Computer Security

Ace your homework & exams now with Quizwiz!

Threat

A potential for violation of security, which exists when there is a circumstance, capability, action, or event that could breach security and cause harm. That is, a threat is a possible danger that might exploit a vulnerability

What is a security service

A processing or communication service that enhances the security of the data processing systems and the information transfers of an organization

Number of keys used

Symmetric, single-key, secret-key, conventional encryption and Asymmetric, two key, or public-key encryption

Pervasive security mechanisms

TSESS: Trusted functionality Security Labels Event detection Security audit trails Security recovery

What is a masquerade?

Takes place when one entity pretends to be a different entity Usually includes one of the other forms

Cryptanalysis

Techniques used for deciphering a message without any knowledge of the enciphering details

Access Control

The ability to limit and control the access to host systems and applications via communications links To achieve this, each entity trying to gain access must first be identified, or authenticated, so that access rights can be tailored to the individual

Data integrity

The assurance that data received are exactly as sent by an authorized entity (i.e., contain no modification, insertion, deletion, or replay)

What is Authentication

The assurance that the communicating entity is the one that is claims to be

Chosen-plaintext attack

Trudy can get ciphertext for chosen plaintext

Known plaintext attack

Trudy has plaintext corresponding to ciphertext, i.e., all pairings for a,l,i,c,e,b,o,

What is a security attack

Any action that compromises the security of information owned by an organization

Two types of passive attacks

- Release of message contents - Traffic analysis

Attack Tree

A branching, hierarchical data structure that represents a set of potential techniques for exploiting security vulnerabilities • The security incident that is the goal of the attack is represented as the root node of the tree, and the ways that an attacker could reach that goal are represented as branches and subnodes of the tree • The final nodes on the paths outward from the root, (leaf nodes), represent different ways to initiate an attack • The motivation for the use of attack trees is to effectively exploit the information available on attack patterns

Security Services

A service provided by a protocol layer of communicating open systems and that ensures adequate security of the systems or of data transfers A processing or communication service provided by a system to give a specific kind of protection to system resources

Attack

An assault on system security that derives from an intelligent threat; that is, an intelligent act that is a deliberate attempt (especially in the sense of a method or technique) to evade security services and violate the security policy of a system

Attack Surfaces

An attack surface consists of the reachable and exploitable vulnerabilities in a system • Examples: - Open ports on outward facing Web and other servers, and code listening on those ports - Services available on the inside of a firewall - Code that processes incoming data, email, XML, office documents, and industry-specific custom data exchange formats - Interfaces, SQL, and Web forms - An employee with access to sensitive information vulnerable to a social engineering attack

Isolation

Applies in three contexts: • Public access systems should be isolated from critical resources to prevent disclosure or tampering • Processes and files of individual users should be isolated from one another except where it is explicitly desired • Security mechanisms should be isolated in the sense of preventing access to those mechanisms

Cryptography

Area of study of the many schemes used for encryption

Cryptology

Areas of cryptography and cryptanalysis

Why is availability important?

Assures systems work promptly and service isn't denied to authorized users

Why is privacy important?

Assures that individuals control or influence what information related to them may be collected and stored and by whom and to whom that information may be disclosed

Why is data integrity important?

Assures that information and programs are changed only in a specified and authorized manner

Why is system integrity important?

Assures that information and programs are changed only in a specified and authorized manner

Why is data confidentiality important?

Assures that private or confidential information is not made available or disclosed to unauthorized individuals

Cryptanalysis

Attack relies on the nature of the algorithm plus some knowledge of the general characteristics of the plaintext • Attack exploits the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used

Plaintext process methods (2):

Block or stream cipher

Symmetric key crypto

Bob and alice share same key

Fundamental Security Design Principles

CLOSEF and MELLLIP Complete meditation Least privilege Open design Separation of privilege Economy of mechanism Fail-safe defaults Modularity Encapsulation Layering Least astonishment Least common mechanism Isolation Psychological acceptability

Encapsulation

Can be viewed as a specific form of isolation based on object-oriented functionality • Protection is provided by encapsulating a collection of procedures and data objects in a domain of its own so that the internal structure of a data object is accessible only to the procedures of the protected subsystem, and the procedures may be called only at designated domain entry points

Ciphertext

Coded message

Selective field confidentiality

Confidentiality of selected fields within the user data on a connection or in a single data block

What is CIAAA?

Confidentiality, Integrity, Accountability, Availability, Authenticity

Separation of privilege

Defined as a practice in which multiple privilege attributes are required to achieve access to a restricted resource • Multifactor user authentication is an example which requires the use of multiple techniques, such as a password and a smart card, to authorize a user

Cipher text only attack

Hacker has ciphertext they can analyze, using stat analysis or brute force

Psychological acceptability

Implies that the security mechanisms should not interfere unduly with the work of users, while at the same time meeting the needs of those who authorize access • Where possible, security mechanisms should be transparent to the users of the system or, at most, introduce minimal obstruction • In addition to not being intrusive or burdensome, security procedures must reflect the user's mental model of protection

Data-Origin Authentication

In a connectionless transfer, provides assurance that the source of received data is as claimed.

Active attacks

Involve some modification of the data stream or the creation of a false stream Difficult to prevent because of the wide variety of potential physical, software, and network vulnerabilities Goal is to detect attacks and to recover from any disruption or delays caused by them

Replay

Involves passive capture of a data unit and its subsequent retransmission to produce an unauthorized effect

What is a low-impact security breach?

Loss could be expected to have a limited adverse effect on organization operations, organizational assets, or individuals

What is a medium-impact security breach?

Loss could be expected to have a serious adverse effect on organization operations, organizational assets, or individuals

Least astonishment

Means that a program or user interface should always respond in the way that is least likely to astonish the user • The mechanism for authorization should be transparent enough to a user that the user has a good intuitive understanding of how the security goals map to the provided security mechanism

Fail-safe defaults

Means that access decisions should be based on permission rather than exclusion • The default situation is lack of access, and the protection scheme identifies conditions under which access is permitted • Most file access systems and virtually all protected services on client/ server use fail-safe defaults

Complete mediation

Means that every access must be checked against the access control mechanism • Systems should not rely on access decisions retrieved from a cache • To fully implement this, every time a user reads a field or record in a file, or a data item in a database, the system must exercise access control • This resource-intensive approach is rarely used

Least of privilege

Means that every process and every user of the system should operate using the least set of privileges necessary to perform the task • An example of the use of this principle is role-based access control; the system security policy can identify and define the various roles of users or processes and each role is assigned only those permissions needed to perform its functions

Open Design

Means that the design of a security mechanism should be open rather than secret • Although encryption keys must be secret, encryption algorithms should be open to public scrutiny • Is the philosophy behind the NIST program of standardizing encryption and hash algorithms

Economy of mechanism

Means that the design of security measures embodied in both hardware and software should be as simple and small as possible • Relatively simple, small design is easier to test and verify thoroughly • With a complex design, there are many more opportunities for an adversary to discover subtle weaknesses to exploit that may be difficult to spot ahead of time

Least common mechanism

Means that the design should minimize the functions shared by different users, providing mutual security • This principle helps reduce the number of unintended communication paths and reduces the amount of hardware and software on which all users depend, thus making it easier to verify if there are any undesirable security implications

Symmetric Cipher Model

Needs both a strong encryption algorithm, and sender/receiver must have obtained copies of the secret key securely

Attack Surface Categories

Network attack surface - Refers to vulnerabilities over an enterprise network, wide- area network, or the Internet • Software attack surface - Refers to vulnerabilities in application, utility, or operating system code • Human attack surface - Refers to vulnerabilities created by personnel or outsiders

Plaintext

Original message

What 2 specific authentication services are defined in X.800?

Peer entity authentication, data origin authentication

Unwanted Access

Placement in a computer system of logic that exploits vulnerabilities in the system and that can affect application programs as well as utility programs such as editors and compilers • Programs can present two kinds of threats: - Information access threats • Intercept or modify data on behalf of users who should not have access to that data - Service threats • Exploit service flaws in computers to inhibit use by legitimate users

Nonrepudiation

Prevents either sender or receiver from denying a transmitted message • When a message is sent, the receiver can prove that the alleged sender in fact sent the message • When a message is received, the sender can prove that the alleged receiver in fact received the message

Denial of service

Prevents or inhibits normal use or management of communications facilities

Enciphering/encryption

Process of converting from plaintext to ciphertext

Nonrepudiation, destination

Proof message receieved by specific party

Nonrepudiation, orign

Proof message sent by specified party

Connectionless confidentiality

Protection of all user data in a single data block

Traffic Flow confidentiality

Protection of the information that might be derived from observation of traffic flows

Availability Service

Protects a system to ensure its availability • This service addresses the security concerns raised by denial- of-service attacks • It depends on proper management and control of system resources and thus depends on access control service and other security services

Connectionless Integrity

Provides for the integrity of a single connectionless data block and may take the form of detection of data modification. Additionally, a limited form of replay detection may be provided.

Connection Integrity with recovery

Provides for the integrity of all user data on a connection and detects any modification, insertion, deletion, or replay of any data within an entire data sequence, with recovery attempted

Selective field connectionless integrity

Provides for the integrity of selected fields within a single connectionless data block; takes the form of determination of whether the selected fields have been modified.

Selective-Field Connection Integrity

Provides for the integrity of selected fields within the user data of a data block transferred over a connection and takes the form of determination of whether the selected fields have been modified, inserted, deleted, or replayed.

Connection Integrity without recovery

Provides only detection without recovery

Nonrepudiation

Provides protection against denial by one of the entities involved in a communication of having participated in all or part of the communication

Public key crypto

Public encryption key known to all, private decryption key known only to receiver, sender/receiver don't share secret key

Specific Security Mechanisms

RANTEDAD Routing control Authentication exchange Notarization Traffic Padding Encipherment Digital signatures Access controls Data integrity

Modularity

Refers both to the development of security functions as separate, protected modules and to the use of a modular architecture for mechanism design and implementation

Layering

Refers to the use of multiple, overlapping protection approaches addressing the people, technology, and operational aspects of information systems • The failure or circumvention of any individual protection approach will not leave the system unprotected

Deciphering/decryption

Restoring plaintext from ciphertext

2 types of operations used for transforming plaintext to ciphertex

ST = Substitution, Transposition

Cryptographic system/cipher

Scheme

Modification of messages

Some portion of a legitimate message is altered, or messages are delayed or reordered to produce an unauthorized effect

What is a high-impact security breach?

The loss could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals

Access control

The prevention of unauthorized use of a resource (i.e., this service controls who can have access to a resource, under what conditions access can occur, and what those accessing the resource are allowed to do).

What is a security mechanism

The process (or a device incorporating such a process) that is designed to detect, prevent, or recover from a security attack

Connection confidentiality

The protection of all user data on a connection

Data Confidentiality

The protection of transmitted data from passive attacks Broadest service protects all user data transmitted between two users over a period of time Narrower forms of service includes the protection of a single message or even specific fields within a message • The protection of traffic flow from analysis This requires that an attacker not be able to observe the source and destination, frequency, length, or other characteristics of the traffic on a communications facility

Peer Entity Authentication

Used in association with a logical connection to provide confidence in t5he identity of the entities connected.

Computer security is too often __

an afterthought

Authentication is concerned with...

assuring that a communication is authentic -In the case of a single message, assures the recipient that the message is from the source that it claims to be from -In the case of ongoing interaction, assures the two entities are authentic and that the connection is not interfered with in such a way that a third party can masquerade as one of the two legitimate parties

Active attack

attempts to alter system resources or affect their operation

Passive attack

attempts to learn or make use of information from the system but does not affect system resources

Security is essentially a ___

battle of wits between a perpetrator and designer

Security requires ___ monitoring

constant

A security services is intended to

counter security attacks, and they make use of one or more security mechanisms to provide the service

Strong security is often viewed as an impediment to ___

efficient and user-friendly operation

A connectionless integrity service, one that deals with individual messages without regard to any larger context,

generally provides protection against message modification only

What does network and internet security consist of?

measures to deter, prevent, detect, and correct security violations that involve the transmission of information

Connection-oriented integrity services that deal with a strewam of messages assures

messages are received as sent with no duplication, insertion, modification, reordering, or replays

Potential attacks on the security features ________

need to be considered

Procedures used to provide particular services are ____

often counter-intuitive

Security mechanisms typically involve more than a ___

particular algorithm or protocol

Little benefit from security investment is ____

perceived until a security failure occurs

Security is not __

simple

Define Computer Security

the protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability and confidentiality of information system resources" (includes hardware, software, firmware, information/data, and telecommunications)

Data integrity can apply

to a stream of messages, single message, or selected fields w/n message

It is necessary to decide where to use the _____

various security mechanisms


Related study sets

Commercial Bank Management, Exam 1

View Set

Salesforce Sharing and Visability

View Set

14 stress, lifestyle, and health

View Set

Nursing Application: Antidiarrheals

View Set

Ethics and values ch.22 review questions

View Set

Lab Simulation 10-2: Use Windows Defender Firewall to Block Specific Connections: Network+

View Set

Chapter 28: The Child with Hematologic or Immunologic Dysfunction

View Set

MANA3335 MindTap Learn It: Chapter 12: Communication in Organizations

View Set