Shared Flashcard Set

Details

CSE 465 Final Exam
Information Assurance
72
Computer Science
Undergraduate 4
12/09/2009

Additional Computer Science Flashcards

 


 

Cards

Term
The risk of compromise of web server site 
Definition

  • Exposure of documents to unauthorized users
  • Malicious code on the server by attackers

Term
The risk of compromise in User Communications on the Web
Definition

  • Electronic Eavesdropping
  • Establishment of bogus vendor web page

Term

Transport Layer Security (TLS)

 

Definition

  • Provides confidentiality, integrity, authentication of endpoints
  • Developed by Netscape for WWW browsers and servers
  • Most common use of SSL: Protecting HTTP communications

Term

Internet protocol version: TLS

 

Definition

  • Compatible with SSL
  • Not yet Formally adopted for TCP/IP

Term
Server Authentication 
Definition
Demonstrating possession of a particular private key
Term
Client Authentication 
Definition
Important for the site such as Internet banking
Term
SSL Record Protocol contains:
Definition

  • Content type: 8 bits
  • protocol version number: 8 bits majors, 8 bits minor
  • data payload
    • optionally compressed and encrypted
  • Message authentication code (MAC)
    • MAC computed before encryption
  • maximum length: 16k bytes (214=16,384)

Term
What supports Crypto
Definition

  • All parts of SSL use them
  • Initial phase: public key system exchanges keys
    • Messages enciphered using classical ciphers. checksummed using cryptographic checksums
    • Only certain combinations allowed
      • Depends on interchange algorithms
      • Interchange algorithms: RSA, Diffe-Hellman, Fortezza  

Term
SSL Handshake Protocol
Definition

  • initially SSL session has null compression and encryption algorithms
  • Both are set by the handshake protocol at beginning of session
  • Handshake protocol may be repeated during session

Term
SSL Handshake steps 
Definition

  • Create SSL connection between client, server
  • Server authenticates itself
  • Client validates server, begin key exchange
  • Acknowledgments all around

Term
Applications and SSL
Definition

  • Use dedicated port numbers for every applications that uses SSL
  • Negotiate use of SSL during normal TCP/IP connection establishment

Term
SSL Port numbers
Definition

https = 443

ssmtp = 465

snntp = 563

sldap = 636

spop3 = 995 

ftp-data = 889

ftps = 990

imaps = 991

telnets = 992

ircs = 993

Term
Internet Security Protocols 
Definition

  • IP authentication header (AH)
  • IP encapsulating security protocol (ESP)
  • Transport layer security (TLS)
  • Secure Socket Layer (SSL)
  • Routing information protocol (RIP)
  • Domain Name Service (DNS)
  • Simple network management protocol (SNMP)
  • Key management protocols 
  • Application layer protocols covered in other modules 

Term
The parameters that Hackers go after in the IP Header
Definition

  • Flags 
  • Fragment Offset
  • Source IP Address

 

Term
The parameters that hackers go after in the TCP header
Definition

  • Source Port
  • Destination Port
  • Sequence Number
  • ACK
  • RST
  • SYN
  • FIN

 

Term

Basic TCP/IP Vulnerabilities

 

Definition

  • Many dangerous implementations of protocols 
    • sendmail
  • Many dangerous protocols 
    • NFS, X11, RPC
    • many of these are UDP based

Term

Solutions to Basic TCP/IP Vulnerabilities

 

Definition

  • allow a restricted set of protocols between selected external and internal machines 
  • otherwise known as firewalls

Term
Ultimate Vulnerability 
Definition

  • IP packet carries no authentication of source address
  • IP Spoofing is possible 
    • IP spoofing is a real threat on the internet 
    • IP spoofing occurs on other packet switched networks also, such as Novell's IPX

Term
Networking Scanning 
Definition

  • Can be accomplished in phases using a variety of icmp, tcp and udp packets
    • Bombard the potential addresses with icmp packets
    • send a limited number of tcp packets to all 
    • send a very limited number of udp packets to all

Term
What is a Firewall?
Definition

  • all traffic between external and internal networks must go through the firewall 
    • easier said than done
  • firewall has opportunity to ensure that only suitable traffic goes back and forth
    • easier said than done  

Term
Types of Firewalls 
Definition

Packet filtering firewalls

Application gateway firewalls

Stateful firewalls

Circuit relay firewalls

combination of these

Term
Packet filtering firewalls 
Definition

  • filter IP packets
  • IP packets are filtered based on 
    • source IP address + source port number
    • destination IP address + destination port number
    • protocol field: TCP or UDP
    • TCP protocol flag: SYN or ACK

 

Term
Packet Filtering Firewalls Rules and operation
Definition

  • Drop packets based on filtering rules
  • generally, no context is kept 
    • dynamic packet filtering keeps context
  • Filtering may be done:
    • incoming packets into router
    • outgoing packets from router
    • or both

Term
Advantages of Packet Filtering Firewalls
Definition

  • packet filtering can be very effective for simple services
  • packet filtering is effective for coarse-grained controls

Term
Disadvantages of Packet Filtering Firewalls
Definition

  • Not so effective for fine-grained control 
    • can do: allow incoming telnet from a particular host 
    • cannot do: allow incoming telnet from a particular user

Term
Types of ACL
Definition

  • Standard access lists
  • Extended access lists

Term
What is Standard access lists
Definition

  • Use only the source IP address in an IP packet to filter the network

Term
What is Extended access lists? 
Definition

  • Check for both source and destination IP addresses, protocol fields in the Network Layer header, and port numbers at the Transport Layer header

Term
Packet Filtering Vulnerabilities 
Definition

  • IP source address can be spoofed 
  • host-based IP routing 
  • hard to configure filtering rules correctly 
  • routing information protocol (RIP) is insecure 
  • some remote router management tools use cleartext passwords

Term
More Vulnerabilities of Packet filtering
Definition

  • All of these vulnerabilities have been and will be exploited
  • epidemic of IP spoofing attacks in the late 1994 - early 1995
    • basic principle was published in 1985
    • as easier attacks get closed off, hackers move on to more sophisticated attacks

Term
Proxies or Relays 
Definition

  • allow incoming TELNET from our own users who are traveling 
    • user telnets to gateway machine 
    • gateway does strong authentication and establishes telnet relay to internal machine 
    • user to internal machine telnet session is relayed through gateway
  • once established relays do not examine traffice

Term
Stateful Firewall 
Definition

  • Stateful packet inspection (SPI) or stateful inspection
    • Keeps track of the state of network connections traveling across it
    • Only packets matching a known connection state will be allowed by the firewall

Term
Stateful Firewall Example FTP:
Definition

  • By design, it opens new connections to arbitrary high ports
  • The FTP port of the protected network may be recognized by a firewall, it then drops the packet 

Term

Stateful Firewall Example

Definition

  • Maintain a table of open connections and intelligently associating new connection requests with existing legitimate connections 

Term

Stateful Firewall VS. Application Gateway Firewall

 

Definition

Stateful packet inspection can determine what type of protocol is being sent over each port

Application-level filters look at what a protocol is being used for (such as webpage  or file sharing by HTTP traffic)

Term
IP authentication Header
Definition

  • IPv4 and IPv6 packets
    • data origin authentication 
    • data integrity
  • keyed message digest on IP packet headers and data payload 
    • keyed MD5, HMAC

Term
IP Authentication contains what?
Definition

  • keyed message digest 
  • security parameter index (SPI)
    • in context
    • id of shared secret key
  • key agreement is by internet key agreement protocols

Term
What is in ESP header?
Definition

  • security parameter index (SPI)
  • cleartext, e.g., Initial Value for DES-CBC
  • encrypted portions if appropriate

Term
Access Control Mechanisms 
Definition

  • Identification and authentication 
  • Security through views
  • Stored procedures
  • Grant and Revoke 
  • MLS-Security Level

Term
Identification and Authentication 
Definition

  • I&A provided by DBMS can be distinct from I&A provided by the underlying Operating System 
  • For example, in SQL
    • Connect <user> IDENTIFIED BY <password>

Term
Stored Procedures and Granting Rights
Definition

  • The user who compiles a program becomes the owner of the stored procedure, and give others execute using the RUN command
  • GRANT RUN ON program-A TO Alice
    • Suppose program_A needs to access the relation EMP. Alice can execute program_A even though she does not have permission to access EMP
  • Stored procedure runs with owners permissions 

Term

Database Security Issues:

Granularity of Protection

Definition

  • In operating systems protected objects are files 
  • In databases, there are several possibilities: relations, attributes, tuples, data elements

 

Term

Database Security Issues:

What should be implement in a DBMS?

Definition

  • Relation level is easier to implement, but may be too inflexible
  • Data element level aggravates  many problems(such as polyinstantiation)

Term
What are the 4 ways that can be assigned security level to data in DBMS 
Definition

  • Each Relation
  • Each Tuple
  • Each Attribute
  • Each Element 

Term
Entity Polyinstantiation 
Definition

  • Primary Key value are same
  • Key class is different
  • Two conflict entities

Term

Attribute Polyinstantiation

 

Definition

  • Primary Key value are same 
  • Key class is same
  • Conflicting information about the same entity

Term
Solutions to Entity Polyinstantiation
Definition

  • Single access class for primary key
  • Partitioning the domain of the primary key
  • Limit insertions to be done by trusted sunjects

Term
Solutions for Attribute Polyinstantiation
Definition

  • Prevent protocol [Jajodia-Sandhu]

Term
What is SQL Injection?
Definition

  • Web applications take user input from a web form
  • This attack involves injecting SQL statements as part of user input

Term
SQL Injection: Defense
Definition

  • Input validation
    • Verify the input is a valid string in the language
    • Need to exclude quotes and semicolons
    • Have Length Limits on input
    • Attempt to bind inputs to variables inside a SQL statement
  • Control database permissions and segregate

Term
What are the characteristics of systems not under attack
Definition

  • User, process actions conform to statistically predictable pattern
  • User, process actions do not include sequences of actions that subvert the security policy
  • Process actions correspond to a set of specifications describing what the processes are allowed to do 
  • Systems under attack do not meet at least one of these

Term
What is a INTRUSION?
Definition

  • Attack tool is automated script designed to violate a security policy
  • Example a rootkit 

Term
What is Detection?
Definition

  • Rootkit configuration files cause ls,du, etc. to hide information 
    • ls lists all files in a directory
      • Except those hidden by configuration file
    • dirdump(local program to list directory entries) also lists all files 
      • Need to run both and compare results

Term
What is Denning's Model?
Definition

  • Hypothesis: exploiting vulnerabilities requires abnormal use of normal commands or instructions
    • Includes deviation from usual actions 
    • Includes execution of actions leading to break-ins 
    • Includes actions inconsistent with specifications of privileged programs

Term
Goals of IDS
Definition

  • Detect wide variety of intrusions
    • Previously known and unknown attacks 
    • Suggests need to learn/adapt to new attacks or changes in behavior
  • Detect intrusions in timely fashion
    • May need to be real-time, especially when system responds to intrusion
      • Problem: analyzing commands may impact response time of system

Term
Goals of IDS -Contd
Definition

 

  • Present analysis in simple, easy to understand format
    • Ideally a binary indicator
    • Usually more complex, allowing analyst to examine suspected attack
    • User interface and effective visualization are critical, especially when monitoring many systems
  • Be accurate
    • Minimize false positives, false negatives (correctness)
    • Minimize time spent identifying and verifying attacks

 

 

Term
Intrusion Detection Models
Definition

  • Anomaly detection
  • Misuse detection
  • Specification-based detection

Term
Anomaly Detection is...
Definition

 

  • What is usual, is known
  • What is unusual, is bad

 

Term

Misuse detection is...

 

Definition

 

  • What is bad, is known
  • What is not bad, is good

 

Term
Specification-based detection is.....
Definition

  • What is good, is known
  • What is not good, is bad

Term
Threshold Metrics
Definition

  • Counts number of events that occur
    • Between m and n events (inclusive) expected to occur
    • If number falls outside this range, anomalous
  • Example 
    • Windows: lock user out after k failed sequential login attempts. Range is (0, k-1)
      • k or more failed logins deemed anomalous

Term
What is Statistical Moments?
Definition

  • Analyzer computes standard deviation (first two moments), other measures of correlation (higher moments)
    • Check if measured values fall outside expected interval for particular moments 

Term
What are the types of Threats?
Definition
  • Adversarial
  • Non-Adversarial
  • Natural
Term
What is Adversarial threat?
Definition
  • Unique
  • Define and analyze to understand degree
  • Consider environment, objectives, motivations,Intetions and capabilties

 

Term
What is a Non-Adversarial threat?
Definition

  • Unintentional
  • Human or system failures
  • Consider capability to assess degree

 

Term
What is a Natural Threat?
Definition

  • Predictable according to location

Term
What are the types of Assurance?
Definition

  • Policy assurance 
  • Design assurance
  • Implementation assurance
  • Operational assurance

 

Term
Policy assurance is ...
Definition

  • Evidence establishing that the set of security requirements in policy is complete, consistent, technically, technically sound

Term
Design Assurance is...
Definition

Evidence that establishing implementation is consistent

security requirements of security policy 

Term
Implementation Assurance is...
Definition

  • Evidence that establishing implementation is consistent with security requirements of security policy

Term
Operational assurance is ...
Definition
Evidence establishing system sustains the security policy requirements during installation, configuration, and day to day operation
Supporting users have an ad free experience!