theory Flashcards
client
is an entity that consists of an operating system and a collection of
programs to perform a set of functions.
server
is a passive machine it only responds to inquiries or requests from
clients and does not initiate any communication on its own.
Computer Security Concepts:
1-Identification: Users are identified to a computer or an application through a user identifier or user-id.
2-Authentication is the process used to verify the identity claimed by the user.
3-Authorization is the process of assigning access rights to each user (ID).
4-Access control pertains to the process of enforcing access rights for network resources.
5-Confidentiality is the process used to protect secret information from unauthorized disclosure.
6-Data integrity allows detection of unauthorized modification of data.
7-non-repudiation is the capability to provide proof of the origin of data or proof of the delivery of data.
8-Denial of Service attack is one in which the attacker takes over or consumes a resource so that no one else can use it.
Authentication
is the process of verifying something, Such as a user’s
identity, a network address, or the integrity of a data string. Furthermore,
authentication establishes an association between two entities.
users can be authenticated based on one or more of the following
Something the user knows: Users are often given a secret to such as a password. and should be known only to the user and the system.
Something the user has : User may be given item such as keys, badges or other devices. These devices, in turn, help the system to authenticate the users.
Something the user is: Every user has some unique physiological and behavioral characteristics that can be recorded and compared.
Token Cards
the user is given a token card that shares a secret key with the
system. This key is called the shared secret key. The card displays a number that changes over time and uses the shared secret key.
one-time password
is based on generating passwords that can be used only
once.
asymmetric key encryption
is the basis of the public key schemes.
symmetric key encryption scheme
uses the same key for encryption and
decryption.
private key
(known only to the user)
public key
(known to every one)
difficulties encountered Workstation Security ?
1.1- Workstation Access: solve it by access control
1.2- Workstation Monitoring: solve it by Intrusion Detection
1.3- Viruses: solve it by antivirus
Workstation Monitoring:
hint: two parts
consists of tracking and investigating the history of significant events. We divide this discussion into two parts, audit trail and intrusion analysis.
- 2.1- audit trail
hint: significant events
There are several significant events that should be recorded for potential review at a later time.
- 2.2- Audit Requirements
*Automatically collects information on all the security – sensitive activities.
* Stores the information using a standard record format.
* Creates and saves the audit records automatically without requiring any action by the administrator.
* Protects the audit records log under some security scheme.
* Minimally affects the normal computer system operation and performance.
Audit System Design
hint: steps
Implementation of an audit system can be achieved in several steps. In short, it consists of determining what events must be audited, creating the software to record those events, and then saving these records in a protected log.
Intrusion Detection:
is the process of detecting and identifying unauthorized or unusual activity on the system By using the audit records,
the intrusion detection system should identify any undesirable activity.
Design Intrusion detection
hint: s o a
consists of subjects, objects, audit records