security 2/total

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/123

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 8:59 PM on 5/13/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

124 Terms

1
New cards

host in terms of network

catchall for network-connected devices

2
New cards

probability of an attacker getting the answer in the split X_0 and X_1 password thing

(1/2)^n

3
New cards

multilevel security MLS

unclassified

confidential

secret

top secret

goal: information flow between lecels

4
New cards

Bell-LaPadula BLP

focus on confidentiality

no read up, no write down

prevent secret information from leaking downward

5
New cards

Biba model

focus on integrity

no read down, no write up

prevent untrusted/dirty data from contaminating trusted data

6
New cards

purpose of the network

transfer data between hosts

7
New cards

where do hosts live

at the edge

8
New cards

what is the core of a network

interconnected mesh of routers

9
New cards

purpose of the network core

route data through network from host to host

10
New cards

security protocols

communication rules followed in security applications

11
New cards

authentication protocol conclusions

  • repeating a non-mutual auth protocol doesn’t need to be secure for mutual auth

  • protocols and attacks on protocols can be subtle

  • obvious changes to protocols can cause unexpected security issues

12
New cards

conclusions about mutual authentication protocol

  • having two sides in a protocol do the same thing can leave you open to an attack

  • “insignificant” changes to a protocol can result in big changes in security

13
New cards

why are session keys needed for authentication

  • encrypt data within each session

  • limit data encrypted with any one particular key

  • limit dmg if one session key is compromised

14
New cards

what CIA do session keys provide to messages

confidentiality or integrity (or both)

15
New cards

session key public key auth protocol

alice sends identification and R

bob sends {R,K}_(alice)

alice sends {R+1,K}_(bob)

16
New cards

session key signing auth protocol

alice sends identification and R

bob sends [R,K]_(bob)

alice sends [R+1,K]_(alice)

17
New cards

difference between public key and signing when using session keys for auth protocol

signing provides mutual authentication

18
New cards

what benefit do you get from encrypting first then signing?

mutual authentication and secure session key

19
New cards

perfect forward secrecy

using a session key K_S that you can forget easily for protection, if trudy gets a session key then it’s fine

20
New cards

what does perfect forward secrecy prevent

trudy from using the symmetric key (in the case she somehow gets access) to decrypt all the messages

21
New cards

advantage of timestamps over nonce

less messages

22
New cards

advantage of nonce over timestamp

time isn’t a security critical parameter

23
New cards

what is a salt and how is it used

random string of bits that’s hashed with a password and is stored along with the password for verification

24
New cards

why is salt useful when hashing passwords

makes forward search attack more difficult

25
New cards

in high security environment is it better to use weak methods to prevent covert channels or do nothing

it’s better to use them since it’s not a burden to implement and it makes trudy’s job more difficult

26
New cards

is it better to use weak inference control or do nothing

it’s better to use it because it’s not hard to implement and again still makes trudy’s job harder

27
New cards

is it better to use a weak cryptosystem or do nothing at all

DO NOT USE THE WEAK CIPHER, encryption implies the data is important so it will be filtered out for further investigation

28
New cards

capabilities (c-lists) in lampson’s access control matrix

rows attached to/based on subject, what files/resources can this user/process use

29
New cards

access control lists (ACLs) in lampson’s access control matrix

columns attached to/based on object, who can read/write to this file

30
New cards

differences between authentication problem and identification problem

  • authentication is 1-to-1 comparison, identification is 1-to-many

  • auth has cooperative subjects, id maybe have uncooperative subjects

31
New cards

which is easier, authentication or identification?

authentication because it’s 1-to-1 rather than 1-to-many, so there is less chance of error

32
New cards

which layer of protocol stack does packet filter operate

network

33
New cards

which layer of protocol stack does stateful packet filter operate

transport

34
New cards

which layer of protocol stack does application proxy operate

application

35
New cards

what is the point of stating identity in authentication protocol

so the busy server can know which key to use/who it’s communicating with

36
New cards

authentication asks

are you who you say you are

37
New cards

authorization asks

are you allowed to do that?

38
New cards

human-to-machine authentication is based on one of 3

  • something you know

  • something you have

  • something you are

39
New cards

why do we keep using passwords despite being weak

cheap, easy to manage and reset

40
New cards

which remembers, stateful or stateless?

stateful

41
New cards

attack on stateful

DNS attack because it keeps sending to the server to make it use up more memory, DoS

42
New cards

attack on stateless

ARP cache poisoning, trudy can be the man in the middle

43
New cards

confused deputy

alice has lower privileges than the compiler

she can send a command that confuses the compiler to use its own privileges to overwrite/delete the file

44
New cards

64 possible choices for each character

password must be 16 char, if longer its cut, if shorter it’s padded with “A” until it’s 16 long

it’s split into two parts X_0 and X_1

X_0 is the first 8 and X_1 is the last 8

compute and store Y_0 = h(X_0) and Y_1 = h(X_1)

what is the work for an exhaustive search to recover one specific password

64^8 + 64^8 / 2

rewrite it to 64 ^8 * 2 / 2

The 2's cancel out 64^8

(Rewrite 64 to power of 2 so 2^6) 2^6 * 8

= 2^48

45
New cards

best way to store passwords

hash of the password (especially with salt)

46
New cards

biometrics

something you are

47
New cards

ideal biometrics

universal, distinguishing, permanent, collectable

48
New cards

enrollment

first careful recording of the biometric into the system

49
New cards

recognition

later checking the user during actual use

50
New cards

why is enrollment quality important

bad enrollment weakens the system

51
New cards

fraud rate

attacker is wrongly accepted

52
New cards

insult rate

correct user is wrongly rejected

53
New cards

equal error rate

where fraud rate = insult rate

54
New cards

why does equal error rate matter

good way to compare different biometric systems, lower eer may be better

55
New cards

fingerprint biometrics

based on patterns and minutia, generally strong for authentication, widely used

56
New cards

hand geometry biometrics

measures hand/finger shape, fast and practical, not unique enough for strong identification but okay for authentication

57
New cards

iris scan biometrics

very accurate in theory, based on stable iris patterns, uses hamming distance to compare iris codes, can be attacked with a good photo unless there is a liveness check

58
New cards

biometrics vs passwords

  • can be better than pass but aren’t foolproof

  • can be spoofed

  • db can be attacked

  • compromised biometrics aren’t changed easily

59
New cards

2 factor authentication categories

any 2 group combo of what you know, have, or are

60
New cards

single sign-on SSO

authenticate once and that’s all the work for alice, rest of authentication online is done behind the scenes

61
New cards

web cookies

numerical value stored and managed by the browser, also stored by the website

62
New cards

use for cookies

index a database that retains info about the user

63
New cards

how do cookies work

cookie from the browser goes to the site, so it can access the database and remember info about alice, kind of like an SSO

64
New cards

if HTTP is stateless, how can a site maintain state within and across sessions

cookies

65
New cards

solution to the confused deputy problem

using capabilities

66
New cards

orange book TSEC

classify systems by security level, D (minimal) to A (verified), old certification system

67
New cards

whats used more ACL or c-list

ACL

68
New cards

general ACL facts

easy to implement, weak to confused deputy, easy to add privileges (object based)

69
New cards

general c-list facts

easy to add and delete users (subject based), protective against confused deputy, easier to delegate authority

70
New cards

forward search attack

trudy precomputes hashes of common passwords and compares the hashes

71
New cards

best way to get perfect forward secrecy

using diffie hellman

K_S = g^{ab} mod p

where a and b are secret numbers for alice and bob that they need to forget after

ex: alice sends E(g^a mod p, K_{AB})

72
New cards

common criteria

EAL 1 to EAL 7, higher EAL not necessarily more secure in practice, new certification system

73
New cards

common EAL

EAL 4

74
New cards

core classic model

rows = subjects (users/processes)

columns = objects (files/resources)

each entry says what access rights a subject has to an object

75
New cards

compartments enforce what

need to know basis beyond just your level, restriction layer on top of MLS

76
New cards

covert channels

transfer info using a path not intended for communication, bypass normal authorization rules, important in multilevel systems

77
New cards

problem caused by covert channels

even if normal security rules are enforced, info may still leak through unintended means

78
New cards

inference control

protect sensitive info in databases/statistical systems, but safe looking answers can leak sensitive info indirectly

79
New cards

problem caused by inference control

user might not be allowed to see secret data directly but may later infer it from allowed queries or statistics

80
New cards

why you hash passwords rather than encrypt the file with a symmetric cipher

if trudy can get the password file then she can get the symmetric key, hashes are one-way

81
New cards

granularity

level we apply our security labels

82
New cards

fine

too loosely, giving too much info for inference

83
New cards

coarse

too heavily, classifying unnecessary low level info

84
New cards

CAPTCHA

allows humans, blocks bots

85
New cards

why is CAPTCHA kerckhoffs-like

attackers know the system but each random instance is unknown

86
New cards

how do bots beat CAPTCHA

paying humans, or lately they figure out letters through the letter borders

87
New cards

classifications apply to

objects

88
New cards

clearances apply to

humans

89
New cards

application layer

HTTP, SMTP, FTP

90
New cards

transport layer

TCP and UDP

91
New cards

network layer

IP and routing

92
New cards

link layer

ethernet and PPP

93
New cards

the last layer (not application)

physical layer

94
New cards

encapsulation

each layer adds its own header around the data, application data is wrapped again and again as it moves down the stack, real application data stays inside

95
New cards

HTTP client server model

client speaks first, server responds

96
New cards

SMTP and spoofed email

smtp sends email from sender to recipient mail server

commands are human-readable

spoofed emails possible bc of SMTP

97
New cards

DNS

maps names like websites to IP

distributed and hierarchical

98
New cards

why are root dns servers attractive attack targets

they are critical

99
New cards

TCP

reliable delivery

packets arrive in order

flow control

tries to help with congestion control

connection oriented

100
New cards

TCP 3 way handshake

SYN

SYN-ACK

ACK

makes DoS possible through “half-open” connections