Unit 10 Security Flashcards

1
Q

What type of interference is taking place if, Alice alters Bob’s file without permission?

A

(Type 2) Modification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What type of interference is taking place if, a hacker deploys software to observe packets travelling on a network?

A

(Part 2) Interception

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What type of interference is taking place if, a website receives a flood of requests for a web page, preventing callers from viewing the site?

A

(Part 2) Interruption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What type of interference is taking place if, a user receives an e-mail appearing to be from his supervisor, who did not send the e-mail?

A

(Part 2) Fabrication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How would each class of security threat (normal operation, interruption, interception, modification, fabrication) would apply to a file on a hard disk?

A

(Part 2)

  • Normal operation - no interference to file access
  • Interruption - an attacker has prevented authorised access to the file
  • Interception - an unauthorised party has obtained access to the file
  • Modification - an unauthorised party has altered the file
  • Fabrication - a fake file has been constructed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What security services might be at fault in a click-fraud case in which fake clicks are generated on an online advertisement?

A

(Part 2) Non-repudiation may be at fault if the clicks cannot be associated with particular parties. It is likely that the clicks cannot be easily traced, because the most likely form of identification in this case is an IP address, and IP addresses can be fabricated by a program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In a click-fraud case in which fake clicks are generated on an online advertisement, what class of threat is this?

A

(Part 2) The class of threat is fabrication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How many possible Caesar ciphers are there in English?

A

(Part 3) Assuming a 26-character alphabet there are 25 possible substitutions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What advantages does a cipher involving modulo arithemetic have?

A

(Part 3) The output of a modulus function is always within a certain range, which can be easily mapped to the desired character set. It is also easily implemented and computationally cheap.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which is stonger under a brute-force attack?

  • using a password of five characters from the character set {a, b, c, d, e, f}
  • or using a password of ten characters in length from the character set {a, b, c}
A

(Part 3)

  • six characters with a password length of 5 gives a key space of 65 = 7776
  • three characters with a password length of ten gives a key space of 310 = 59049

The longer password is stronger, because it results in a larger key space. However even a long password that appears in a dictionary is relatively weak as it is vulnerable to a dictionary attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why is public key cryptography called asymmetric and private key cryptography called symmetric?

A

(Part 3) In public key cryptography there are two different keys, the public key and private key, one used for encryption and the other for decryption. In private key cryptography there is only one key, the secret key suitable for both encryption and decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an example of a middle-person attack on public key cryptography?

A

(Part 3) Alice wants to send a message to Bob, susing Bob’s public key. Alice is tricked into using Eve’s public key instead - now Eve is able to impersonate Bob and read messages intended for Bob. (Bob will not be able to decipher these messages even if he receives them)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Does Alice really know that a messagedeciphered by Bob’s public key came from Bob?

A

(Part 3) This depends on how Alice received the key. If she did not receive the key in a secure fashion (ex. face to face) she only knows the public key comes from someone claiming to be Bob.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are three reasons why keys might have expiry dates?

A

(Part 3)

  1. Reusing a key may give an attacker more data to work with and so a better chance of cracking the code
  2. Keys that previously were considered secure might not be any more due to increasing computing power and new methods of attack
  3. If a key has become compromised, it cannot be used indefinitely
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is an example of how an attacker might exploit a collision?

A

(Part 3) The message “Transfer £5 to A Bank” might have the same hash as “Transfer £1000 to A Bank”. The attacker might be able to intercept and substitute the second message for the first.

Likewise, a program could be altered in such a way that its hash is unaltered, so that an integrity check does not detect tampering, and a malicious program can be substituted for a valid one.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Suppose a message is intercepted between a user and their bank which provides the encrypted login details - could the banking system be logged into and if so, how?

A

(Part 3) If the system below the normal user could be accessed, where the encrypted information is received, it might be possible to replay the login and password information and impersonate the user.

However, this attack is defeated by the use of nonce values.

17
Q

What class of cipher might be used for, storing passwords in a local file?

A

(Part 3) Hash

18
Q

What class of cipher might be used for, proving an e-mail has been sent?

A

(Part 3) Public key and hash (for signing)

19
Q

What class of cipher might be used for, using a wireless connection on a laptop?

A

(Part 3) Stream

20
Q

What class of cipher might be used for, encrypting files on a file system?

A

(Part 3) Block cipher

21
Q

What is a secure channel?

A

(Part 4) A secure channel is a communication channel between a pair of processes that can authenticate each other an provides confidentiality and integrity services, including time stamping.

22
Q

What is an example of a handshake in SSL?

A

(Part 4) Cipher negotiation and certificate exchanges are examples.

23
Q

Why would SSL use a public key-based protocol to establish a private key for communication?

A

(Part 4) Key distribution is easier with public key cryptography. The public keys can be verified by using a certifying authority and digital certificates. The private key obtained in this way results in faster communication for the bulk of the transaction.

24
Q

Why would a class loader check for overriding of final methods, when this check is already performed by a compiler before producing a class file?

A

(Part 5) The class loader is examining bytecode, which could have been altered since compilation.

25
Q

Why would a security policy require that the security manager could only be set once?

A

(Part 5) This means that another manager cannot be substituted, so that ways in which checks are performed cannot be altered.

26
Q

What are the two steps required to implement permissions-based security for an application?

A

(Part 5)

  1. A security manager must be installed for the application, either on the command line or in the code
  2. A policy must be specified, either dynamically (by executing some code) or statically (using dfault policy files or a specified policy file)
27
Q

What is the purpose of the following entry in a policy file? Identify the target and the action.

  • grant codeBase “http://www.gggg.com”*
  • {*
  • permission java.io.FilePermission “C:\database.dat”, “read”;*
  • } ;*
A

(Part 5) This is a policy entry granting FilePermission to code from the code base http://www.gggg.com allowing that code to carry out “read” actions on the file database.dat.

28
Q

How might an applet use the security manager to probe a system’s security?

A

(Part 5) An applet could prove security by attempting a restricted operation and seeing if a SecurityException is thrown. If the applet catches this exception, the client may not be aware that anything untoward has taken place.

29
Q

Why would it normally be wanted to implement the equals method of an implementation of Principal?

A

(Part 6) There is a need to implement equals so that the system can compare on principal to another. If this is not done the principal will inherit equals from Object, and equality will be determined based on principal references rather than their contents.

30
Q

Why is the PrivilegedAction interface required?

A

(Part 6) An instance of a class implementing the PrivilegedAction interface encapsulates and demarcates the work to be done with a set of privileges. This means that there is less chance of accidentally invoking code with certain privileges, and also it is clear when that set of privileges stops applying and goes back to using the thread’s context.

31
Q

What is the distinction between a subject and a principal?

A

(Part 6) A subject is an entity that can be authenticated, that is, a source of a request to perform some action.

A principal is an identity associated with an authenticated subject.

32
Q

What is the purpose of a login module in JAAS?

A

(Part 6) A login module implements a method of authentication, such as biometric scanning or promting a user for a login and password. A commit method is used to associate credentials with a subject.

33
Q

When would the method doAsPrivileged be used?

A

(Part 6) This method would be used when executing code with the permissions associated with a particular principal. A principal can be granted permissions in a policy file, and this principal can be associated with a subject on authentication.

34
Q

When would it be safe to use doAsPrivileged with a null context?

A

(Part 6) This can be used when there is some work to be done with a subject’s permissions and the current context can be overriden. In effect, this means that it must not matter how the point of code execution was reached - it should not matter who, or what, called the code to invoke doAsPrivileged, it should only matter what the identity of the authenticated Subject is.

An example is that an authorised application needing to access system fonts to render a document should be capable of gaining the permission to do so.

35
Q

What is a role and how does it relate to users of a system?

A

(Part 7) A role is a name for a kind of caller and can be used to authorise actions. Users can be mapped to groups or roles so that permissions applied to the roles apply to those users. Thus, a programmer does not have to know the users of a system, just the different roles of users of a system.

36
Q

What steps are taken when a protected web resource is accessed?

A

(Part 7) At this point (if lazy authentication is used) the caller must be authenticated. If successful, this results in the server storing credentials for the caller in a session context. The credentials are subsequently used to decide if the caller may access the protected resource, using a principal or role.

37
Q

What is the difference between declarative and programmatic security?

A

(Part 7) In declarative security, security roles and restrictions on the execution of code are established using entries in XML deployment descruptor files.

In programmatic security, roles and restrictions are established using Java code.