same symmetric key, one user has public and private key
* n \* (n-1)/2 = number of keys * unlimited key size * slower algo
32
New cards
MITM
intercepts and substitutes a return address meant for the other person
33
New cards
Hash Codes/Checksum/Message Digest
computed with every change of the message to detect if the message was tampered with
* SHS/SHA algorithm to compute
34
New cards
Digital Signatures
authentic/unforgeable and not alterable or reusable
* public key cryptography + message digest * Need: file, proof of non alteration (hash), identification of signer (private key), validation, connection of signature to file
35
New cards
Certificate
public key + identity and signed by certificate authority
36
New cards
certificate authority
who accurately verifies identities before generating certificates
37
New cards
Buffer Overflow
When data is written beyond the space allocated for it
38
New cards
Command Injection
User input intended to be data is instead interpreted as a command
39
New cards
cross site scripting
Unique to web-based applications where a user's data tied to a vulnerable web server (e.g. a cookie) is disclosed to a malicious third party - command injection with html and get requests
40
New cards
Format String Problems
a string that formats data for display or storage - not specificied and allows attacker to read from or write to specific memory location
41
New cards
Integer Range Errors
arithmetic operation creates a value too large to be stored
42
New cards
SQL Injection
Using an input as a SQL command to get information from the dataset
43
New cards
Trusting Network Name Resolution
Resolution of website names to IP addresses, usually through Domain Name System (DNS)
44
New cards
Failing to Protect Network Traffic
Network attacks can come in many forms • Eavesdropping - Listening and/or recording conversations • Replay - Replaying information such as providing authentication information • Spoofing - Mimicking a party • Tampering - Manipulating data • Hijacking - Cutting out one of the parties
45
New cards
Failing to store and protect data
Protected data in the system not in transit, ACLs, privileges, allow vs. deny
46
New cards
Weak Random Numbers
improper seeding to create predictable seeds and numbers - throws off crypto algos
47
New cards
Improper File Access
Three types of errors: • A race condition where a window of vulnerability is exploited between Time Of Check and the Time Of Use (TOCTOU • Opening a file without regard for the nature of the file; it could actually be a simlink placed by an attacker • Giving attackers some control of filenames so they can updated and access sensitive information
48
New cards
Improper Use of SSL and TLS
server authentication performed poorly using public key infrastructure through ssl and tls
49
New cards
Use of weak password based systems
not using social engineering, side channel problems
50
New cards
Unauthenticated key exchange
man in the middle attack
51
New cards
Signal Race Conditions
two executions are changing a resources and interfering with each other
52
New cards
Use of magic URLS and hidden forms
urls storing important data
53
New cards
Failure to handle errors
failing securely
54
New cards
Poor usability
presenting security info to users, not being simple and clear
55
New cards
Information leakages
side channels, timing ang storage providing too much info .
56
New cards
3 Types of Malware
virus, worm, trojan horse
57
New cards
transient virus
has a life span dependent on its host program
58
New cards
resident virus
resides in memory and can run as a standalone program
59
New cards
virus
program that can replicate itself and pass on malicious code by modifying other programs
60
New cards
worm
A program that spreads copies of itself through a network
61
New cards
trojan horse
program with no apparent effect but second hidden effect
62
New cards
Zero-Day Attacks
active malware that exploits a product vulnerability where the software provider has no countermeasure available or has not been implemented
63
New cards
Four Aspects (Properties) of Malicious Code
Harm (How they affect users and systems), Transmission and Propagation (How they are transmitted and replicated), Activation (How they gain control and install themselves so they can reactivate), Stealth (How they avoid detection)
64
New cards
3 Types of Harm
Nondestructive, Destructive, Commercial or criminal intent
65
New cards
Man-in-the-Browser
Trojan horse, reads, copies and redirects data when user enters browser; attack on a browser
66
New cards
Keystroke-logger
hardware or software recording keystrokes (malware)
67
New cards
Page-in-the-middle
directed to a different page than intended; attack on a website.
68
New cards
Program download substitution
page with programs to download, installs malware
69
New cards
User-in-the-middle
clickbait to trick users into solving captcha’s
70
New cards
Substitute Content (malicious)
type of malicous web content that replaces parts of a web site with malicious intent in a way that doesn’t attract attention.
71
New cards
Web Bug
similar to cookies to send data to web bug owner
72
New cards
Clickjacking
pop-up adds that have the user click on them
73
New cards
Drive-By Download
code downloaded without user knowing, through clickjacking, fake code, program download substitution
74
New cards
OS Loading
BIOS, Bootstrap
75
New cards
Virtualization
OS presents each user with just the resources that user should see
76
New cards
Fence
Confine a user to one side of a boundary
77
New cards
Separation and Sharing
keeping one user’s objects seperate from another user. physical, temporal, logical, cryptographic
78
New cards
Base Registers
identify the starting address for a program
79
New cards
Bounds register
upper bound if necessary to manage allocation of memory - prevents programs from overwriting code
80
New cards
Paged Segementation
dividing programs into logical segments and physically storing them in fixed size pages
81
New cards
Rootkits
taking advange of identity of the most powerful user, owning all sensitive system resources - part of the os
82
New cards
OSI Model (Open System Interconnection)
APSTNDP → how senders and receivers process messages
83
New cards
Dos Attacks
Denial of Service → targets availability through high, rapid attacks → ping of death, smurf attack (echo request), echo-chargen (looping echo packet), teardrop attack(inconsistent fragments), dns spoofing, rerouting routing (all traffic one node), session hijacking (src address change)
84
New cards
Botnets
isolates attacker from attacks, continuous attacks from an hierarchy
85
New cards
WEP
client and access points have a pre-shared key → encrypts a key, AP decrypts and client is authenticated
86
New cards
SSL Session
request on SSL session with a server, responds with a public key cert, returns a symmetric session key encrypted server’s public key
87
New cards
Onion Routing
knows immediate/last sender, next recipient
88
New cards
Packet Filtering Gateway
examines the control information of every packet - src, dest,
89
New cards
Stateful Inspection Firewall
judges multiple packets (ping to multiple ports)
90
New cards
Application Proxy
looks at messages (app layer) and runs pseudo-apps to inspect
91
New cards
Circuit-Level Gateway
one network is extension of another through virtual gateway - establishes vpns through circuits
92
New cards
Guard
interprets data and responds - implements rules (emails, bandwidth, filters docs)
93
New cards
Personal Firewalls
enforces set policies and works with other firewalls
94
New cards
DMZ
containing firewall, web page, email, ftp services
security assertion markup language web browser single sign on to exchange user identity and privileged information - authentication standard → browsers
97
New cards
OAuth
allows 3rd party apps to access API’s and account resources → native apps
98
New cards
OIDC
single set of credentials for all internet sites - better support for native apps + identity token; requires TLS
99
New cards
Copyrights
* expression of ideas * made public to promote publication * requirement to distribute * 75-100 years
\
100
New cards
Patent
* invention * made public for design at patent office * 19 years