GMU IT 223 Exam 2 (Lecture 5-9)

0.0(0)
studied byStudied by 2 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/114

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

115 Terms

1
New cards

What is access control?

authorized entities can use a system when they need to.

2
New cards

How is policy related to access control?

Policy driven control of access to systems, data, and dialogues. Examples of access control include barriers, passwords, and bio-metrics.

3
New cards

What is the role of authentication

in access control?

Verification (or not) of an individual's claim (usually of identity).

4
New cards

What is the role of authorization in access control?

An entity (via his/her/its identity) is given certain permissions to access particular resources.

5
New cards

What is the role of auditing in access control?

After-the-fact analysis of data collected about an individual's activities

6
New cards

What are 4 different ways to authenticate a claim of identity? Can you give an example of each?

- What you know - a password for an account

- What you have - a door key, a smart card

- Who you are - fingerprint

- What you do - how you pronounce a passphrase

7
New cards

What is multi-factor authentication? Why is it useful?

Role Based Access Control (RBAC). Lessens number of opportunities for errors

8
New cards

How does MFA impact the probability of a false negative result?

Increases probability of false negative

9
New cards

How does MFA impact the probability of a false positive result?

Decreases probability of false positive

10
New cards

What is mandatory access control?

Strict access control barriers to gain Entry, no variation allowed.

11
New cards

What is discretionary access control?

A department can decide what access to allow for each individual.

12
New cards

How does a multi-level security (MLS) system work?

Classified information requires complex layers of control that far exceed basic clearance granting and badge granting policies. On a NTK (Need to Know) access

13
New cards

Can you give examples of common policy requirements for physical security?

CCTV, wireless cameras, preventing dumpster diving, PC locking when leaving desk.

14
New cards

Why is it important to consider utilities?

Electricity, water, HVAC must be supplied to adequate level, inspected and tested regularly. Also, backup generator.

15
New cards

What are important issues to remember when disposing of computer equipment?

Ensure data destruction, keeping records of decommissioned equipment, minimize environmental liabilities, and choosing the right vendors

16
New cards

What is the role of a password in access control?

allows you to restrict access to vital password information on a "need to know" basis. The most common form is "role-based access control" which allows you to assign broad roles (with a set of password permissions) and then assign users to those roles.

17
New cards

Can you give examples of common policy requirements for passwords?

Changing passwords on regular intervals, not changing the password to something you've had before, at least 8 characters long, at least one change of case, at least one digit, at least one special character, and not at the end of the password.

18
New cards

How do users sometimes misuse passwords?

Sharing passwords or accounts and reusing passwords on different systems and sites.

19
New cards

Can you give examples of physical devices used in access control?

In Cabling Security, wiring has to be sufficiently hidden from tapping capabilities, or accidental cutting. Wiring closets locked and monitored.

20
New cards

What is the most important issue when using physical devices in this way?

Loss and Theft are common. 2 Factor authentication eases loss or theft.

21
New cards

What does "bio-metrics" mean literally? in the I.T. context?

based on something you are (your fingerprint, iris pattern, face, hand geometry, etc.) or something you do (write, type, walk, etc.). The major promise of bio-metrics is to make reusable passwords obsolete.

The process by which a person's unique physical and other traits are detected and recorded by an electronic device or system as a means of confirming identity.

22
New cards

Can you give examples of common bio-metric technologies?

Fingerprint recognition, iris scanning, and face recognition

23
New cards

What are two important parts of the bio-metric process that are never perfect?

Overly exact matches cause false rejections. Too loose a matching index will cause false acceptances.

24
New cards

What is a false acceptance rate (FAR)?

Match to a template that should not be made.

25
New cards

What is a false rejection rate (FRR)?

rate of false acceptances as a percentage of total access attempts

26
New cards

What are three different purposes for which bio-metric are commonly used?

Verification, supplicant is compared to table entry or template.

Identification, situation where the supplicant does not state his or her identity door access.

27
New cards

What are ways in which a bio-metric process can fail?

Error, when subject is not trying to fool system. Deception, subject hides face from cameras, uses an impersonation of finger print. Unavailability.

28
New cards

How can a cryptographic process support authentication?

HMACs, M.S.CHAP, and Digital Signatures.

29
New cards

What service/s can it provide?

HMACs provide key hashed message authentication codes which are Fast and inexpensive.

M.S. CHAP Windows using passwords for initial authentication.

Digital Signatures with digital certificates are extremely strong but slow, also good for initial authentication.

30
New cards

What is a PKI?

is a collection of software, standards, and policies that are combined to allow users from the Internet or other unsecured public networks to securely exchange data.

31
New cards

What are the components of a PKI?

components include digital certificates, certificate revocation lists, and certification authorities.

32
New cards

What is a PKI's purpose?

Using public key authentication with digital certificates requires the organization to establish a public key infrastructure (PKI) to create and manage public key-private key pairs and digital certificates.

33
New cards

How might an attacker compromise a PKI?

If an impostor can deceive the provisioning authority, the system breaks down (if given credentials, there is no effective technology access control).

34
New cards

What is a very important issue related to enrolling users in an authentication process?

Unless individuals are carefully vetted before being allowed access to the system, impostors can simply enroll through social engineering.

35
New cards

How does the principle of least permissions relate to authorization?

that each person should only get the permissions that he or she absolutely needs to do his or her job. It results in systems failing safely

36
New cards

What is the purpose of auditing?

Database administrators use this to collect information about users' interactions with databases. Auditing provides administrators with the means of detecting noncompliance with established security policies.

37
New cards

What is federated identity management?

the centralized policy-based management of all information required for access to corporate systems by a person, machine, program, or other resources. Used between two companies or organizations.

38
New cards

Site and Facility physical security principles

Path Dependency

Voice, Data, Video, Power, etc....should be on different, physically disparate paths

Heating, Cooling, Power Generation

Fire suppression

Lighting

Emergencies...

39
New cards

Site selection

- Political situation

- Geographic situation

- Vulnerabilities

40
New cards

Design and implement physical security

Fencing; lighting; locks; construction materials; mantraps; dogs and guards.

Focus on Functional Order -

Deterrence, Denial, Detection, Delay

41
New cards

Equipment failure

Guarantee availability of resources, and

integrity of data in those resources

• Replacement plans - vendor levels of

support, etc.

• Replace aging hardware

- MTTF mean time to failure

- MTTR mean time to repair

42
New cards

Wiring closets

never use as general storage; keep clean and organized, no flammables

43
New cards

Server rooms

One hour minimum fire rating

Halogen / CO2 systems

Cooled adequately

Raised floors

DRPs (later on semester will visit again)

44
New cards

Media storage facilities

Locked

Managed

Check-in/Check-out process - controlled

Sanitization for reusables

Evidence Storage

Dedicated - separate from production networks

Keep system offline, and disconnected from internet

45
New cards

Evidence storage

Likely to involve the following:

A dedicated storage system distinct from the production network. Potentially keeping the storage system offline when not actively having new datasets transferred to it

46
New cards

Restricted and work area security/op-centers

Special cases

Not equal access to all locations

Server rooms, strictly controlled

Concentric Circles of protection

Shoulder surfing prevention

RFID?

Escorted access

47
New cards

Data centers

smartcard, proximity reader

48
New cards

Utilities and HVAC

Fault - momentary loss of power

Blackout - complete loss of power

Sag - momentary low voltage

Brownout - prolonged low voltage

Spike - momentary high voltage

Surge - prolonged high voltage

Inrush - initial surge of power - when first connecting

Noise - a steady interfering disturbance or fluctuation

Transient - a short duration of line noise disturbance

Clean - non-fluctuating pure power

Ground - wire that grounds a circuit

49
New cards

fire prevention/detection/suppression

starts as smoke and then becomes flames and becomes hot overtime.

water suppresses temp.

soda acid and dry powders suppress fuel supply

50
New cards

perimeter

fences, gates, man traps

51
New cards

Describe the science of digital forensics

defined as the use of scientifically derived and proven methods toward the preservations, collection, validation, identification,

analysis, interpretation, documentation, and presentation of digital evidence for the purpose of facilitating or furthering the reconstruction of

events found to be criminal or helping to anticipate unauthorized actions shown to be disruptive to planned operations."

52
New cards

Categorize the different communities and areas within digital forensics

Law Enforcement, Military IW Operations, Business & Industry

Media Analysis - Examining physical media's content for evidence.

Code Analysis - Review of software for malicious signatures. i.e. grep

Network Analysis - Scrutinize network traffic and logs to identify and locate.

53
New cards

Explain where computer forensics fits into DFS

analysis of data stored on or retrieved from computer storage media in such a way that the

information can be used as evidence in a court of law.

54
New cards

Describe criminalistics as it relates to the investigative process

The application of science to those criminal and

civil laws that are enforced by police agencies in a

criminal justice system

55
New cards

Discuss the 3 A's of the computer forensics methodology

• Acquire the evidence without altering or damaging the original.

• Authenticate the image.

• Analyze the data without modifying it.

56
New cards

Critically analyze the emerging area of cyber-criminalistics

Different from other forensic sciences as the media that is examined and the tools/techniques for the

examiner are products of a market-driven private

sector

57
New cards

Explain the holistic approach to cyber-forensics.

A holistic and risk-based approach to cyber-security ultimately ensures that your entire organization is capable of detection, prevention, and correction of cyber-security threats and vulnerabilities.

58
New cards

What are the origins of the word "cryptography"?

The word "cryptography" comes from Latinized Greek roots crypto meaning "hidden" or "private" and meaning "writing".

59
New cards

What is cryptography?

the transformation of meaningful data into something else and perhaps vice versa

60
New cards

What is cryptanalysis?

described as the process of defeating cryptographic systems.

61
New cards

What is plaintext?

Meaningful original data

62
New cards

What is ciphertext?

meaningless Encrypted data

63
New cards

What is a code? How is it different from a cipher?

A code is a system for representing data using a set of symbols.

Cipher is a process for concealing the meaning of a message.

64
New cards

What is encryption?

a process that converts plaintext into (hopefully) meaningless data called ciphertext.

65
New cards

What is decryption?

a process that converts ciphertext back into the original plaintext.

66
New cards

What is a key?

Encryption process is varied by incorporating a data value called a key.

67
New cards

What is symmetric cryptography? Why is it called "symmetric"?

the decryption process is the equal and opposite of the encryption process, meaning it uses the inverse operations in the reverse sequence for each cycle of decryption.

68
New cards

What key/s is/are used in symmetric cryptography?

the same key is used in encryption and decryption.

69
New cards

What is a challenge in symmetric cryptography?

Sharing the key is a challenge in symmetric cryptography.

70
New cards

What services can symmetric cryptography provide?

Confidentiality, Authentication of origin, Authentication of integrity

71
New cards

What is asymmetric cryptography? Why is it called "asymmetric"?

the decryption process is NOT the equal and opposite of the encryption process, meaning it does NOT use the inverse operations in the reverse sequence in each cycle of decryption.

72
New cards

What key/s is/are used in asymmetric cryptography?

encryption and decryption are the same operation but two different keys are used.

73
New cards

What is a challenge in asymmetric cryptography?

Authenticating someone else's public key is a challenge.

74
New cards

What services can asymmetric cryptography provide?

Confidentiality, Authentication of origin, Non-repudiation

75
New cards

Is there a significant difference in performance between modern symmetric and asymmetric algorithms?

Modern symmetric algorithms are typically used with keys of moderate length (e.g. 128 bits) and perform a sequence of very simple operations a small number of times. (FAST)

Modern asymmetric algorithms are typically used with very long keys (e.g. 2048 bits) and perform very CPU-intensive calculations. (SLOW)

76
New cards

How can asymmetric and symmetric algorithms be used together?

a one-time key value (called a "session key") is encrypted asymmetrically with a recipient's public key and a data set is encrypted symmetrically with that key value.

77
New cards

What is a substitution cipher? Can you give examples of substitution operations?

involves replacing a data value with another according to some rule(fixed replacement, variable replacement, table lookup, math, boolean)

78
New cards

What is a transposition cipher? Can you give examples of transposition operations?

involves rearranging the sequence of a set of values without altering each one (other than its place in the sequence)(swaps, rotations, shifts)

79
New cards

What is a product cipher?

uses both substitution and transposition operations.

80
New cards

What is a brute force attack?

involves trying every possible key value to decrypt intercepted ciphertext until the output seems to be valid plaintext.

81
New cards

What is a dictionary attack?

Remembering a long sequence of pseudo-random characters is impractical for almost all of us, especially if it changes often.

82
New cards

How might statistical analysis be useful in cryptanalysis?

This involves attempting to find non-random "patterns" in intercepted ciphertext that might reveal the plaintext

83
New cards

What is side-channel analysis?

This involves measuring some side-effect of the encryption/decryption in an attempt to learn some or all of the bits in the key

84
New cards

How might public data be useful in cryptanalysis?

This involves attempting to learn private data by analyzing public data related to it

85
New cards

If large-scale quantum computing becomes feasible how might it affect information security?

At present this is theoretical. It has been suggested that a big enough quantum computer could break solve of the "too big" problems that non-quantum computing can't solve in practical time.

86
New cards

What is social engineering

The practice of tricking people into giving private info or allow unsafe programs into the network.

87
New cards

What is a public communications channel? Can you give examples?

A channel anyone can listen in to. An example of this is a police scanner.

88
New cards

What types of attack are possible over a public communications channel?

MITM, eavesdropping.

89
New cards

Which information security service/s could encryption/decryption provide?

Origin and integrity.

90
New cards

Which key/s are used in asymmetric encryption/decryption?

Private and Public key. the owner contains the private key.

91
New cards

Which key/s are used in symmetric encryption/decryption?

Uses the same key to encrypt and decrypt

92
New cards

Which information security service/s might each attack violate?

All 6 of them

93
New cards

How can authentication of the origin of a message be enabled?

by a recipient the sender of a message must add some data that a recipient can check and that an attacker could not have created correctly.

94
New cards

What is/are the inputs to a MAC function? What is the output?

Message and key. Value has no apparent relationship with the message nor the key

- appears to be random.

95
New cards

What makes the output pseudo-random?

Properties of Symmetric encryption algorithm.

96
New cards

What is a collision onto a MAC value? Why is it very unlikely?

Two different MAC addresses produce the same key.

97
New cards

What does the recipient of a message and a MAC do with them? Why?

Checks to see of the MAC's match up. This is to tell if the message was interfered with or intercepted. She authenticates the integrity of the message.

98
New cards

What does it mean if the recipient's locally generated MAC is identical to the received MAC?

A collision has most likely not occurred.

99
New cards

How can an encryption algorithm be used in a MAC function?

When an algorithm is used in a Mac function only the "forward cipher" (the encryption part) is used.

100
New cards

What is/are the inputs to a hash function? What is the output?

A message. Appears to be random. Outputs a fixed-length value.