CSE 4380 Exam 1 (2)

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/48

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 12:36 AM on 3/25/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

49 Terms

1
New cards

User Authentication

-The process of verifying an identity claimed by or for a system entity

-Fundamental building block and first line of defense

2
New cards

Steps of authentication

Identification and Verification

3
New cards

Problems with various forms of authentication

-Password can be stolen

-Tokens could be stolen or forged

-A lot of overhead for managing passwords and tokens

4
New cards

Password Authentication

- widely used line of defense against intruders

> user provides name/login and password

> system compares password with the one stored for that specified login

- the user ID:

> determines that the user is authorized to access the system

> determines the user's privileges

> is used in discretionary access control

5
New cards

Password Vulnerabilities

Offline dictionary attack (System Files)

Specific account attack

Popular password attack

Password guessing against a single user

Workstation hijacking

Exploiting user mistakes

Exploiting multiple password use

Electronic monitoring

6
New cards

Password Vulnerability Countermeasures

-Enforcing password policies

-System logon protocols

-Etc.

7
New cards

Hashed Passwords with Salt Value

-Password is combined with a fixed-length salt value to make attacks harder

-MD5 and Bcrypt are common hash/salt schemes used

8
New cards

Advantages of salt value

-Without salt, attacker can pre-compute hashes of all common passwords once

-With salt, attacker must compute hashes of all common passwords for each possible salt value.

9
New cards

Password Cracking

-Dictionary Attacks

-Rainbow Table Attacks(Not feasible with larger salt values)

-Custom GPU Hardware and cloud-based cracking tools exist

10
New cards

Multi-Factor Authentication

-A method of confirming users claimed identities by using a combination of two or more different factors

11
New cards

Remote User authentication

- Authentication over a network, the Internet, or a communications link is more complex

- Additional security threats such as:

eavesdropping, capturing a password, replaying an

authentication sequence that has been observed

12
New cards

Authentication Security Issues

-Client Attacks

-Host Attacks

-Eavesdropping, Theft, copying

-Replay(Repeats previous user response)

-Mitigated with longer unpredictable passwords and multi factor authentication.

13
New cards

Access Control

-Constraints what a user can do directly as well as what programs executing on behalf of the users are allowed to do.

-Coexists with identification and verification

14
New cards

Access Control Elements

subject, object, and access right

15
New cards

Discretionary Access Control (DAC)

-User oriented security policy

-Entity has rights to enable another entity to access a resource

-Uses a control matrix, which has subjects for rows and objects for columns

16
New cards

Access Control List (ACL)

-Access rights stored with objects

-ACL can contrain default entries

-Elements of ACL include individuals and groups

-Linked list with each node containing the subject and the access rights for each object

-ACL requires authentication

-Used in UNIX and Windows

17
New cards

Capability List

- The subject is stored with the access right for each subject.

- A linked list where each node is an object and access right and the head is the subject

18
New cards

DAC Security Issues

It is prone to trojan horse attacks to grant an attacker privileges

19
New cards

Role-Based Access Control (RBAC)

-Access control based on employee job functions rather than data ownership since company owns objects.

-Based on roles users assume in organization

20
New cards

Role

Represents users and defines permissions

21
New cards

Security Management with RBAC

-User-role relationship changes over time

-Roles are likely to be static

-Role Permissions relatively stable

22
New cards

Advantages of RBAC

-Authorization management (Easy revocation of rights)

-Hierarchal roles

-Least Privilege

-Separation of duties

23
New cards

Attribute-based access control (ABAC)

This is an access control paradigm whereby access rights are granted to users with policies that combine attributes together.

24
New cards

Subject Attributes

-A subject is an active entity that causes

information to flow among objects

- Attributes define the identity and characteristics of the

subject

25
New cards

Object Attributes

-Information system-related entity containing or receiving information

-Can make access control decisions

26
New cards

Environment Attribues

-Describes operation or technical environment in which information access occurs

27
New cards

ABAC Logical access control model

-Relies on evaluation of attributes of subject and object

-Can enforce any access control rule

28
New cards

ABAC Policies

Set of rules and relationships that govern allowable behavior within an organization, based on privileges of subjects

29
New cards

Intrusion

A security event, in which an intruder gains or attempts to gain access to a system

30
New cards

Anomaly Detection

Current observed behavior is analyzed to determine whether this behavior is that of a legitimate user or that of an intruder

31
New cards

Signature/Heuristic Detection

Uses a set of known malicious data patterns or attack rules that are compared with current behavior. Also known as misuse detection. Can only identify known attacks for which it has patterns or rules.

32
New cards

Signature Detection (Misuse Detection)

-IDS uses attack signatures to detect intrusion

-Signatures are events that describe a known attack

-Attacks of the same kind show the same patterns

33
New cards

Signature Detection (Misuse Detection) Advantages

Very good at detecting attacks without creating false alarms

34
New cards

Signature Detection (Misuse Detection) Disadvantages

-Can only detect attacks they know of, so system must be constantly updated to detect new attacks

-Some misuse detection cannot detect variants of a certain attack

35
New cards

Anomaly Detection Advantages

-Can detect unusual behavior

-Can produce information used to identify attack signatures

36
New cards

Anomaly Detection Disadvantages

-Produce a large number of false alarms

-Require event records to identify normal behavior patterns

37
New cards

host-based intrusion detection system (HIDS)

-Adds specialized layer of security to vulnerable systems

-Can use anomaly or signature based approaches

-Monitors suspicious behavior (intrusions, suspicious events, sends alerts)

38
New cards

Network-Based Intrusion Detection System (NIDS)

-Deploying sensors at strategic locations

-Inspect network traffic and user activities

39
New cards

Network Based vs. Host Based

-Network based can detect intrusions that cross a network segment

-Host Based can examine log files and inbound/outbound packets

-In an organization it is best to use both.

40
New cards

Confusion Matrix

A matrix that has if an intrusion is made in the columns and if there was an alarm in the rows. The data in the matrix consists of if there were true positives or false alarms.

41
New cards

Firewall

Hardware and software that isolates an organizations internal network from the internet at large.

42
New cards

Need for firewalls

-Protecting LANs

-Establish a controlled link

-Used as perimeter defense

43
New cards

Firewall goals

-Traffic inside and outside the firewall must pass through it

-Only authorized traffic will be allowed to pass

44
New cards

Firewall Filter Characterisitcs

-IP Address

-Application protocol

-User identity

-Network Activity

45
New cards

packet-filtering firewall

- Applies rules to each incoming and outgoing IP packet

- Typically a list of rules based on matches in the IP or TCP header

- Forwards or discards the packet based on rules match

46
New cards

Packet Filter Advantages

-Simplicity

-Typically transparent to users and are very fast

47
New cards

Packet Filter Disadvantages

-Cannot prevent attacks that are application specific

-Limited logging functionality

-Does not support advanced user authentication

-Vulnerable to TCP/IP protocol bugs

-Improper configuration can lead to breaches

48
New cards

Stateful Inspection Firewall

-Tightens rules for TCP traffic by creating a directory of outbound TCP connections:

-There is an entry for each currently established connection.

-Reviews packet information but also records information about TCP connections

-Keeps track of TCP sequence numbers to prevent attacks that depend on the sequence number

-Inspects data for protocols like FTP, IM, and SIPS commands

49
New cards

Application level gateway

-Acts as a relay to application level traffic

-Must have proxy code for each application

-Tends to be more secure than packet filter

-Disadvantage is the additional processing and overhead.

Explore top flashcards

flashcards
Chapters 10 & 11 Test
56
Updated 1093d ago
0.0(0)
flashcards
AP Euro Unit 1+2 Anchors
39
Updated 160d ago
0.0(0)
flashcards
Intro to Cognitive Psychology
24
Updated 895d ago
0.0(0)
flashcards
Ch. 17 & 18 Vocabulary
37
Updated 1105d ago
0.0(0)
flashcards
COMPSCI 1210 ( COMP ORG)
116
Updated 1106d ago
0.0(0)
flashcards
Present Perfect
34
Updated 1086d ago
0.0(0)
flashcards
Chapters 10 & 11 Test
56
Updated 1093d ago
0.0(0)
flashcards
AP Euro Unit 1+2 Anchors
39
Updated 160d ago
0.0(0)
flashcards
Intro to Cognitive Psychology
24
Updated 895d ago
0.0(0)
flashcards
Ch. 17 & 18 Vocabulary
37
Updated 1105d ago
0.0(0)
flashcards
COMPSCI 1210 ( COMP ORG)
116
Updated 1106d ago
0.0(0)
flashcards
Present Perfect
34
Updated 1086d ago
0.0(0)