Term
Product (systemigram-like sentence) |
|
Definition
A product implements features by performing certain behaviors that operate on resources. |
|
|
Term
|
Definition
A software package, protocol design, architecture, etc. |
|
|
Term
|
Definition
A main capability offered by a product.
Note: A feature is not a technical capability. |
|
|
Term
|
Definition
An entity that is used, modified, or provided by the product, such as memory, CPU, file, cookie, news article, or network connection. |
|
|
Term
|
Definition
An action that the product takes to provide a feature, or an action that a user performs. |
|
|
Term
Security Feature (definition) |
|
Definition
A security feature is a system capability that contributes to its security, and can be reused for systems with similar goals.
Note: A security feature combines people, process, and technology capabilities into a prevent, detect, recover cycle. |
|
|
Term
Difference between security feature and technology |
|
Definition
A security feature describes WHAT security will be implemented.
A security technology is used to determine HOW it will be implemented. |
|
|
Term
Three Big Ideas of Crypto |
|
Definition
1) Confusion
2) Diffusion
3) Secrecy Only in the Key |
|
|
Term
Crypto Big Idea 1: Confusion |
|
Definition
Refers to making the relationship between the key and the ciphertext as complex and involved as possible. |
|
|
Term
Crypto Big Idea 2: Diffusion |
|
Definition
Refers to the property that the redundancy in the statistics of the plaintext is "dissipated" in the statistics of the ciphertext, i.e., spread out the message
ATTA
CKAT
DAWN
ACD TKA TAW ATN |
|
|
Term
Crypto Big Idea 3: Secrecy Only in the Key |
|
Definition
After thousands of years, we learned that it's a bad idea to assume that no one knows how your method works. Someone will eventually find that out, i.e., you can only decode the message with the key, not be knowing the method of encryption (assuming there isn't a flaw in the key or some other crypto breakthrough). |
|
|
Term
Symmetric Encryption Authentication |
|
Definition
Encryption and Decryption keys are the same; authemtication is only for community, not individual; it requires confidentiality and guarantees of not sharing keys beyond the community. |
|
|
Term
Asymmetric Encryption-based Authentication |
|
Definition
Public encryption key and private decryption key; requires complete integrity of public key and complete confidentiality of private key. |
|
|
Term
Message Integrity Authentication via Digital Signature (process) |
|
Definition
Sign (Sender):
1) Hash data
2) Encrypt hash with private signature key (i.e., the digital signature)
3) Combine with certificate
4) Attach to data
Verify (recipient)
5) Separate digital signature from data
6) Decrypt using public signature key
7) Re-hash data
8) Compare new hash of data to decrypted hash
9) If hashes are equal then signature is valid. |
|
|
Term
Message Integrity Authentication via Digital Signature combine with Confidentiality via Asymmetric Key Encryption (process) |
|
Definition
Sender:
1) Hash data
2) Encrypt data with recipient public key
3) Encrypt everything with sender private signature key
Recipient:
4) Decrypt with sender public signature key
5) Decrypt message with recipient private key
6) Re-hash data
7) Compare new hash and original hash
8) If hashes match, then data is authentic. |
|
|
Term
|
Definition
An automated process of negotiation that dynamically sets parameters of a communications channel established between two entities before normal communication over the channel begins. It follows the physical establishment of the channel and precedes normal information transfer.[ |
|
|
Term
Federated Identity (definition) |
|
Definition
The means of linking a person's electronic identity and attributes, stored across multiple distinct identity management systems |
|
|
Term
|
Definition
A property of access control of multiple related, but independent software systems. With this property a user logs in once and gains access to all systems without being prompted to log in again at each of them. |
|
|
Term
Handshakes using tokens (process) |
|
Definition
1) Username + PIN + Token
2) Auth Server: username is assoicated with PIN; simple lookup.
3) "Seed" key on server recalculates token using current time to perform auth. Token = algorithm(time, key).
4) "Child" key resides on hand-held device and recalcuates token every X seconds according to algorithm. Battery keeps device in sync. |
|
|
Term
Least Privilege (definition) |
|
Definition
Principal that everyone should have exactly the permissions they need to perform their role in systems operation, and no more
Note: Not the same as need–to-know, which refers to minimum spread of information for its expected utility – much more difficult |
|
|
Term
|
Definition
- A service that provides proof of the integrity and origin of data.
- An authentication that with high assurance can be asserted to be genuine.
- Usually requires a combination of physical and logical controls.
|
|
|
Term
|
Definition
Network configuration to ensure traffic is subject to controls. |
|
|
Term
Segregation of Duties (definition) |
|
Definition
Provides distinction between at least two roles, and corresponding mechanisms to ensure that a single system function must require collaboration from at least two distinct subjects in order for the function to be successfully accomplished.
• Examples: • Two physical keys required to turn on switch to launch nuclear missiles • Two accounting system logins required to process a payment, one to enter details, another to release payment.
|
|
|
Term
|
Definition
Communications that occur outside of a previously established communication method or channel. |
|
|
Term
|
Definition
The adaptive capacity of systems to meet and achieve priorities and goals in order to absorb or limit disruptions while retaining service continuity. |
|
|