Secure Communications and Application Vulnerabilities Flashcards

1
Q

How are secure communications achieved?

A

Through the design and implementation of protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the layered model of networking?

A

Each layer is an abstraction of networking.

Each layer has one or more associated protocols and vertical interfaces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Where are security protocols implemented?

A

At each layer of the model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What protocols are implemented at the application layer?

A

FTP, SMTP, HTTP, DNS, IMAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What security protocols are applied at the application layer?

A

PGP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What protocols are implemented at the Transport layer?

A

TCP, UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What security protocols are implemented at the Transport layer?

A

SSL/TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What protocols are implemented at the Network layer?

A

IPv4, IPv6, ICMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What security protocols are implemented at the Network layer?

A

IPSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What protocols are implemented at the Link layer?

A

ADSL, Ethernet, WiFi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What security protocols are implemented at the Link layer?

A

Wireless: WEP, WPA, WPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is SSL?

A

Provides secure programming interface to applications, inserted between the application and transport layers and secures communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When is SSL applied to communications?

A

TCP connection is followed by the SSL protocol handshake and data exchange.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does the SSL handshake work?

A

Client sends list of algorithms it supports and a nonce

Server chooses algorithms from list, sends choice + cert + server nonce

Client verifies the cert, extracts the server’s piblic key and generates a pre_master_secret which is encrypted and set to the server.

Server computes encryption and MAC keys from pre_master_secret and nonces

Client and server sends MAC of all handshake messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a cookie?

A

Text file stored on the client-side after being generated and transmitted from server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a form and what do they do?

A

Forms are online inputs that allow users to pass parameters to web pages.

Use GET and POST commands.

17
Q

When should validation be done on input?

A

Client-side before sending the information

Server-side before processing the information.

18
Q

How can input be restricted on a web page?

A

Dropdown menus, radio buttons etc.

19
Q

What do forms allow users to input into web pages?

A

Snippets of code by escaping the html.

20
Q

How can session-hijacking occur?

A

MITM attacks
Cross Site Scripting (CSS)
Session Sniffing

21
Q

How is session-hijacking done?

A

By reusing an old URL’s session ID, SID, Value.

22
Q

How does Cache poisoning work?

A

HTTP response splitting injects code into the web cache through the HTTP header which is executed if there’s no validation. This can change the DNS mappings of a site in order to serve the wrong content to the requesting user.

23
Q

How are web services assessed?

A

Identify running services

Identify subsystem and enabled components

Investigate known vulnerabilities in web services

Identify poorly constructed or protected sensitive data

Assess CGI, ASP etc scripts. Looking for parameter manipulation, patch regularity etc.

24
Q

What are the problems with emails?

A

Delivery systems for malware.

Encryption can be done through PGP and/or S/Mime

25
Q

How many bits does an S/Mime key have?

A

40 bits

26
Q

How is PGP used in email?

A

Uses PKI including X.509 certificate. Can use keys such as 3DES of 168 bits, and IDEA 128 bits

27
Q

How does S/Mime work?

A

Receive message
Separate the message from the header info
Decrypt the message
Retrieve the message body
Retrieve the digital signature and sender information
Compare the digital signatures
Allow or deny the message.

28
Q

Why are emails monitored?

A

To review business patterns and detect information disclosure

29
Q

What other issues does email face?

A

Anonymisation

Interception

Remailers forwarding information to the recipient and other servers. TOR setup can hide sender details using PKE

SMTP doesn’t check for the legitimacy or accuracy of emails.

30
Q

What did Baumgartner et. al. investigate and conclude?

A

Wanted to investigate connections between email servers to determine if email could be read.

Found they could trick emails to be sent in plaintext.
Also found that some organisations denied the connection but then opened another connection to send the plaintext version.

31
Q

What is STARTTLS?

A

Encrypts email session once the SMTP session has been initiated and STARTTLS is supported by the email server.

In the absence of STARTTLS a plaintext transmission is done.

32
Q

What is STARTTLS Stripping?

A

Takes advantage of the fail-open design of STARTTLS by making the encrypted transmission fail and then intercepting the plaintext.

33
Q

What are databases?

A

Data collected in tables with fields and elements with a describing schema.

34
Q

What are the benefits of using databases?

A
Shared resources
Reduced redundancy
Data integrity/internal consistency
Authenticated access
Accuracy
Recovery
35
Q

What is the problem of inference?

A

Sensitive information shouldn’t be able to be gleaned from public data. This can be done directly or indirectly.

Direct: User queries records to determine values
Indirect: Only stats are used to determine information

36
Q

What are inference attacks mitigated?

A

Suppression of stats when the identification of individuals is possible

Place controls on queries.

37
Q

What is multi-level security?

A

Data is protected with a number of different controls, such as partitioning, encryption, integrity checking.

38
Q

What is SQL injection?

A

Use SQL in the input form on the frontend to run SQL code on the backend.