the output.
What are computational redundancies?
Computers/storage devices that serve as fallbacks in the case of failures.
What is symmetric encryption?
Encryption using a single, secret key.
What is asymmetric encryption?
Encryption using a public-private key pair.
Public for encryption, private for decryption.
What is the RSA process?
- Choose 2 prime numbers (p and q).
- Calculate N (N = pq).
- Calcuate T (T = (p-1)(q-1)
- Choose numbers e,d where ed mod T = 1.
- PU = (N,e), PR = (N,d)
To encrypt: (message)^e
To decrypt: (message)^d
What is a digital signature?
Encryption of the hash of a message using the senders private key that can be used to authenticate their identity using their private key.
What is a Man-In-The-Middle attack?
An attack where communication is intercepted by a third party.
What is a primitive root?
N is a primitive root of the prime q if its powers mod q is an integer in the range 1-(q-1).
(2,13),(2,17)
What is a discrete logarithm?
i is the discrete logarithm of b:
b = a^i mod q
What is the diffe-hellman process?
Explain it.
What is the job of a certificate?
BInd a user/company identity to their public key.
What are the mandatory fields of a certificate?
Version Serial Number Signature Issuer Validity Subject Public Key
What is the PKI?
Public Key Infrastructure.
Set of hardware, software, people, processes and policies.
What is the role of the PKI?
Faciliate the creation of a verifiable association between a public key and the identity of the holder of the corresponding private key.
What cryptography does the PKI use?
Asymmetric
What is the job of the CA?
Certification Authority
Issue, revoke and distribute public key certificates.
How are certificates signed?
Using the private key of the CA.
What is the PKI repository?
A means of storing and distributing x.509 certificates and CRL, and managing updates to certificates.
What is the job of the RA?
Registration Authority.
Verify user request for a certificate.
What is the process of certificate issuance?
- RA verifies user request.
- User chooses PR, CA chooses PU.
- Certificate issued by CA.
What is the process of certificate usage?
1 . User fetches certificate.
- User fetches CRL.
- User checks that the certificate is valid using CRL.
- User checks the signature using certificate.
What are the reasons for certificate revocation?
Compromised private key
Company moves physical address
Expiration
HR reasons
What is a CRL?
Certificate Revocation List.
List of no longer valid certificates.
What are the issues of a CRL?
Expensive to distribute.
Updates not sent quickly enough to defend against atttacks.
Vulnerable to DOS attacks.
What are the mandatory fields of a CRL?
Version Signature This Update Next Update Revoked Certificates [ ]
What is TSL?
Transport Layer Security Protocol
What does the TLS provide?
Privacy and data integrity
What are the 2 protocols of TLS?
Handshake protocol.
Record protocol
What is the handshake protocol?
User sends: Client hello, protocol version, suite of supported cryptographic algorithms.
Server responds: Highest common version and suite, public key certificate (with key).
Client checks certificate, generates secret key and sends to server using its public key.
How does a client check the certificate of a server?
The certificate is signed by the private key of the CA, so can be verified using the public key of the CA which is included in browsers.
What is kerberos?
Network Authentication Protocol.
What encryption does kerberos use?
Symmetric encryption
What are the goals of kerberos?
Usrs password shouldn’t travel on the network.
Single login for a session
Client and servers mutually authenticate.
User passwords never stored
Authentication information centralised on the authentication server.
What is a realm in kerberos?
The users and services authenticated by a KDC.
What is a principal?
User, application server, sevices on the network.
What is a ticket in kerberos?
Proof of id for a user to access a service.
What is the KDC?
Key Distribution Center.`
What does the KDC store?
A database of principals and their master keys generated using their passwords.
Database is encrypted using the master key of the KDC.
What are the 3 components of the KDC?
Database
Authentication Server
Ticket Granting Server
What is phase 1 of Kerberos?
User requests ticket.
AS generates SA.
AS generates TGT: (Username, SA, T1)
AS encrypts TGT with KDC master key.
AS sends to user, encrypting with user’s key KA.
User logins in, KA generated from password.
User decrypts and obtains the TGT.
What are the limitations of Kerberos?
Single point of failure
Requires synchronised clocks
Assumes client’s workstation is secure
Vulnerable to password guessing
What are the 2 steps of User Authentication?
Identification, Verification
What are the problems with passwords?
Password Overload
Passwords can be guessed
Must be stored safely
Password reuse
How can an attack crack a password?
Brute Force Shoulder Surfing Dumpster Diving Guessing Interception Key Logging Social Engineering
What is phising? + countermeasure
Using a fake site to gain credentials to be used on a target site.
CM: Server-side authentication
What is interception? + countermeasure
Clear text information intercepted by an attacker (man in the middle)
CM: Encrypt communication among users and website.
What is keylogging?
Using software to record the keys typed by users.
Can get passwords from this.
E.g. Kidlogger, Revealer
What are the countermeasures for Shoulder Surfing and Dumpster Diving?
User Training and awareness
What are the 2 types of password attacks?
Offline/Online
How many combinations are the for a brute force attack?
(Length of alphabet)^(length of password)
What is an online dictionary attack?
An attack that tries passwords from a dictionary of words, common passwords, important words to the user (name, address, pet…) etc.
Not 100% guarenteed to crack the password, but can lead to less trials and time needed.
What are good countermeasures for password cracking?
Throttling
Locking
Protective Monitoring
Password Blacklisting (common passwords)
What is password strength?
The effectiveness of a password against a brute force attack.