Term
The risk of compromise of web server site |
|
Definition
- Exposure of documents to unauthorized users
- Malicious code on the server by attackers
|
|
|
Term
The risk of compromise in User Communications on the Web |
|
Definition
- Electronic Eavesdropping
- Establishment of bogus vendor web page
|
|
|
Term
Transport Layer Security (TLS)
|
|
Definition
- Provides confidentiality, integrity, authentication of endpoints
- Developed by Netscape for WWW browsers and servers
- Most common use of SSL: Protecting HTTP communications
|
|
|
Term
Internet protocol version: TLS
|
|
Definition
- Compatible with SSL
- Not yet Formally adopted for TCP/IP
|
|
|
Term
|
Definition
Demonstrating possession of a particular private key |
|
|
Term
|
Definition
Important for the site such as Internet banking |
|
|
Term
SSL Record Protocol contains: |
|
Definition
- Content type: 8 bits
- protocol version number: 8 bits majors, 8 bits minor
- data payload
- optionally compressed and encrypted
- Message authentication code (MAC)
- MAC computed before encryption
- maximum length: 16k bytes (214=16,384)
|
|
|
Term
|
Definition
- All parts of SSL use them
- Initial phase: public key system exchanges keys
- Messages enciphered using classical ciphers. checksummed using cryptographic checksums
- Only certain combinations allowed
- Depends on interchange algorithms
- Interchange algorithms: RSA, Diffe-Hellman, Fortezza
|
|
|
Term
|
Definition
- initially SSL session has null compression and encryption algorithms
- Both are set by the handshake protocol at beginning of session
- Handshake protocol may be repeated during session
|
|
|
Term
|
Definition
- Create SSL connection between client, server
- Server authenticates itself
- Client validates server, begin key exchange
- Acknowledgments all around
|
|
|
Term
|
Definition
- Use dedicated port numbers for every applications that uses SSL
- Negotiate use of SSL during normal TCP/IP connection establishment
|
|
|
Term
|
Definition
https = 443
ssmtp = 465
snntp = 563
sldap = 636
spop3 = 995
ftp-data = 889
ftps = 990
imaps = 991
telnets = 992
ircs = 993 |
|
|
Term
Internet Security Protocols |
|
Definition
- IP authentication header (AH)
- IP encapsulating security protocol (ESP)
- Transport layer security (TLS)
- Secure Socket Layer (SSL)
- Routing information protocol (RIP)
- Domain Name Service (DNS)
- Simple network management protocol (SNMP)
- Key management protocols
- Application layer protocols covered in other modules
|
|
|
Term
The parameters that Hackers go after in the IP Header |
|
Definition
- Flags
- Fragment Offset
- Source IP Address
|
|
|
Term
The parameters that hackers go after in the TCP header |
|
Definition
- Source Port
- Destination Port
- Sequence Number
- ACK
- RST
- SYN
- FIN
|
|
|
Term
Basic TCP/IP Vulnerabilities
|
|
Definition
- Many dangerous implementations of protocols
- Many dangerous protocols
- NFS, X11, RPC
- many of these are UDP based
|
|
|
Term
Solutions to Basic TCP/IP Vulnerabilities
|
|
Definition
- allow a restricted set of protocols between selected external and internal machines
- otherwise known as firewalls
|
|
|
Term
|
Definition
- IP packet carries no authentication of source address
- IP Spoofing is possible
- IP spoofing is a real threat on the internet
- IP spoofing occurs on other packet switched networks also, such as Novell's IPX
|
|
|
Term
|
Definition
- Can be accomplished in phases using a variety of icmp, tcp and udp packets
- Bombard the potential addresses with icmp packets
- send a limited number of tcp packets to all
- send a very limited number of udp packets to all
|
|
|
Term
|
Definition
- all traffic between external and internal networks must go through the firewall
- firewall has opportunity to ensure that only suitable traffic goes back and forth
|
|
|
Term
|
Definition
Packet filtering firewalls
Application gateway firewalls
Stateful firewalls
Circuit relay firewalls
combination of these |
|
|
Term
Packet filtering firewalls |
|
Definition
- filter IP packets
- IP packets are filtered based on
- source IP address + source port number
- destination IP address + destination port number
- protocol field: TCP or UDP
- TCP protocol flag: SYN or ACK
|
|
|
Term
Packet Filtering Firewalls Rules and operation |
|
Definition
- Drop packets based on filtering rules
- generally, no context is kept
- dynamic packet filtering keeps context
- Filtering may be done:
- incoming packets into router
- outgoing packets from router
- or both
|
|
|
Term
Advantages of Packet Filtering Firewalls |
|
Definition
- packet filtering can be very effective for simple services
- packet filtering is effective for coarse-grained controls
|
|
|
Term
Disadvantages of Packet Filtering Firewalls |
|
Definition
- Not so effective for fine-grained control
- can do: allow incoming telnet from a particular host
- cannot do: allow incoming telnet from a particular user
|
|
|
Term
|
Definition
- Standard access lists
- Extended access lists
|
|
|
Term
What is Standard access lists |
|
Definition
- Use only the source IP address in an IP packet to filter the network
|
|
|
Term
What is Extended access lists? |
|
Definition
- Check for both source and destination IP addresses, protocol fields in the Network Layer header, and port numbers at the Transport Layer header
|
|
|
Term
Packet Filtering Vulnerabilities |
|
Definition
- IP source address can be spoofed
- host-based IP routing
- hard to configure filtering rules correctly
- routing information protocol (RIP) is insecure
- some remote router management tools use cleartext passwords
|
|
|
Term
More Vulnerabilities of Packet filtering |
|
Definition
- All of these vulnerabilities have been and will be exploited
- epidemic of IP spoofing attacks in the late 1994 - early 1995
- basic principle was published in 1985
- as easier attacks get closed off, hackers move on to more sophisticated attacks
|
|
|
Term
|
Definition
- allow incoming TELNET from our own users who are traveling
- user telnets to gateway machine
- gateway does strong authentication and establishes telnet relay to internal machine
- user to internal machine telnet session is relayed through gateway
- once established relays do not examine traffice
|
|
|
Term
|
Definition
- Stateful packet inspection (SPI) or stateful inspection
- Keeps track of the state of network connections traveling across it
- Only packets matching a known connection state will be allowed by the firewall
|
|
|
Term
Stateful Firewall Example FTP: |
|
Definition
- By design, it opens new connections to arbitrary high ports
- The FTP port of the protected network may be recognized by a firewall, it then drops the packet
|
|
|
Term
Stateful Firewall Example
|
|
Definition
- Maintain a table of open connections and intelligently associating new connection requests with existing legitimate connections
|
|
|
Term
Stateful Firewall VS. Application Gateway Firewall
|
|
Definition
Stateful packet inspection can determine what type of protocol is being sent over each port
Application-level filters look at what a protocol is being used for (such as webpage or file sharing by HTTP traffic) |
|
|
Term
|
Definition
- IPv4 and IPv6 packets
- data origin authentication
- data integrity
- keyed message digest on IP packet headers and data payload
|
|
|
Term
IP Authentication contains what? |
|
Definition
- keyed message digest
- security parameter index (SPI)
- in context
- id of shared secret key
- key agreement is by internet key agreement protocols
|
|
|
Term
|
Definition
- security parameter index (SPI)
- cleartext, e.g., Initial Value for DES-CBC
- encrypted portions if appropriate
|
|
|
Term
Access Control Mechanisms |
|
Definition
- Identification and authentication
- Security through views
- Stored procedures
- Grant and Revoke
- MLS-Security Level
|
|
|
Term
Identification and Authentication |
|
Definition
- I&A provided by DBMS can be distinct from I&A provided by the underlying Operating System
- For example, in SQL
- Connect <user> IDENTIFIED BY <password>
|
|
|
Term
Stored Procedures and Granting Rights |
|
Definition
- The user who compiles a program becomes the owner of the stored procedure, and give others execute using the RUN command
- GRANT RUN ON program-A TO Alice
- Suppose program_A needs to access the relation EMP. Alice can execute program_A even though she does not have permission to access EMP
- Stored procedure runs with owners permissions
|
|
|
Term
Database Security Issues:
Granularity of Protection |
|
Definition
- In operating systems protected objects are files
- In databases, there are several possibilities: relations, attributes, tuples, data elements
|
|
|
Term
Database Security Issues:
What should be implement in a DBMS? |
|
Definition
- Relation level is easier to implement, but may be too inflexible
- Data element level aggravates many problems(such as polyinstantiation)
|
|
|
Term
What are the 4 ways that can be assigned security level to data in DBMS |
|
Definition
- Each Relation
- Each Tuple
- Each Attribute
- Each Element
|
|
|
Term
|
Definition
- Primary Key value are same
- Key class is different
- Two conflict entities
|
|
|
Term
Attribute Polyinstantiation
|
|
Definition
- Primary Key value are same
- Key class is same
- Conflicting information about the same entity
|
|
|
Term
Solutions to Entity Polyinstantiation |
|
Definition
- Single access class for primary key
- Partitioning the domain of the primary key
- Limit insertions to be done by trusted sunjects
|
|
|
Term
Solutions for Attribute Polyinstantiation |
|
Definition
- Prevent protocol [Jajodia-Sandhu]
|
|
|
Term
|
Definition
- Web applications take user input from a web form
- This attack involves injecting SQL statements as part of user input
|
|
|
Term
|
Definition
- Input validation
- Verify the input is a valid string in the language
- Need to exclude quotes and semicolons
- Have Length Limits on input
- Attempt to bind inputs to variables inside a SQL statement
- Control database permissions and segregate
|
|
|
Term
What are the characteristics of systems not under attack |
|
Definition
- User, process actions conform to statistically predictable pattern
- User, process actions do not include sequences of actions that subvert the security policy
- Process actions correspond to a set of specifications describing what the processes are allowed to do
- Systems under attack do not meet at least one of these
|
|
|
Term
|
Definition
- Attack tool is automated script designed to violate a security policy
- Example a rootkit
|
|
|
Term
|
Definition
- Rootkit configuration files cause ls,du, etc. to hide information
- ls lists all files in a directory
- Except those hidden by configuration file
- dirdump(local program to list directory entries) also lists all files
- Need to run both and compare results
|
|
|
Term
|
Definition
- Hypothesis: exploiting vulnerabilities requires abnormal use of normal commands or instructions
- Includes deviation from usual actions
- Includes execution of actions leading to break-ins
- Includes actions inconsistent with specifications of privileged programs
|
|
|
Term
|
Definition
- Detect wide variety of intrusions
- Previously known and unknown attacks
- Suggests need to learn/adapt to new attacks or changes in behavior
- Detect intrusions in timely fashion
- May need to be real-time, especially when system responds to intrusion
- Problem: analyzing commands may impact response time of system
|
|
|
Term
|
Definition
- Present analysis in simple, easy to understand format
- Ideally a binary indicator
- Usually more complex, allowing analyst to examine suspected attack
- User interface and effective visualization are critical, especially when monitoring many systems
- Be accurate
- Minimize false positives, false negatives (correctness)
- Minimize time spent identifying and verifying attacks
|
|
|
Term
Intrusion Detection Models |
|
Definition
- Anomaly detection
- Misuse detection
- Specification-based detection
|
|
|
Term
|
Definition
- What is usual, is known
- What is unusual, is bad
|
|
|
Term
|
Definition
- What is bad, is known
- What is not bad, is good
|
|
|
Term
Specification-based detection is..... |
|
Definition
- What is good, is known
- What is not good, is bad
|
|
|
Term
|
Definition
- Counts number of events that occur
- Between m and n events (inclusive) expected to occur
- If number falls outside this range, anomalous
- Example
- Windows: lock user out after k failed sequential login attempts. Range is (0, k-1)
- k or more failed logins deemed anomalous
|
|
|
Term
What is Statistical Moments? |
|
Definition
- Analyzer computes standard deviation (first two moments), other measures of correlation (higher moments)
- Check if measured values fall outside expected interval for particular moments
|
|
|
Term
What are the types of Threats? |
|
Definition
- Adversarial
- Non-Adversarial
- Natural
|
|
|
Term
What is Adversarial threat? |
|
Definition
- Unique
- Define and analyze to understand degree
- Consider environment, objectives, motivations,Intetions and capabilties
|
|
|
Term
What is a Non-Adversarial threat? |
|
Definition
- Unintentional
- Human or system failures
- Consider capability to assess degree
|
|
|
Term
What is a Natural Threat? |
|
Definition
- Predictable according to location
|
|
|
Term
What are the types of Assurance? |
|
Definition
- Policy assurance
- Design assurance
- Implementation assurance
- Operational assurance
|
|
|
Term
|
Definition
- Evidence establishing that the set of security requirements in policy is complete, consistent, technically, technically sound
|
|
|
Term
|
Definition
Evidence that establishing implementation is consistent
security requirements of security policy |
|
|
Term
Implementation Assurance is... |
|
Definition
- Evidence that establishing implementation is consistent with security requirements of security policy
|
|
|
Term
Operational assurance is ... |
|
Definition
Evidence establishing system sustains the security policy requirements during installation, configuration, and day to day operation |
|
|