Shared Flashcard Set

Details

CMPS122
Network Secuirty
194
Computer Science
Undergraduate 1
12/13/2014

Additional Computer Science Flashcards

 


 

Cards

Term
Steganography
Definition
EX: Invisible ink, hidden messages in lower-order bits in image
Term
Cryptology vs. security
Definition
Cryptology is a branch of mathematics
Security is a system issue, uses cryptogoly
Term
Cryptography always involves two things
Definition
Transformation and secret
Term
Security should depend only on the
Definition
secrecy of the key.
Term
Message Authentication Codes (MACs)
Definition
Create a hash that includes all of the data and a secret shared between
sender and receiver.
Term
HMAC standard
Definition
Additional block prepended and additional round of hashing
Term
What encryption algorithm makes brute force attacks harder?
Definition
DES, limits speed in which attacker can compute strings from passwords
Term
Dictionary attacks
Definition
Try a list of common passwords
Term
Rainbow tables
Definition
Use hash chains to reduce storage requirement
Term
Computers can only verify a “token”. What's a token?
Definition
Password
• Cardkey
• Fingerprint
• Other stuff
Term
What's the best technical way to get a "token"?
Definition
Break the protocol
Term
Encryption with a _____ is typically
done to sign a message
Definition
private key
Term
Encryption with a _____ is done for
secrecy
Definition
public key
Term
Trees (or web) of trust
• Public-key encryption
• Message authentication codes
• Passwords
are tools for
Definition
authentication
Term
Real protocols for authentication?
Definition
Real protocols for authentication
Term
Real protocols for secure communications
Definition
• SSH
• SSL
• IPSec
Term
PGP goals
Definition
• Provide authentication (without encryption)
• Provide encryption (includes authentication)
Term
Digital signature is basically
Definition
authentication
Term
PGP encrypts message with
Definition
symmetric key algorithm
Term
Encrypts key with
Definition
public key algorithm
Term
PGP uses compression for several reasons
Definition
• Save message space
• Reduce encryption time
• Strengthen encryption: lower redundancy
Term
PGP uses four kinds of keys
Definition
• Session keys (symmetric encryption)
• Public keys (from many users)
• Private keys (typically from one user)
• Passphrase-based conventional keys
Term
Session key generation is run in which mode?
Definition
cipher feedback mode
Term
SSL Record Protocol
Definition
Data fragmented into blocks of
214 bytes or less
❖ Compression applied (optional)
❖ MAC calculated
❖ Payload & MAC encrypted
❖ Header prepended
• Content type
• Major & minor version
• Compressed length
Term
Change Cipher Spec Protocol
Definition
❖ Single message that contains a single byte
❖ Causes the pending state to be copied into the current state
• Updates the cipher information used by this connection
• State must have been set by the Handshake Protocol (more on this in a
bit)
Term
SSL Alert Protocol
Definition
❖ Conveys protocol-related alerts to the peer
❖ Alert messages are compressed and encrypted (and thus secure)
❖ Message consists of exactly two bytes
• Level: severity of the alert (warning or fatal)
• Alert code: what kind of alert is this?
• Unexpected message
• Bad record MAC
• Decompression failure
• Handshake failure
• Illegal parameter
• Other possible alerts…
Term
SSL Handshake Protocol first phase is
Definition
establish
security capabilities
• Exchange info
• Find common ground for
secure message exchange
Term
SSL Handshake Protocol's Second phase is
Definition
authenticate
server & exchange key
Term
SSL Handshake Protocol's third phase is
Definition
authenticate
client and exchange key
Term
SSL Handshake Protocol Fourth phase:
Definition
finish up
• Change_cipher_spec not
really part of the handshake
protocol
Term
SSH is _____ than SSL
Definition
simpler
Term
What is an intrusion, anyway?
Definition
is an attempt to gain illicit access to a computer system (typically via network)
Term
Types of intruders
Definition
❖ Masquerader
• Not authorized to use the computer
• Impersonates a legitimate user
❖ Misfeasor
• Legitimate user who abuses his privileges
• Legitimate user who accesses resources for which he’s not authorized
❖ Clandestine user
• Intruder who controls system completely
• Fixes up auditing and access controls to hide her accesses
Term
Types of intrusions
Definition
❖ Illegal access
• Intruder gains access to resources for which he’s not authorized
• May not bother other users—only uses hardware and software, not data
• Often used as a stepping stone to other types of intrusions
❖ Data compromise
• Intruder gains access to data
• Intruder may even be able to plant false data
❖ Denial of service
• No access is actually gained, but…
• Legitimate users can’t gain access to the resources or data either!
Term
Virtual Private Networks
Definition
❖ Individual networks are unencrypted
• No need for special software on computers
• Untrusted services can run locally
❖ Connections to other networks are encrypted
• Not all traffic need be encrypted
• Traffic to untrusted sites runs as normal
❖ Incoming traffic is scanned for intrusions
• Block traffic that might cause problems
• Control the content of packets that go by
Term
IPSec is a protocol to
Definition
secure end-to-end user traffic using both
authentication and encryption
Term
Benefits of IPSec
Definition
• Strong security for traffic between firewalls
• Internal network has no overhead
• Resistant to bypass: if it’s in the firewall, no way to avoid using it
• Transparent to applications
• Transparent to users
• May be implemented on a smaller scale for individuals
Term
• Mandatory access control
• Discretionary access control
• Role-based access control
Are types of what?
Definition
policies
Term
Discretionary access control (DAC) is control access based on
Definition
• Identity of requestor
• Access rules (authorizations) granted to requestor
• Rules may allow requestor to pass on its access to a different entity
Term
Mandatory access control (MAC) is control access based on
Definition
security labels (labels based on security levels (clearances))
• Requestor can’t pass on access to others
Term
Role-based access control (RBAC) is control access based on
Definition
roles
• Users assigned to roles
• Assignment may be dynamic: user may have to explicitly “activate” a permitted
role
Term
In access control terms a Unix user is a
Definition
subject
Term
In access control terms a Unix file is a
Definition
object
Term
In access control terms a File access permissions is a
Definition
access rights
Term
Access control matrix
Definition
lists subjects, objects, and access rights.
Columns are access control
Rows are capabilities (tickets)
Term
An example of a protection domains is
Definition
UNIX file system
Term
Rows of the table are called
Definition
tuples
Term
Rows of the table are called
Definition
tuples
Term
Rows of the table are called
Definition
tuples
Term
Statistical databases
Definition
❖ Database can only answer statistical queries
Term
Which database has the least amount of security?
Definition
NoSQL databases
Term
In databas terms, policies may support
Definition
• Centralized administration: all policies controlled centrally
• Ownership-based administration: owner of a table controls access policies
• Decentralized administration: owner of a table can allow further delegation
Term
In database terms, access rights
Definition
• Rights include create, insert, update, delete, read, write
• Granularity can vary: database, table, column, row
• Rights may be data-dependent
Term
Three basic categories of database users
Definition
• Application owner: owns DB objects
• End user: operates on objects, but doesn’t own them
• Administrator: makes access decisions, but might not have access to data (by
default)
Term
Authentication can be done using any mechanism the DBMS supports
Definition
• Login via password
• Access from a particular machine
• Access from a particular application
• Authenticating via public-key methods
Term
Security holes can occur when assumptions about identity are violated
Definition
• Application credentials are copied
• DB administrator account is compromised
• “Backup user” account does real queries
• HVAC controls are allowed inside a “secure” network from which all
accesses are allowed…
Term
Database inference
Definition
authorized queries can lead to deduction of unauthorized
data
• Combining non-sensitive items allows construction of sensitive information
• Combining data items allows inference of sensitive data
Term
How to prevent compromise like query size restriction?
Definition
limit the size of the result set
Term
How do you prevent compromise like query set overlap control
Definition
Keep a record of all previous queries
• Deny queries that have too large of an overlap with prior queries
Term
How do you prevent compromise in partitioning?
Definition
Partitioning groups records into disjoint groups
Term
How do you prevent compromise in perturbation
Definition
❖ Instead of trying to prevent information leakage, make results fuzzy
Term
Securing cloud storage is possible with
Definition
• Encryption to keep data safe from prying eyes
• Auditing to ensure that the provider still has your data
Term
Malcode that requires host program
Definition
-Trapdoors
-Logic bombs
-Trojan horses
-Viruses
Term
Malcode that is independant
Definition
-Worms
Term
ILoveYou, Melissa, Fizzer are examples of
Definition
Trojan horse
Term
What are trap doors?
Definition
Program does something useful, but designer leaves a back door through which she can get it in user's stuff
Term
Traps are also left to
Definition
preserve access even after someone has finished the job
Term
Logic bombs are like trap doors in that
Definition
program usually does what it’s supposed to
do
Term
How do logic bombs work?
Definition
After a set of conditions are met, “bomb” goes off
• Program refuses to run
• Program runs, but gives incorrect output
• Program runs, but gives subtly incorrect output
Term
Examples of logic bombs
Definition
Payroll program refuses to run unless “N. Coder” is on the payroll
• Payroll program stops, asks for password
on a certain date
• Payroll program rounds taxes down, gives
extra fractional cents to single person
Term
Computer virus
Definition
• Consists of relatively small amount of code
• Code harmless on its own: needs a “host” program to replicate
• Damage often in the form of resource usage / denial of service
Term
Virus hides by
Definition
• Compressing itself
• Becoming polymorphic: changing
the bytes that make up its code
• Not acting until it’s ready to do
damage
Term
For detecting viruses you should look out for
Definition
-Modification times of code
-MD5/SHA1 signature
-Sequences of bytes that appear in the virus
-Programs doing things they shouldn’t do
Term
How do worms differ from viruses?
Definition
typically use background processes (daemons) to run
Term
Buffer overflow attacks are basically
Definition
results from input that is longer than the implementor intended.
Term
Heap overflows can alter programs behavior by
Definition
write values to adjacent variables
• Change permissions on an object
• Change a program’s state (and thus behavior)
• Change other “interesting” values
Term
Preventing buffer overflow attacks. Name three different ways
Definition
Use run-time checks on all memory references
• Safe languages (Python, Java, Perl, etc.)
• Safe libraries for C (don’t use gets, strcpy, etc.)
❖ Separate code and data segments
• Make code segment unwriteable (once application loaded)
• Only allow jumps to code segment
• Turn off execution bits for data segment
• Check jumps as they happen (compiler-driven)
❖ Random placement of structures in memory
• Makes it more difficult to write an attack that works on every invocation
❖ Static analysis
• Check binary or source code
❖ “Canary words”: randomly-chosen values to detect when an overflow
occurs
Term
Example of a String format attacks
Definition
val1 = “One thing”;
val2 = “Another”;
s = “%s -> %s”;
printf (s, val1, val2);
Term
Stack smashing is a type of
Definition
code injection
Term
Code injection exploits a bug by
Definition
processing invalid data which causes the program to execute instructions not
originally intended by the designer
Term
What does Eval injection do?
Definition
pass valid code to be evaluated in a scripting language
Term
What does shell injection do?
Definition
pass a valid command to be run with exec (or similar)
Term
What does include file injection do?
Definition
pass the name of a file to be included (via HTML or otherwise)
Term
Best why to prevent SQL injection?
Definition
verify all inputs at the server side and use cryptographic techniques to verify veracity
Term
Cross-site scripting (XSS) is a type of
Definition
code injection
Term
Why is it important for server-side scripts to sanitize info from the user?
Definition
the result can cause the client’s browser to do unpredictable things...
• Navigate to a URL
• Send data to a third site!
Term
Cross-site scripting injects code directing that information
Definition
to a different site
Term
XSS attacks can target
Definition
server-side or client-side
Term
An example of a XSS non-persistent attack
Definition
Send a link to someone that when clicked opens a script that runs a evil program.
Term
XSS example of a persistent attack
Definition
Url containing the script to run a bad program is already on a page that has been posted from a blog post or a comment
Term
What are rootkits?
Definition
set of software to maintain root access to a system
Term
Rootskits are typically installed via
Definition
Trojan horse
Term
How do you typically recover from a rootkit attack
Definition
requires reinstalling the OS
Term
What can rootkits do?
Definition
❖ Intercept system calls
❖ Modify files on disk
❖ Actively counter attempts to “win back” the system
Term
So how can we classify malcode?
Definition
• Understand techniques used by malcode
• Understand how to defend against them
Term
How should one prevent malcode from running
Definition
• Virus scanners: recognize known malcode
• Firewalls: strip malcode from incoming packets
• Education: make users smarter
Term
How can you limit damage malcode can do?
Definition
• Sandbox (“playpen”, “jail”): run malcode in protected virtual machine
• Reference monitors: enforce policy on execution
• System maintenance
Term
How can we ensure that software is
run securely?
Definition
❖ Constrain program behavior
❖ Make potentially harmful code less likely
❖ Ensure program integrity
Term
Reference monitors prevent against what kind of attack?
Definition
buffer overflow attacks
Term
How can you prevent against stack-smashing
Definition
• Writes a “canary” word adjacent to the return address
• If word is modified, don’t return to the address
Term
What's a problem of using MemGuard?
Definition
can be inefficient when many words share the same page as the return address and can be slower
Term
What is Software fault isolation (SFI)?
Definition
Get memory safety by inserting checking instructions around loads, stores, and jumps
Term
What provides reference monitors for most security-critical resources?
Definition
OS
Term
OS systems as reference monitors use very ___ -grained monitoring
Definition
coarse-grained
Term
A sandbox is
Definition
a software construct that only allows access to a
limited set of resources
Term
What is the goal of sandboxing?
Definition
Limit the damage malcode can do
Term
If a vendor refuses to provide source code they may
Definition
be a malicious attacker
Term
How can you tell program was written in the safe language?
Definition
• Get the source code and compile it
• Special compilation service signs object files generated from the safe
language
• Verify that object files preserve safety properties of source language
(Java)
Term
What does Bytecode verifier do?
Definition
❖ Checks that JVML code
satisfies Java™’s safety
properties
❖ Type safe – stack and variable
slots must store and load as
same type
❖ Memory safe (guaranteed by
instruction set)
❖ Control flow safe: jumps must
be within function, or call/return
Term
Biggest problem in security with Python
Definition
eval-type calls could be evaluating anything
Term
In Python, everything is a
Definition
dictionary
Term
Often better to have testing done by someone who
Definition
didn’t write the ode
Term
For error handling is typically easier to
Definition
do with exception handling rather than extensive checking
Term
With code to update a password record elevate to root only in the code
Definition
that actually updates the password file
Term
Users can control their execution environment with
Definition
• Loaded libraries
• Default search paths for binaries
• Environment variables
Term
You might think that ls is a harmless program, but it need not be…
Definition
libc can easily be modified and then used in a program that runs as
root!
Term
To ensure that code is from a “reputable” place you should
Definition
get it only from the author and use cryptographic techniques(Sign the code (actually a hash of the code) with the author’s private key and make the public key widely known
Term
What are the problems of signed code?
Definition
how do we check the signature?
what if someone steals the private key?
what if the author knowingly (or unknowingly) signs malcode?
individual modules are signed, but collective program
has a security hole
Term
For content-derived names you should
Definition
Name code objects with cryptographic hashes
Term
Statistical anomaly detection
Definition
• Produce a profile of the normal behavior of each user (or independent of
user)
• Notice statistical deviations from that behavior
Term
Rule-based detection
Definition
• Think really hard and make up rules that describe intruder behavior
• Hope intruders can’t read and figure out the rules also
• Lay traps that normal users won’t trigger…
Term
How do you detect SYN floods
Definition
Firewall (or other gateway) notices large number of SYN packets but few ACK packets
Term
With SYN floods
Definition
Firewall temporarily suspends delivery of SYN packets. Unfortunately, nobody can connect to those hosts while they’re being
protected
Term
For network intrusion detection you should
Definition
❖ Monitor activity on many hosts
❖ Aggregate audit records to detect anomalous behavior
• Innocuous behavior on several (individual) hosts may signal an intrusion
• Example: limited (or slow) port scan across many computers in sequence
❖ Managed Security Monitoring (Counterpane, Inc.)
Term
Network intrusion detection you should
Definition
scan computer sequentially
Term
Network intrusion detection you should
Definition
scan computer sequentially
Term
For network intrusion detection firewalls should
Definition
examines all packet, take action against intruder, should see all port scan packets destined for any computer
Term
If all of network attacks come from one IP address you should
Definition
check for network-type attacks coming from a small set of IP addresses
Term
Rule-based intrusion detection example is
Definition
set up fake user accounts and passwords and make them more than one character different from “real” user names. If someone attempts to log into a fake account several times, it’s probably
an intruder
Term
Rule-based intrusion detection example of a simple rule is
Definition
all data sent to the SMTP (mail) port must be textual, and must have line length < 80
Term
Rule-based intrusion detection
example
Definition
Simple rule: incoming HTTP packets may not contain Java applets
Term
A problem with Rule-based intrusion detection is you can’t tell the difference between “good” and “bad” Java so what should you do?
Definition
Try to recognize incoming Java known as malicious. Also try to recognize attacks by keeping signatures of Java files that have come in recently, to prevent repeat offenders.
Term
A Rule-based intrusion detection for malware is
Definition
user-run programs should never change ownership of a file to root
Term
Intrusion detection & prevention is hard you should use
Definition
firewalls
Term
Service control in firewalls
Definition
• Determine which services can be accessed
• Disallow those that might be risky
Term
Direction control in firwalls
Definition
• Control the direction in which certain services are available
• Network Address Translation may help with this…
Term
User control in firewalls
Definition
Control access to services based on user
• Requires that users authenticate themselves somehow
Term
Behavior control in firewalls
Definition
• Disallow dangerous behaviors
• Example: filter email for viruses
• Example: allow only certain types of HTTP requests
Term
The rules of firewall packet filters are based on
Definition
• IP addresses
• Protocol
• Port number
• Packet content?
Term
What are the limits of firewall filtering
Definition
❖ Firewall can only filter on individual packet contents
❖ May be vulnerable to address spoofing
Better solution: allow firewall to filter on entire sessions, not just individual packets
Term
Stateful Packet Inspection (SPI)
Definition
Keep track of history of packets
• Allow filtering and actions based upon history!
Term
To protect your networks against intruders you should deploy
Definition
• Application-level gateways (proxy servers)
• Circuit-level gateways (SOCKS)
• Bastion hosts
• Honeypots
Term
You should run applications on proxy server that relay information between inside and outside like
Definition
HTTP Proxy and mail servers
Term
To make security easier: single point to secure, but the drawbacks
Definition
Slower and you have to set up a proxy for every protocol
Term
Circuit-level gateway (SOCKS)
Definition
❖ Proxy server requires one proxy per application
❖ Circuit gateway does its work at the TCP level
Term
What are the advantages for Circuit-level gateway (SOCKS)
Definition
• Simpler than using a separate proxy for each service
• Other advantages of proxy server (monitoring, etc.)
Term
Drawbacks of Circuit-level gateway (SOCKS)
Definition
• May require changes on client side
• Still somewhat slow: SOCKS server acts as relay
Term
This single server is often called a
Definition
bastion host
Term
Bastion host can have simpler, more secure code
Definition
• Proxies are often smaller than full servers
• Proxies need not perform disk access
• Proxies don’t permanently store any sensitive data
• Proxies can run as normal users (not root)
Term
For good defense how many firewalls and bastion hosts should you have
Definition
more than one
Term
Honeypots can be used to
Definition
❖To keep the system safe, set up resources that an attacker can (relatively easily) get a hold of
❖ Make sure that these resources can’t lead to further breakins
❖ Keep the intruder on the system as long as possible to trace where he’s coming from!
Term
Disadvantage of making a honeypot on VM is
Definition
A smart hacker knows if the user is using a VM
Term
For honeypots in VM you should
Definition
• Restrict calls that read or write the file system
• Limit the ability to create new processes or allocate memory
• Limit the programs that are available
Term
The issues of using VMs as sandboxes are
Definition
• Performance is a bit slower
• Intruders may be able to compromise the underlying hypervisor: very
difficult to respond in this case!
• Taking down a hypervisor kills many VMs!
• Intruder may be able to override resource isolation
Term
What should you do if an intrusion is detected in sandbox?
Definition
❖ Log intruder’s actions to a “safe” computer
❖ Contact system administrator (email and/or page)
❖ Shut down system
❖ Do several of the above
Term
How would you restore from an attack
Definition
❖ Restore files from a backup
❖ Reinstall as much as you can
❖ Use a file system that doesn’t overwrite in place
Term
How would one perform a basic DoS attack?
Definition
• Use buffer overflows to subvert local programs
• More common: use remote systems to send a flood of requests at the
server
Term
How do you deal with botnets?
Definition
❖ Go after a botnet by attacking its control nodes
❖ Behavior-based tracking: figure out who’s sending messages to the
zombie computers
❖ Code analysis: read the code and use that to find the address on
the zombie computers
Term
What are the challenges in intrusion detection
Definition
❖ The first thing a smart intruder will do is tamper with the intrusion
detection system!
❖ Few activities are either obviously normal or obviously malicious
❖ False positives dilemma
Term
“Secure” means
Definition
to be an absolute
Term
“Trusted” means
Definition
that it meets the necessary security requirements
Term
The different types of security policies are
Definition
security and commerical
Term
General goal of security policies is
Definition
restrict data flow
Term
Military security is
Definition
❖ Information ranked by sensitivity
level
❖ Information access limited by
“need-to-know”
❖ Access to information requires
Term
Commercial security is
Definition
No security clearances (usually)
No dominance function (usually)
Term
Security model based on this approach is
Definition
lattice model
Term
Bell-La Padula confidentiality model
Definition
❖ Basis for Department of Defense
evaluation criteria
❖ Information flows up!
Term
Biba integrity model
Definition
Ordering is on integrity: I(s) or I(o)
• Write: s can write o only if I(s) ≥ I(o)
• Read: if s has read access to o, s can have write access to p iff I(o) ≥ I(p)
Term
Bell-La Padula and Biba only address
Definition
reads and writes
Term
Security considerations have to be central in designing a
Definition
trusted OS
Term
Security in normal operating systems
Definition
❖ User authentication
❖ Memory protection
❖ Access controls for files & I/O devices
❖ Allocation controls for objects
❖ Sharing enforcement: require users to share resources
❖ Guarantee of fair service
❖ Interprocess communication
❖ Self-protection: OS must guard its own data
❖ All of these are necessary for minimal security
Term
Centralize access control decisions in Mandatory (non-discretionary) access control is
Definition
• Owner of an object can’t decide on access to it
• Access rights granted by higher-level policy
• Example: military security
• Users can’t determine the access rights for their own objects
Term
For deleting data it is best to
Definition
• Overwrite space with a fixed pattern (usually 0s or 1s)
• Overwrite space several times with fixed or random pattern
Term
Intruder may spoof a login screen or other access mechanism, so what do you do to make it safe?
Definition
use a trusted path
Term
For auditing you should
Definition
record everything
Term
Reference monitor
Definition
portion of the security kernel that actually controls accesses to objects
Term
TCB: all of the parts of the trusted OS that we have to trust
Definition
• Security kernel / reference monitor (of course)
• Processes
• Memory management
• Interprocess communication
• Some files
Term
TCB must do
Definition
Process activation
• Execution domain (protection domain) switching
• Memory protection
• I/O operations & protection
Term
Structuring OS for secure design tips
Definition
❖ Layering is a good idea
• Put more secure-critical functions (as in the TCB) in the innermost layer
• Layers towards the outside are less trusted
• Can’t modify structures in inner layers
• Inner layers can (possibly) modify things in outer layers
❖ Trust the inner layers more
• Security kernel fully (?) trusted
• Outer layers not trusted as much
❖ Isolation improves security and trust
Term
A goal of securing your system is
Definition
make it more difficult to compromise
Term
For planning security you should set a plan with
Definition
• Policy
• Current state
• Requirements
• Recommended controls
• Accountability
• Timetable
• Continuing attention
Term
What does the system need to do to ensure a “secure” environment?
Definition
Depends on policy
Term
Key to security
Definition
understanding risk
Term
Important to treat risk analytically
Definition
• Risk impact: what if something bad happens?
• Risk probability: how likely is the risk to occur?
• Risk control: can we make the risk less likely to occur?
• How much does it cost to do this?
• Risk exposure: impact * probability
Term
Why is understanding risk difficult?
Definition
❖ Risk is emotional
❖ Some risks are too infrequent to worry about
❖ People are bad at estimating risk
❖ People worry about things about which they can do nothing
Term
For risk analysis your assets are
Definition
• Hardware & software
• Data
• People (time!)
Term
Policy must identify balance needs of groups like
Definition
• Users: people who use the resources
• Owners: people who own the resources
• Beneficiaries: people who benefit from the resources
Term
What makes a good policy?
Definition
❖ Coverage
❖ Realism
❖ Usefulness
❖ Durability
CRUD
Term
Non-technical threats often are
Definition
• Localized (weather, vandalism, etc.)
• Somewhat random (though not always)
Term
Van Eck phreaking
Definition
See what’s on the screen using EM radiation
Term
Intellectual property is
Definition
information that belongs to someone
• Book
• Movie
• Program
• Secret formula
Term
Intellectual property may be protected by
Definition
• Copyright
• Patent
• Trade secret
Term
Copyrights
Definition
❖ Designed to protect the expression of ideas
❖ Limited in time
❖ Public domain
Term
Copyrighted item is subject to
Definition
fair use
Supporting users have an ad free experience!