Term
|
Definition
possible attacks on the sytems |
|
|
Term
|
Definition
Weakness that may be exploited to cause loss or harm |
|
|
Term
|
Definition
a measure of the possibiltiy of security breaches and severity of the ensuring damage |
|
|
Term
What are the classes of Threats?
|
|
Definition
Interruption: Malicious destruction of h/w
Interception: Illicit copying of program
Modification: Alter data being transmitted electronically
Fabricate: Additional pixel(can be defected as forgery) |
|
|
Term
what are the types of threats? |
|
Definition
Natural, Unintentional, Intentional: Insider and Outsider |
|
|
Term
What are Vulnerabilities?
|
|
Definition
Human Borne: Social Engineering, Malicious code and employee, Bribes/blackmail
System Borne: Holes in network infrascture hardware/software, Holes in application |
|
|
Term
|
Definition
impact, consequence, threatening event, threatening action, threat agent |
|
|
Term
Taxonomy of Rogue programs |
|
Definition
- Trojan Horse
- Programs that replicate
- Programs that bypass authentication
- Programs that cause server damage
|
|
|
Term
|
Definition
Any program that has been deliberately modified to do something other than what the user expects it to do
|
|
|
Term
|
Definition
VIRUS: Program that infects other programs with a (possibly evolved) copy of itself WORM: Program that spreads copies of itself over a network
RABBIT: Program that replicates itself in memory so as to cause exhaustion of some resource CHAIN LETTER: Program embedded in an email message that causes copies to be further mailed to other users |
|
|
Term
Programs that bypass authentication |
|
Definition
[image][image]BACK DOOR: Program that allows entry into the system bypassing the usual authentication sequence TRAP DOOR: Back door installed by an intruder SPOOFER: Program that mimics usual login sequence to capture legitimate user id’s and
passwords
SNOOPER: Program that observes traffic in a network, usually to capture legitimate user id’s and passwords |
|
|
Term
Programs that cause damage |
|
Definition
- Logic bomb: Malicious code that is activated when some set of circumstances arises
- Time bomb: A logic bomb timed to activate at certain dates
|
|
|
Term
What are security objectives? |
|
Definition
- Confidentiality
- Integrity
- Usage
- Availability
|
|
|
Term
|
Definition
- Only authorized people can see protected data
- Prevention/detect/deter improper disclosure of information
- Keeping data and resources hidden
|
|
|
Term
|
Definition
Special Access
Classified
Sensitive
Unclassified |
|
|
Term
|
Definition
X set of entities, I information repository
I has confidentiality property with respect to X if no x within Xcan obtain information from I
Example:
- X set of students
- I final exam answer key
- I is confidential with respect to X if students cannot obtain final
exam answer key
|
|
|
Term
|
Definition
Prevention/detect/deter improper modification of information:
Precise
Accurate
Unmodified
Modified only in acceptable way
Modified by authorized subject
Consistent
Data integrity
Origin integrity(authenticatication) |
|
|
Term
|
Definition
Comprehensive
Basic
Rubimentary
None
|
|
|
Term
|
Definition
|
|
Term
|
Definition
X set of entities, I information I has integrity property with respect to X if all x X trust information in I Types of integrity: Data integrity trust I, its conveyance and protection Origin Integrity/ Authentication I information about origin of something or an identity Assurance I resource behaves as it should |
|
|
Term
|
Definition
Prevention/detect/deter improper denial of access to services provided by the system: Timely response Fair allocation Enabling access to data and resources |
|
|
Term
what are Security Mechanisms ? |
|
Definition
Prevention: prevent attackers from violating security policy
Detection: detect attackers' violation of security policy
Recovery: stop attack, assess and repair damage
*continue to function correctly even if attack succeeds |
|
|
Term
|
Definition
|
|
Term
|
Definition
If we hide the inner workings of a system it will be secure
Less and less applicable due to:
- widespread vendor-independent open standards
- widespread computer knowledge and expertise
- widespread transfer of information
|
|
|
Term
|
Definition
says that if we instruct our users on how to behave we can secure our systems:
- do not share passwords
- do not write down passwords
|
|
|
Term
|
Definition
- A process Not a turn key product
- No silver bullet
- Absolute security does not exist
- security in most systems can be improved
- Absolute security is impossibel does not mean absolute insecurity is acceptable
|
|
|
Term
|
Definition
- Security: Confidentiality, Integrity, avaibility, usage
- Cost: Functionally, Ease of use
|
|
|
Term
|
Definition
[image][image]check slide 42 |
|
|
Term
|
Definition
- Fundamental requirement for security of information systems
- The First Gate: Front-end of information systems
|
|
|
Term
|
Definition
Principal: a unique entity Identity specifies a principal Internal representation of an entity Subject: acts on behalf of an entity Authentication: binding of an identity to a subject Identity controls the actions that its associated subjects may perform Subject is computer entity (process, etc.) |
|
|
Term
|
Definition
what the user knows: passwords, personal information what the user possesses: a key, a ticket, a passport, a smartcard what the user is (biometrics): fingerprints, voiceprint, signature dynamics where the user is: ocation, context-aware |
|
|
Term
What is a AUTHENTICATION SYSTEM? |
|
Definition
(A, C, F, L, S) A authentication information that proves identity C complementary information stored on computer and used to validate authentication information F complementation function; for f ! F, f : A " C L authentication functions that verify identity; for l ! L, l: A x C " {True, False} S selection functions enabling entity to create or alter information in A or C |
|
|
Term
Password-Based Authentication |
|
Definition
Most common Several problems: Inherent vulnerabilities easy to guess easy to snoop easy to lose no control on sharing
Practical vulnerabilities: visible in the clear in distributed and networked systems susceptible to replay attacks if encrypted naively Susceptible to dictionary attacks even if encrypted Require proactive management |
|
|
Term
|
Definition
Goal: find a of every A such that:
- For some f of every F, f(a) = c of every C
- c is associated with entity
Two ways to determine whether a meets these requirements:
- Direct approach: as above, compute f(a)
- Indirect approach: as I(a) succeeds ifff(a) = c of every C for some c associated with an entity, compute I(a)
|
|
|
Term
|
Definition
Hide one a, f, or c
Prevents obvious attack from above
Example: UNIX/Linux shadow password files
hides c's
Block access to all l of every ILor result of l(a)
Prevents attacker from knowing if guess succeeded
Example: preventing any logins to an account from a network
prevents knowing results of l (or accessing l)
|
|
|
Term
Token-Based Authentication |
|
Definition
Tokens operate in a variety of different ways
- Storage tokens
- Synchronous One-Time Password Generator
- Digital Signature Token
- Challenge-Response
Tokens come in a variety of physical forms
- Human-Interface Token
- Smart Card
- PCMCIA Card
Cannot be replayed
|
|
|
Term
Address-Based Authentication |
|
Definition
Originating Address
- Useful for secondary filtering in support of other mechanisms
- Problems
Reliability
Entitlement |
|
|
Term
Location-Based Authentication |
|
Definition
- Location signatures:
- Generated by Global Positioning Systems
- Compare this signatures to the computed expected location of the client system
|
|
|
Term
Biometrics Based Authentication
|
|
Definition
Biometrics are automated methods of recognizing a person based on a physiogical or behavioral characteristics
|
|
|
Term
|
Definition
- Enrollment: a sample of the biometric trait is taken, processed by a computer, and stored for later comparison
- Template: a mathematical representation of biometric data stored during the enrollment process
- Identification mode: The biometric system identifies a person from the entire enrolled population by searching a database for a match, One to Many
- Verifaction mode: the biometric system matches a person's claimed identity to his or her perviously enrolled pattern, One to One
|
|
|
Term
|
Definition
- False Acceptance Rate (FAR): The percentage of impostors wrongly matched
- False Rejection Rate (FRR): The percentage of valid users wrongly rejected
- Equal Error Rate (EER): The false match rate (or FAR) equals the false
non-match rate (or FRR)
- Threshold: Typically a numerical setting used by a
biometric system to adjust the FAR and FRR
|
|
|
Term
|
Definition
Features Ubiquity : anywhere, anytime w/telephone Convenient: natural, unobtrusive Security: channel robustness is the key Challenge Channel variability Less speech data/ shorter utterances
Speaker variability Recording/synthesis |
|
|
Term
Authorization VS Authentication |
|
Definition
Authentication: Establishes WHO you are
Authorization: Establishes WHAT you can do |
|
|
Term
|
Definition
- The system authenticates the user in context of a particualar principal
- There should be a one to many mapping from users to principlas: A user may have many principlas, but each principal is associated with an uniques user
- This ensures accountability of a user's actions: It implies that shared accounts are bad for accountability
|
|
|
Term
|
Definition
- A Trojan Horse is rogue software installed,
perhaps unwittingly, by duly authorized users
- A Trojan Horse does what a user expects it to
do, but in addition exploits the user's legitimate privileges to cause a security breach
|
|
|
Term
Reference Monitor Abstraction |
|
Definition
- It contains security classes of all objects and
subjects
- Whenever a subject accesses an object, it
must do so via the reference monitor
- It enforces the two MAC requirements
- It is always running, cannot be bypassed,
and cannot be tampered with
|
|
|
Term
Implementation of Access matrix models |
|
Definition
- Access Control Lists
- Capabilities
- Relations
|
|
|
Term
|
Definition
An object is anything on which a subject can perform operation
Most cases, objects are passive: file, directory, and memory segement
However, subjects can also be objects itself, with operations: kill, suspend, and resume |
|
|
Term
|
Definition
- Usually
Each subject is associated with a unique principal All subjects of a principal have identical rights
- This case can be modeled by a one-to-one
mapping between subjects and principals
- For simplicity, a principal and subject can be
treated a identical concepts. On the other hand, a user should always be viewed as multiple principals
|
|
|
Term
|
Definition
- 2 permission bits for each file, logically grouped
into 4 sets of three bits each _ _ _ _ _ _ _ _ _ _ _ _ going left to right
- irst 3 bits: SUID SGID Sticky-bit
- next 3 bit sets apply to file’s owner, users in
file’s group and all users respectively read write execute
|
|
|