CIS4360 Intro to Computer Security: Midterm 1

¡Supera tus tareas y exámenes ahora con Quizwiz!

no one value can be in the sequence can be inferred from the others

Independence (randomness & unpredictability)

Guarding against improper information modification or destruction, including ensuring information nonrepudiation and authenticity.

Integrity

Differences between Symmetric and Asymmetric

Key sizes are not comparable between the two approaches. 128 bit symmetric key vs 3000 bit public key. (large primes)

Combined one byte at a time with the plaintext stream using the XOR operation, a __________ is the output of the pseudorandom bit generator.

Keystream

An example of __________is an attempt by an unauthorized user to gain access to a system by posing as an authorized user.

Masquerade

An unauthorized entity gains access to a system or performs a malicious act by posing as an authorized user

Masquerade

__________is a procedure that allows communicating parties to verify that received or stored messages are authentic.

Message Authentication

A host generated random number is often called a __________.

Nonce

Attacker only needs to find ____ weakness(es)

ONE

_________ assures that individuals control or influence what information related to them may be collected and stored and by whom and to whom that information may be disclosed.

Privacy

A _________ strategy is one in which user is allowed to select their own password, however the system checks to see if the password is allowable, and if not, rejects it.

Proactive Password Checking

Digital signatures and key management are the two most important applications of ________ encryption.

Public-Key

pre - computed tables of hash values for all salts, a mammoth table of values - can be countered by using a sufficiently large salt and hash value length

Rainbow Table Attacks

A __________ strategy is one in which the system periodically runs its own password cracker to find guessable passwords.

Reactive Password Checking

A __________ attack involves an adversary repeating a previously captured user response.

Replay

A _____assessment is periodically assessing the risk to organizational operations, organizational assets, and individuals, resulting from the operation of organizational information systems and the associated processing, storage, or transmission or organizational information.

Risk

produces 160-bit hash value/message digest

SHA (Secure Hash Algorithm)

A _______is any action that compromises the security of information owned by an organization.

Security Attack

A set of rules and practices that specify or regulate how a system or organization provides security services to protect sensitive and critical system resources

Security Policy

There are four general means of authenticating a user's identity, which can be used alone or in combination:

Something the individual: KNOWS, POSSESSES(tangible), IS (static Biometric), DOES (dynamic Biometric)

A _____________ processes the input elements continuously, producing output one element at a time.

Stream cipher

Also referred to as single-key encryption, the universal technique for providing confidentiality for transmitted or stored data is _______

Symmetric Encryption

Data contained in an information system; or a service provided by a system; or a system capability; a facility tat houses system operations and equipment

System Resource (Asset)

RSA/IDA (combination of symmetric and asymmetric)

The asymmetric keys are used for authentication and after this has been successfully done, one or more symmetric keys are generated and exchanged using the asymmetric encryption. This way the advantages of both algorithms can be used.

_____________is the insertion of bits into gaps in a data stream to frustrate traffic analysis attempts.

Traffic Padding

an application or physical device masquerades as an authentic application or device for the purpose of capturing a user password, passcode, or biometric

Trojan Horse

In a __________ attack, an application or physical device masquerades as an authentic application or device for the purpose of capturing a user password, passcode, or biometric.

Trojan horse

A message authentication code is a small block of data generated by a secret key and appended to a message.

True

A smart card contains memory and microprocessor inside.

True

An individual's signature can be used in biometric authentication applications.

True

Attacks are threats carried out

True

Brute-force attacks try every possible key on a piece of ciphertext until an intelligible translation into plaintext is obtained.

True

Computer Security is essentially a battle of wits between a perpetrator who tries to find holes and the administrator who tries to close them.

True

Computer security is a protection of the integrity, availability and confidentiality of information system resources

True

Dictionary attacks develop a large dictionary of possible passwords and try each against the password file

True

Identifiers should be assigned carefully because authenticated identities are the basis for other security services.

True

In a biometric scheme some physical characteristic of the individual is mapped into a digital representation.

True

In the context of security our concern is with the vulnerabilities of system resources.

True

Many security administrators view strong security as an impediment to efficient and user-friendly operation of an information system.

True

Memory Cards only store data, no processing is done.

True

Public-key cryptography is asymmetric.

True

Some form of protocol is needed for public-key distribution.

True

Symmetric encryption is used primarily to provide confidentiality

True

System Availability assures that systems work promptly and service is not denied to authorized users

True

The advantage of a stream cipher is that it is faster than block ciphers.

True

The first step in devising security services and mechanisms is to develop a security policy.

True

The problem of computer generated passwords is that users have trouble remembering them.

True

The purpose of the Diffie-Hellman Key Agreement algorithm is to enable two users to securely reach agreement about a shared secret that can be used as a secret key for subsequent symmetric encryption of messages.

True

The secret key is input to the encryption algorithm.

True

The strength of a hash function against brute-force attacks depends solely on the length of the hash code produced by the algorithm.

True

User authentication is the basis for most types of access control and for user accountability.

True

User authentication is the process of verifying an identity claimed by or for a system entity.

True

X.800 architecture was developed as an international standard and focuses on security in the context of networks and communications.

True

measuring unpredictable natural processes: (rolling dice, thermal noise, radiation, gas discharge) increasingly provided on modern processors

True Random Number Generator (TRNG)

frequency of occurrence of each of the numbers should be approximately the same

Uniform Distribution (randomness & unpredictability)

IF the only form of attack that could be made on an encryption algorithm is brute-force, then the way to counter such attacks would be to

Use Longer Keys

In __________ strategy, users are told the importance of using hard-to-guess passwords and are provided with guidelines for selecting strong passwords.

User Education

A circumstance that results in control of system services or functions by an unauthorized entity.

Usurpation

In user authentication, the __________ step is presenting or generating authentication information that corroborates the binding between the entity and the identifier.

Verification

Presenting or generating AUTHENTICATION INFORMATION that corroborates the binding between the entity and the identifier

Verification Step (example: that the username and password matches)

Replay, masquerade, modification of messages, and denial of service are example of

active attacks

A _______is a threat that is carried out and, if successful, leads to an undesirable violation of security, or threat consequence.

attack

An assault on system security that derives from an intelligent act that is a deliberate attempt to evade security services and violate the security policy of a system is a

attack

A ___________ authentication system attempts to authenticate an individual based on his or her unique physical characteristics.

biometric

adversary attempts to achieve user authentication without access to the remote host or the intervening communications path

client attack

A loss of _____ is the unauthorized disclosure of information

confidentiality

A ____________is any means taken to deal with a security attack

countermeasure

A _________ attack attempts to disable a user authentication service by flooding the service with numerous authentication attempts.

denial-of-service

DSS (Digital Signature Standard)

digital signature functions with SHA cannot be used for encryption or key exchange.

The assets of a computer system can be categorized as (4 things)

hardware, software, communication lines and networks, and data.

The two criteria used to validate that a sequence of numbers is random are (2 things)

independence and uniform distribution

RSA (Rivest, Shamir, Adleman)

most widely approach to public key encryption -block cipher with 1's and 0's

A ______ is an attempt to learn or make use of information from the system that does not affect system resources.

passive attack

Release of message contents and traffic analysis are two types of

passive attacks

Security implementation involves four complementary courses of action:

prevention, detection, response, and recovery

encrypting with Private Key and decrypting with Public Key

provides authenticity Bob(Bob Private) --> Sue(Bob Public) encrypt __________--> _________decrypt (anyone who knows the corresponding public key will be able to decrypt the message)

encrypting with Public Key and decrypting with Private Key

provides confidentiality Bob(Sue Public) --> Sue(Sue Private) encrypt ________-->______ decrypt

A _________ stream is one that is unpredictable without knowledge of the input key and which has an apparently random character.

pseudorandom

sequences produced that satisfy statistical randomness tests. -likely to be predictable

pseudorandom numbers

In public key encryption, the __________ is a pair of keys that have been selected so that if one is used for encryption, the other is used for decryption.

public and private key

adversary repeats a previously captured user response

replay

The OSI security architecture focuses on (3 things)

security attacks, mechanisms, and services

Authentication protocols used with smart tokens can be classified into three categories:

static, dynamic password generator, and challenge-response

A flaw or weakness in a system's design, implementation, or operation and management that could be exploited to violate the system's security policy is

vulnerability

ASYMMETRIC ENCRYPTION

-Pair of keys, Private and Public, can use one for encryption and the other for decryption. (and vise versa) -The private key cannot be reconstructed from the public key. -Diffie and Hellmann. -RSA, DSA, ELGAMAL -Any message that is encrypted by using the private key can only be decrypted by using the matching public key. -Digital Certificates is used to discover other public keys.

Message Authentication Code (MAC) Symmetric

-Protects against active attacks -verifies message is authentic, not altered, from authentic source, timely and correct sequence -only sender and receiver share a key -is a function of an input message and a secret key.

SYMMETRIC ENCRYPTION:

-Universal technique for providing confidentiality -Both parties share the SAME key for both encryption and decryption. Key needs to be kept secret. -Block Ciphers: DES, 3-DES, AES -Faster than Asymmetric. Less computing power. Attacks: Cryptanalysis and Brute Force -Message Authentication Code (MAC)

Hash Function "finger-print" of data

-can be applied to a block of data of any size -produces a fixed length output

DES takes a plaintext block of 64 bits and a key of ______ bits to produce a ciphertext block of 64 bits.

56

Digital Certificates (Public Key)

A certificate is a package of information that identifies a user or a server, and contains information such as the organization name, the organization that issued the certificate, the user's e-mail address and country, and the user's public key.

-The security goal that generates the requirement for actions of an entity to be traced uniquely to that entity - Systems must keep records of their activities to permit later forensic analysis to trace security breaches or to aid in transaction disputes

Accountability

verifying that users are who they say they are each input arriving at the system came from a trusted source

Authenticity (under Integrity)

A loss of __________ is the disruption of access to or use of information or an information system.

Availability

ensuring timely and reliable access to and use of information

Availability

A _________ is to try every possible key on a piece of ciphertext until an intelligible translation into plaintext is obtained.

Brute-Force Attack

-binds public key to individual -person registers their public key with this.

Certification Authorities

To counter threats to remote user authentication, systems generally rely on some form of ___________ protocol.

Challenge-Response

______ is the scrambled message produced as output

Ciphertext

A _________ is when an adversary attempts to achieve user authentication without access to the remote host or to the intervening communications path.

Client Attack

Messages are destroyed/deleted/read/ modified/delayed/recorded/duplicated fabricated

Communication Lines Threat

__________is the protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability, and confidentiality of information system resources.

Computer security

Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information

Confidentiality

Vulnerabilities (3 types)

Corrupted (loss of Integrity) Leaky (loss of confidentiality) Unavailable or slow (loss of availability)

A __________ attack exploits the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used.

Cryptanalytic

The most important symmetric algorithms, all of which are block ciphers, are (3 of them)

DES (Data encryption standard), Triple DES, and AES (Advancted encryption standard)

The assurance that data received are exactly as sent by an authorized entity is

Data Integrity

Files are deleted, unauthorized analysis or reading is performed.

Data threat

The _______ algorithm takes the ciphertext and the secret key and produces the original plaintext.

Decryption

The __________prevents or inhibits the normal use or management of communications facilities.

Denial Of Service

attempts to disable a user authentication service by flooding the service with numerous authentication attempts

Denial-of-Service

develop a large dictionary of possible passwords and try each against the password file -each password must be hashed using each salt value and then compared to store hash values. - a lot of computational power

Dictionary attacks

The purpose of the __________ algorithm is to enable two users to securely reach agreement about a shared secret that can be used as a secret key for subsequent symmetric encryption of messages.

Diffie-Hellman Key Agreement

-authenticating both source and data integrity. -hash code and private key encrypted together -does NOT provide confidentiality, eavesdropping.

Digital Signature

A ______ is created by using a secure hash function to generate a hash value for a message and then encrypting the hash code with a private key. Data appended to or a cryptographic transformation of a data unit that allows a recipient of the data unit to prove the source and integrity of the data unit and protect against forgery.

Digital Signature

_________ used for authenticating both source and data integrity.

Digital Signatures

adversary attempts to learn the password by some sort of attack that involves the physical proximity of user and adversary: Keylogging

Eavesdropping

use of mathematical algorithms to transform data into a form that is not readible

Encipherment

Keylogging is a form of host attack.

FALSE Not Keylogging (dictionary attack / exhaustive search)

(Contingency planning) is a functional area that primarily requires computer security technical measures.

FALSE access control; identification & authentication; system & communication protection; and system & information integrity functional areas that primarily require management controls and procedures include: awareness & training; audit & accountability; certification, accreditation, & security assessments; CONTINGENCY PLANNING; maintenance; physical & environmental protection; planning; personnel security; risk assessment; and systems & services acquisition

Privacy ensures that information and programs are changed only in a specified and authorized manner.

False (Confidentiality)

Like the MAC, a hash function also takes a secret key as input.

False The MAC is a function of an input message and a secret key.

On average, _____ of all possible keys must be tried in order to achieve success with a brute-force attack.

Half

_________systems identify features of the hand, including shape, and lengths and widths of fingers.

Hand Geometry

The purpose of a _____ is to produce a "fingerprint" of a file, message, or other block of data.

Hash Function

A widely used password security technique is the use of ___________ passwords and a salt value.

Hashed (Unix uses Salt Value)

A __________ is directed at the user file at the host where passwords, token passcodes, or biometric templates are stored.

Host Attack

presenting an identifier to the security system

Identification Step (example: you match your username)


Conjuntos de estudio relacionados

Simulated Practice Exam and Complete Practice Exam

View Set

PrepU chpt 27 Disorders of Cardiac function, and heart failure and circulatory shock

View Set

Corporate Finance Test 3 - Ch. 9 & 10

View Set

Substance Use and Abuse Final Exam

View Set

A client is admitted to the labor and delivery suite with an intrauterine fetal demise. The nurse determines that the discussion with the parents was effective in preparing them for the delivery when the parents make which response?

View Set