Security Counter Measures Flashcards

1
Q

Difficulties of Passwords

A

Passwords are a trade-off between password complexity and human memory faculties.

  • A password does not authenticate a person, only that they know a particular secret

For this secondary forms of authentication can be used such as;
Two-factor authentication.
One-time passwords.
Personal delivery courier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security Design Principles

A
  • A combination of mechanisms can enhance protection
  • Security by obscurity only protects against casual intruder
  • Where possible, separate security-relevant data from data that should be openly available.
  • You have to balance convenience and security

Encryption and access control are used to guard password files. This can be referred to as defence in depth.

Refrain from placing much trust in this strategy. Out of sight, out of mind does not work on a determined attacker.

Shadow password files achieve the desired separation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Access Control

A

Access control is crucial in computer systems for maintaining integrity and securing shared resources like memory and printers.

Password authentication is used to grant or deny access to objects, while reference monitors grant or deny access based on the subject’s request.

Principals, either human or software, are stored in an access control list (ACL) attached to the object.

Objects can be files or resources, and an entity can be a subject in one access request and an object in another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Access Control Matrix

A

An ACL corresponds to a column of the access control matrix and states who may access a given object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Grouping

A

Grouping simply means bringing users with similar access rights together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Protection Rings

A

Protection rings are an intermediate layer of hardware-based access control for processes in an operating system.

Each process is assigned a number based on its importance, with ring 0 providing the highest degree of protection.

These rings are used for integrity protection, ensuring that memory locations containing sensitive data can only be accessed by processes running in ring 0 or 1.

0 – operating system kernel;
1 – operating system;
2 – utilities;
3 – user processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Policy Instantiation

A

By applying Access control, Grouping and Protection rings Access control algorithms are created

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Security Subsystem

A
  • Logon process (winlogon) – the process that authenticates a user when logging on.
  • Local security authority (LSA) – involved at logon when it checks the user account and creates an access token; it is also responsible for auditing functions.
  • Security account manager (SAM): maintains the user account database used by the LSA during user authentication for local
    logon
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cryptography

A
  • The traditional definition of cryptography is the science of secret
    writing.
  • Roots in communications security to enable two users to secretly
    communicate without third-party eavesdropping.
  • The aim of Cryptography is to provide:
  • Confidentiality –hiding the content of messages;
  • Integrity – by detecting whether a message has been changed;
  • Authentication –digital signature provides the means to verify the source
    and integrity of a message.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cryptography in Computer Security

A
  • Symmetric encryption mechanisms – Vault for useful secrets.
  • Private key – Select people who can add to the Vault.
  • Public key – Select people who can take select information from
    the vault.
  • Fingerprints (hashes) – a unique identifier for a document.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Digital Signatures

A

The verification process in a digital signature involves a key generation, signing, and verification algorithm. The document’s contents and secret are known to the signer, and the signature associates it with a public verification key. In some cases, the document can be recovered from the signature.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Encryption

A

Two ways encryption algorithms use keys:
* Deterministic - always maps a plaintext to the same ciphertext for a fixed key.

  • Probabilistic - gives different results for different encryptions of the same
    plaintext under the same key.
  • Encryption algorithms come in two flavours:
  • Symmetric, where the same key is used for encryption and decryption.
  • Asymmetric, or public-key algorithms, use different keys for encryption
    and decryption.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Encryption Cypher

A
  • Block ciphers
  • encrypts larger blocks of data, typically 64-bit blocks, with a complex encryption
    function

Stream ciphers
* Encrypts smaller blocks of data, typically bits or bytes, with a simple encryption
function, e.g. bitwise exclusive-OR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Communications Security

A

The attacker can be passive or active.
* A passive attacker just listens to traffic.
* An active attacker may modify messages, insert new messages, or
corrupt network management information

  • Secure Tunnels
  • Secure tunnels tend to be built in the following steps:
  • key establishment
  • key derivation
  • Further traffic
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

IP Security

A

Authentication Header
* Protects the integrity and authenticity but not confidentiality.

Encapsulating Security Payloads
* Provide confidentiality, data origin authentication, data integrity, replay
protection, and limited traffic flow confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Network Security

A

Domain Name Server Security Extensions (DNSSec)
* Protects the authenticity and integrity of resource records with digital
signatures

Firewalls
* A firewall is a network security device controlling traffic flow between two
network parts.
* Defining and managing rulesets is a vital step when deploying firewalls.

Intrusion Detection
* Sniff out misuse of the network or anomalies on the network.
* A network-based IDS (NIDS) looks for attack signatures in network traffic.
* A host-based IDS (HIDS) looks for attack signatures in log files of hosts

17
Q

Web Security

A
  • Distributed applications must protect data in transit and in the
    end systems.
  • Simple Object Access Protocol (SOAP) for encoding messages and
    defining elementary message patterns.
  • Web Services Security (WS-Security) standardizes the
    cryptographic protection of SOAP messages