Tentaplugg Flashcards

Mosa tentan!

1
Q

What does the C, I and A stand for in CIA? (explain with a sentence)

A

C (Confidentiality) - Only authorized users can read specified data
I (Integrity) - Only authorized users can manipulate specified data
A (Accessability) - Authorized users can always access the specified data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the three major categories for user authorization?

A
  • What you know - password
  • What you carry - key-card
  • What you are - biometrics (fingerprint, iris-pattern)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

For the third category of users authentication (Biometrics) - What two values usually cause balancing problems in this category? Give example!

A

False-rejection and false-acceptance.
Since no readings of a fingerprint or iris is ever the same, this can cause problems in these values.
If the system is to be more secure, a higher level of false-rejection could mean “more secure” while in the time reduce the rate of false-acceptance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What three entities must exist for a risk to exist?

A

T (Threat) - Cause of damage to asset.
V (Vulnerability) - Unwanted system property that enables a threat.
D (Damage) - The negative effect of an unwanted event.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

If an attacker has access to the unsalted passwords, what type of an attack can the attacker use that uses a space-time tradeoff to break many hashes?

A

Dictionary attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe how to perform a dictionary attack and the meaning of a space-time tradeoff.

A

Take a list of common passwords.
Hash them seperately and them compare each hashed password with the actual hashed password. If they match, then you have the correct password.
It is called a spece-time tradeoff because with this method, you decrease the time of the attack at the expense of space due to the hashing of passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the most common way of defending against a CSRF-attack and how does it work (the defending).

A

When a server generates a page, it generates a session-unique token that must be hard to predict and short-lived. This token is stored in the clients session and as a parameter in the websites links.
When the client submits a request, the server then checks that a token is present, that it matches the clients session and that it hasn’t expired.
If all these criteria are met, only then is the request accepted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

(Biometrics) What is enrollment?

A

When a user first is registered as a user and the biometric features are captured and stored in the user database for the first time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

(Biometrics) What is false rejection rate?

A

The probability that a legitimate user is declined access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

(Biometrics) What is false acceptance rate?

A

The probability that an unauthorized user is granted access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a salt and how is it generated?

A

A randomly selected string that is unique for any user and that is appended to password before hashing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Should a salt be kept secret?

A

There is no point since it is usually stored in the open next to the salted hash. The point of a salt is to defeat the dictionary attack by slowing it down.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Describe three properties that are different from other ways of authenticating users.

A

A biometric feature is attached to a body and can not be removed or is very hard to remove.
Biometric features are not constant so there is a scale on how close the measurement is to the measurement stored from enrollment.
Some persons lack specific biometric features, a finger or hand for example.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Describe the two different principles when interpreting the permission and privilages in access control for users in multiple groups.

A

“First relevant entry” - The first permission-level in the list of permission-levels per group is the only one concidered to decide if to grant access or not.

“Any permission” - All permission-levels in the list of permissions per group are concidered when deciding if to grant access or not.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In a statistical database , a group of three is too small to conceal numerical values. Why?

A

You could get one number from commands like MAX or MIN and the middle value from 3xAVERAGE-MIN-MAX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Can a firewall protect against a DoS-attack? How?

A

A firewall can block offending sender sites, once identified. A firewall can block a DoS attack by blocking the port used by the attack, disabling THIS service, but keeping the rest going as normal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is an IDS and how can it protect you from a DoS-attack?

A

Intrusion Detection System - It can detect probing and identify probing sites, so they can be blocked (by the firewall). By finding a bot in your system that is taking part in a massive DoS-attack and blocking its user you could argue that finding this bot or traces of it is DoS-defence in itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How does Kerberoes work? What sercrets are shared by the participants and what final data item dows the user gain in this process?

A

A client Cliff wants to connect to a server Serge. He first contacts the authentication server Trent and then the access-granting server Grant and then he can get access to Serge.

There are shared secrets between Cliff and Trent, Trent and Grant, Grant and Serge.

In the end, Cliff holds a ticket that he can present to Serge to get access to the service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Why can’t an email without a digital signature be concidered an “urkund”?

A

An “urkund” must be “reliably verifiable”.

An email isn’t verifiable by itself, but with a digital signature it could be.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the BIBA-model?

A

“No write up, no read down”
Prevent high integrity objects from being contaminated with low integrity information.

BIBA only deals with integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the Bell LaPadula-model?

A

“No read up, no write down”
Example, military: Don’t read your superior officers stuff and don’t let inferior officers read your stuff.

Bell LaPadula only deals with confidentiality.

22
Q

What is the Chinese Wall-model?

A

Deals with confidentiality and the relation between compartments of data.

23
Q

What is a TCP SYN-flood?

A

A large number of TCP connection requests are sent that intend to overwhelm the recipient.

24
Q

Would a firewall stand against a DDoS-attack?

A

A packet filtering firewall checks for source and destination IP aswell as port but NOT rate which would make it vulnerable to a DDoS-attack

25
Q

If Kerberos is used for single sign-on. How does a system test that a user knows the password of the stated identity?

A

In the first instance of Kerberos, the ticket-server recieves an encrypted login-request aswell as a username in clear text. The ticket-server takes the stored password of the username and decrypts the encrypted login-request. If the request makes sense, then the user knows the true password.

(kanske behöver kompletteras - väldigt basic)

26
Q

How does your phone share keys with a guest network?

A

Your phone shares the secret key ki with your home network.

1: phone send ID to home network
2: a) creates random number RAND
b) retrieves ki
c) Creates RES and kc from RAND and ki
3: Sends RES, RAND and kc to guest
4: Guest keeps RES and kc and send RAND to phone
5: Phone uses RAND and ki to recreate RES and kc
6: Phone sends RES to guest
7: Guest matches the RES from phone with the RES it already have. If it is a match, then kc will be used as key for further encryption.

27
Q

What is Kerckhoff’s principle?

A

A cryptosystem should be secure even if everything

about the system, except the key, is public knowledge

28
Q

What basic property is needed for a secure cryptographic hash function?

A

Collision resistance: it should be difficult to find another message that hash to the same value.

29
Q

Two types of systems exists to guarantee authenticity. (checking the hash of a downloaded document does not guarantee that is has not been manipulated.)

A
  • A secret must be added something known only to the sender or the recipient. This would giva a MAC, which is a secret-key system.
  • A public system can be used to sign the hash value. This known as a digital signature.
30
Q

What is an ACL and why are they necessary?

A

An ACL normally lists users’ permissions to Read, Write and Execute the object.
ACLs are necessary to ensure the correct distribution of permissions among different users in the same network/environment.

31
Q

Why should inputs entered at a web form be sanitized?

A

If inputs are not verified, an attacker can get malicious code to run at the
server by cleverly injecting commands at the input.
You are vulnerable to a SQL injection.

32
Q

Bell-LaPadula and Biba are complex and expensive to implement. Why then use them?

A

A formal model gives a testable approach and a security theorem. Therefore, as soon as the requirements of the theorem are fulfilled we can be sure the system will remain secure.
Common mistakes; The fact that BLP enforces C and Biba enforces is not an “advantage”. The question relates to formal models “in general”. Just repeating the whole BLP and Biba model descriptions is an incorrect answer.

33
Q

The administrator can modify a user’s password in Unix and Windows. Can he/she read the user’s password?

A

Reading passwords in this systems has nothing to do with permissions. It is protected by being salted and hashed. No administrator has the privilege to break a cryptographic one-way function.

34
Q

In defending against an CSRF attack, what properties does we require of the token. And what are the basic steps that the server and client take to generate and validate the token?

A

When the server generates a page it generates a token, This token is unique for the client’s session and must be hard to predict and short lived. The server stores the token in the client’s session and inserts the token as a parameter into the likes in the page.
When the client submits a request, the server verifies that the token is present, that it matches the client’s session, and that it hasn’t expired. Only then is the request granted and otherwise it is rejected.

35
Q

What is a “per subject” list of permitted objects called?

A

Capability list

36
Q

Bell-LaPadula and Biba are complex and expensive to implement. Why then use them?

A

A formal model gives a testable approach and a security theorem. Therefore, as soon as the requirements of the theorem are fulfilled we can be sure the system will remain secure.
Common mistakes; The fact that BLP enforces C and Biba enforces is not an “advantage”. The question relates to formal models “in general”. Just repeating the whole BLP and Biba model descriptions is an incorrect answer.

37
Q

What is the main difference between

asymmetric and symmetric cryptographic systems?

A

The main difference is in respect to the keys employed. In symmetric systems, the legitimate parties encrypt and decrypt with the same key, while asymmetric
systems have different keys for encrypting/decrypting, and they are not shared among the parties.

38
Q

The administrator can modify a user’s password in Unix and Windows. Can he/she read the user’s password?

A

Reading passwords in this systems has nothing to do with permissions. It is protected by being salted and hashed. No administrator has the privilege to break a cryptographic one-way function.

39
Q

In defending against an CSRF attack, what properties does we require of the token. And what are the basic steps that the server and client take to generate and validate the token?

A

When the server generates a page it generates a token, This token is unique for the client’s session and must be hard to predict and short lived. The server stores the token in the client’s session and inserts the token as a parameter into the likes in the page.
When the client submits a request, the server verifies that the token is present, that it matches the client’s session, and that it hasn’t expired. Only then is the request granted and otherwise it is rejected.

40
Q

An attacker with access to unsalted password hashes can perform an attack that uses space-time tradeoff to break many hashes. What is this method called?

A

Dictionary attack.

41
Q

Describe how to preform a dictionary attack on unsalted hashed passwords. Why is it called a time-space tradeoff?

A

First, take a dictionary of common words. Then, take the hash value of each word and store it. Next, compare the hashed password with the dictionary. If a match exists, you have found the password.
It is called a time-space tradeoff because it reduces the time necessary for the attack at expense of needing more space.

42
Q

What is a two-factor authentication?

A

That is an authentication that uses two different kinds of the three main authentications.

43
Q

List two serious weaknesses with password authentication.

A
  • Passwords can be guessed if they are words or are related to the user.
  • Can be found with exhaustive search of short passwords.
44
Q

Give some examples of things that should be done when setting up a new system in order to harden the configuration.

A
  • disable insecure accounts and passwords (like admin, default)
  • Configuring all security mechanism
  • Turning off all unused services
  • Logging and alerts
  • Keeping software updated.
45
Q

One property of threat is used in quantitative risk analysis to determine if it is worthwhile to protect an asset from a threat. Which threat?

A

The probability or frequency of the threat.

46
Q

Mitigation of social engineering attacks has to be done through three main fronts:
Policy, Awareness and Technology.
State one action to be done in each front by the security administrator.

A

Policy: State the rules through a company-wide policy: i.e. “Never click on links sent by external emails”. Awareness: Teach common social engineering
attacks to all employees. Technology: Authentication, digital signatures, etc…

47
Q

What is a two-factor authentication?

A

That is an authentication that uses two different kinds of the three main authentications.

48
Q

List two serious weaknesses with password authentication.

A
  • Passwords can be guessed if they are words or are related to the user.
  • Can be found with exhaustive search of short passwords.
49
Q

Give some examples of things that should be done when setting up a new system in order to harden the configuration.

A
  • disable insecure accounts and passwords (like admin, default)
  • Configuring all security mechanism
  • Turning off all unused services
  • Logging and alerts
  • Keeping software updated.
50
Q

One property of threat is used in quantitative risk analysis to determine if it is worthwhile to protect an asset from a threat. Which threat?

A

The probability or frequency of the threat.

51
Q

What is the formula for simple quantitative risk analysis?
What does the variables mean?
Do they enter in the chain “threat-vunerability-damage”?

A
Install countermeasures if:
k < FbSb - FaSa
k = cost of countermeasure
Fb = probability before countermeasure
Fa = probability after countermeasure
Sb = damage cost before countermeasure
Sa = damage cost after countermeasure
The threat is still there after installing the countermeasure, but the frequency will change.