Security Flashcards
Just pain and suffering really
What are some methods of authentication
-Something you know(Password)
-Something you are(Biometrics)
-Something you have(keycard)
-Context location(e.g current location)
Passwords are widely used but hard to remember - good passwords should be long and random. What should good systems do in regards to passwords?
They should:
-Allow passwords to be an arbitrary length
-Store passwords hashed and salted
What should good two factor authentication do?
Should combine the known and the unknown
E.g password and generated key sent via email
Why is Biometric security not that useful upon further inspection
- Once data is leaked Biometrics are useless
- No longer all that hard to replicate Biometrics
Access control models are created to ensure only certain users have access to certain features, what is an example of a simple request.
AC = subject x object x request
E.g (Will, Ecm_2426_Exam, set)
where Subject is the set of users of a system, Object is the set of resources (to which access should be controlled), and Request is the set of possible actions
(e.g., read, write) a user might want to apply to a resource
How can roles be applied to an access control module to help reduce the stress of large systems
Roles can be created, each having different permissions that allows them to do different tasks. Roles can then be applied to users who inherit their permissions, this means each user no longer needs a long list of their allowed permissions
What are the fundamental goals of information security
Confidentiality: Protecting information from disclosure to unauthorized parties.
Integrity: Protecting information from being modified by unauthorized parties.
Availability: Ensuring that information is available (accessible) to authorized parties.
(CIA triad)
Why is the CIA triad hard to implement in actuality?
A system that is very secure, preventing all access to stored information, might not have a good availability.
Define identification
Associating an identity with a subject
Define Authentication
Verifying the validity of something (usually the identity claimed by a system entity).
Define Authorization
Granting (or denying) the right or permission of a system entity
to access an object
Define Access control
Controlling access of system entities (on behalf of subjects) Access to objects based on an access control policy (“security policy”)
Name some potential issues with using passwords
-It can be hard to keep them secret when attackers are using social engineering attacks
-Users may choose passwords that are weak and easy to remember over secure passwords
Define a policy enforcement point(PEP)
The enforcement of access control happens in each layer in a component called policy enforcement point policy enforcement (PEP). For deciding if a specific request should be granted or not, the PEP contacts a (central) policy decision point (PDP) that manages and evaluates the access control policy of the system.
What is a Policy decision point (PDP)
manages and evaluates the access policy decision point (PDP) control policy of the system
What does an access control policy define?
An Access control policy defines access control policy
what is allowed (or forbidden) in a system, it is similar to a set of rules or laws
How does the Access control matrix work
The access control matrix is based on the idea of privileges of subjects on objects.
Examples for subjects, objects, and privileges are:
Subjects: users, processes, agents, groups, …
Objects: data, memory banks, other processes, files, …
Privileges: right to read, write, modify, …
How can a security policy that uses an access control matrix be described
As a table, there is a column for each file and a row for each user. The table describes the permissions that the user has and the operations they can perform on this file. However this isn’t feasible for large systems as it will grow quadratically
In Role Based Access Control(RBAC) we have this equation, what does it mean.
AC := PA ◦ UA
ROLES is the set of roles,
USERS is the set of users (subjects),
UA ⊂ USER × ROLES is a relation mapping users to their roles, and
PA ⊂ ROLES × PERMSSON is a relation mapping roles to their permissions.
How can i add hierarchies to RBAC?
To define hierarchic RBAC, we introduce a relation RH ⊂ ROLES × ROLES that defines the role hierarchy
For example RH {(lecturer, student), (demonstrator, student)}
-Demonstrator and lecturer will assume all the permissions of students
Define data classification in access control
Instead of grouping objects we group subjects with permissions
What does Break-Glass access control mean
That access control can be overridden if needed
What is Discretionary access control
Discretionary access control (DAC): owners can chance permissions
- for example Unix/Linux file system
What is usage control
Usage control is controlling how documents are used, not who can use them. E.g you can read a book but not forward it or you are allowed to watch a movie only three times a week
How can access/usage control be overridden
Denied access can be overridden by a user, accepting liability that their actions can be logged. Often referred to as break glass access control
Refined vs course break-glass access Control
Refined has a greater integration of break-glass into
various access control models by using pre-defined emergency levels that can be activated or de-activated
Define Cryptography, Steganography and Cryptanalysis
Cryptography: the science of secret writing,i.e., cryptographers design messages that can only be read by certain people knowing a secret. The encrypted message does not need to be kept secret.
Steganography: the science of hiding messages in other messages or images, e.g., one can hide a message by encoding its content in the least significant bits of an image. Steganography is different from cryptography.
Cryptanalysis: the science of analyzing a cryptographic system to break/circumvent its protection
What does Cryptography allow us to establish communication channels with?
Confidentiality, integrity, and authenticity even in the presence of an attacker
Define Asymmetric encryption and why it works
Key1 != Key2
(cannot be easily derived from each other)
The public key (Key1) can be published without compromising the private key (Key2)
Without the knowledge of the necessary key, the (decryption)
operation should be computationally (very) hard
Define a Ceaser cipher
Each plaintext character is replaced by the character
three to the right modulo 26