theory Flashcards

1
Q

client

A

is an entity that consists of an operating system and a collection of
programs to perform a set of functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

server

A

is a passive machine it only responds to inquiries or requests from
clients and does not initiate any communication on its own.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Computer Security Concepts:

A

1-Identification: Users are identified to a computer or an application through a user identifier or user-id.
2-Authentication is the process used to verify the identity claimed by the user.
3-Authorization is the process of assigning access rights to each user (ID).
4-Access control pertains to the process of enforcing access rights for network resources.
5-Confidentiality is the process used to protect secret information from unauthorized disclosure.
6-Data integrity allows detection of unauthorized modification of data.
7-non-repudiation is the capability to provide proof of the origin of data or proof of the delivery of data.
8-Denial of Service attack is one in which the attacker takes over or consumes a resource so that no one else can use it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Authentication

A

is the process of verifying something, Such as a user’s
identity, a network address, or the integrity of a data string. Furthermore,
authentication establishes an association between two entities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

users can be authenticated based on one or more of the following

A

Something the user knows: Users are often given a secret to such as a password. and should be known only to the user and the system.

Something the user has : User may be given item such as keys, badges or other devices. These devices, in turn, help the system to authenticate the users.

Something the user is: Every user has some unique physiological and behavioral characteristics that can be recorded and compared.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Token Cards

A

the user is given a token card that shares a secret key with the
system. This key is called the shared secret key. The card displays a number that changes over time and uses the shared secret key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

one-time password

A

is based on generating passwords that can be used only
once.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

asymmetric key encryption

A

is the basis of the public key schemes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

symmetric key encryption scheme

A

uses the same key for encryption and
decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

private key

A

(known only to the user)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

public key

A

(known to every one)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

difficulties encountered Workstation Security ?

A

1.1- Workstation Access: solve it by access control
1.2- Workstation Monitoring: solve it by Intrusion Detection
1.3- Viruses: solve it by antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Workstation Monitoring:

hint: two parts

A

consists of tracking and investigating the history of significant events. We divide this discussion into two parts, audit trail and intrusion analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  • 2.1- audit trail

hint: significant events

A

There are several significant events that should be recorded for potential review at a later time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  • 2.2- Audit Requirements
A

*Automatically collects information on all the security – sensitive activities.
* Stores the information using a standard record format.
* Creates and saves the audit records automatically without requiring any action by the administrator.
* Protects the audit records log under some security scheme.
* Minimally affects the normal computer system operation and performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Audit System Design

hint: steps

A

Implementation of an audit system can be achieved in several steps. In short, it consists of determining what events must be audited, creating the software to record those events, and then saving these records in a protected log.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Intrusion Detection:

A

is the process of detecting and identifying unauthorized or unusual activity on the system By using the audit records,

the intrusion detection system should identify any undesirable activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Design Intrusion detection

hint: s o a

A

consists of subjects, objects, audit records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Profiles (in respects to audits)

A

the description of normal behavior of subjects with respect to the objects.
Three candidate profiles are described:

*-A-Logon and Session Activity: The subject is the user, the object is the user’s logon location, and action is log on or log off.
*- B-Command or Program Execution

the audit records show the subject as a user, the object as the name of the program, and the action is execute.

*- C-File Access Activity: the subject is a user, the object is the name of a file, and the action is read, write, create, delete, or append

20
Q

Anomaly Records *:

A

An anomaly record is created when the audit records
show some abnormal behavior compared to that in the profiles

21
Q

Viruses

A

The scientifically correct definition for a computer virus is self-
reproducing automation.

22
Q

Bacteria

A

are programs that duplicate themselves

23
Q

Worms

A

is an independent program that can replicate itself and often
spreads to different sites over a network.

24
Q

Trapdoors

A

is an undocumented entry point into software that
circumvents the normal system protection

25
Q

Logic Bombs

A

A software logic bomb or a time bomb is a fragment of
software that is set to inflict damage when a certain set of conditions exist.

26
Q

Trojan Horses

A

In the context of computer security, Trojan horses refer to malicious programs or files that appear harmless or useful but contain hidden code or functionality designed to exploit or damage a computer system without the user’s knowledge

27
Q

Designing a Virus

A

Consider a virus that is designed to infect an
assembly language program.
1- Locate the first executable instruction in the target program.

2- Replace that instruction with an instruction to jump to the memory location next to the last instruction of the target program.

3- Insert the virus code for execution at the end of the target program.

4- Insert an instruction at the end of the virus program to simulate the original first instruction of the target program that the virus replaced in step 2.

5- Add another instruction at the end of the virus code to jump back to the second instruction of the target program.

28
Q

difficulties encountered Distributed Security Services

hint: e h d

A

1- data confidentiality during transfer: Solution - encryption.
2- Detecting changes to data during transfer: Solution - hash function.
3- Preventing unauthorized access to data: Solution - digital signatures.

29
Q

Encryption

A

is the process of transforming data into an unintelligible form
in such a way that the original data can be obtained only by using the
decryption process and the encryption key.

30
Q

Transposition

A

A given text can be transposed in several
ways. Consider the word PRIVATE. This word
can be transposed to VRIPTEA, In order to decrypt this word, the recipient will attempt different positions of the
letters until an intelligible word is found.

31
Q

Substitution

A

A method of encryption in which a given text is encrypted by substituting each letter with another letter.

32
Q

Data confidentiality

A

implies that confidential data is not disclosed to an
unauthorized user.

33
Q

Data integrity

A

requires that no unauthorized user can modify the data.

34
Q

What is Hash function

A

A hashing algorithm is a cryptographic hash function.
It is a mathematical algorithm that maps data of arbitrary size to a hash of
a fixed size.

35
Q

One-way hash function requirements

A

1- The one-way hash function H can be applied to a data block M of arbitrary size.
2- The resulting message digest, d, is of fixed size, the message digest size is usually
128 bits or 160 bits.
3- The one-way hash function H is easy to implement in both hardware and software.
4- Given the message digest d, it is very hard to find the original message M.
5- Given the message M, it is very hard to find a data block N such that
H (N) = H (M).
6- It is very hard to find any two data blocks x and y such that: H (x) = H (y).

36
Q

Digital signature

A

provides proof of authenticity and origination of data.
note that:
different from encryption, since encryption provides confidentiality.

37
Q

Access Control

A

enforces the access rights when a subject requests to access
an object

38
Q

Access control is based on 3 types of information

A
  1. Subjects: is capable of accessing an object.
  2. Objects: is an entity to which access can be controlled.
  3. Access Rights: define the ways in which a subject can access the object
39
Q

Access rights are specified for each pair of subjects and objects.

hint: acl cl

A

2- Access Control List (ACL) =>for a given object defines the access rights for each subject.
3- Capability List (CL) =>for a subject specifies the rights to access each object.

40
Q

firewall

A

A firewall provides controlled access between a private network and the Interne.
A firewall determines whether a data packet or a connection request should be
permitted to pass through the firewall or be discarded

41
Q

encrypted message ->

A

provides confidentiality

42
Q

encrypted message + message digest ->

A

provides data integrity and conedentiality

43
Q

message + message digest ->

A

provides data integrity

44
Q

encrypted message + encrypted digital signature ->

A

proved data integrity, authenticity, and confidentiality

45
Q

message + encrypted digital signature ->

A

provides data integrity and authenticity