CSE 4380 Exam 1

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/86

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 1:06 AM on 3/25/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

87 Terms

1
New cards

Information Security

The protection of information from accidental or intentional misuse by persons inside or outside an organization

2
New cards

Key Security Concepts

Confidentiality, integrity, availability

3
New cards

Confidentiality

Assurance that confidential information is not disclosed to unauthorized individuals

4
New cards

Integrtiy

Assures that information and programs changes only in an authorized or specified manor. Maintains trustworthiness of the data.

5
New cards

Availability

Assures that data works promptly and service is not denied to authorized users.

6
New cards

Types of attacks

-Passive: Learn about the system

-Active: Attempt to alter system

-Insider: Initiated by someone inside security perimeter

-Outside: Initiated outside the perimeter

7
New cards

Attack surface

Consists of the reachable and exploitable vulnerabilities in a system (Network, Software, and Human Attack)

8
New cards

Countermeasures

Prevent, Detect, Recover

9
New cards

Cryptographic tools

-Symmetric Encryption (Confidentiality)

-Secure Hash Functions (Integrity)

-Asymmetric Encryption (Confidentiality & Integrity)

10
New cards

Symmetric Encryption

the same key is used to encode and decode

11
New cards

Block Ciphers

-encrypt data in blocks and most common symmetric encryption algorithms

-Good for when you are sending blocks of data such as email, file transfer, etc.

12
New cards

Data Encryption Standard (DES)

A symmetric block cipher that uses a 56-bit key and encrypts data in 64-bit blocks.

13
New cards

Triple DES

Repeats basic DES algorithm three times using either two or three unique keys, using a key size of 112 or 168 bits. More secure than DES but slower

14
New cards

Advanced Encryption Standard (AES)

A symmetric cipher that was approved by the NIST as a replacement for DES. Efficiency and security. Supports key lengths of 128 and 256 bits

15
New cards

Two requirements for secure use of symmetric encryption

-Need strong encryption algorithm

-Sender and receiver must have obtained copies of secret keys in a secure fashion

16
New cards

Cryptanalysis Attack

-Rely on nature of the algorithm and knowledge of the plain text

-If successful all future and past messages are jeopardized

17
New cards

Brute Force attack

An attack on passwords or encryption that tries every possible password or encryption key.

18
New cards

Average time required for exhaustive key search

AES takes more time than DES and triple DES

19
New cards

Stream Cipher

-An encryption method that encrypts a single bit at a time.

-Good for when data is sent over a communications channel such as a web links.

20
New cards

Stream Cipher vs Block Cipher

Stream Ciphers have higher throughput

21
New cards

Advantages of a block cipher

You can reuse keys

22
New cards

Message authentication

-Protects against active attacks

-Verifies received message is authentic

-Can use conventional encryption

23
New cards

Replay Attack

An attack where the data is captured and replayed. Attacker resends message since they have the hash and the receiver could potentially send information back.

24
New cards

Hash Function

Accepts a variable size message M as input and produces a fixed size message digest h= H(M) as output.

25
New cards

Hash Function Properties

-Applied to any size data

-H produces a fixed-length

-H(x) easy to compute for a given x

-One-way resistant (Infeasible to reverse hash)

-Weak collision resistance

-Strong Collision resistance (Prevents the same hash from being found)

26
New cards

Attacking Hash Functions

-Exploit weaknesses in algorithm

-Strength of hash code depends on length of code

27
New cards

Public Key Encryption

uses two keys: a public key that everyone can have and a private key for only the recipient

28
New cards

Misconceptions of Public Key Encryption

-Public Key is more secure from cryptanalysis attacks than symmetric encryption

-Public-Key has made symmetric encryption obsolete

-Key distribution is trivial

29
New cards

Public-Key for confidentiality

If someone sends a message using another person's public key, then only that person can decrypt the message using their private key.

30
New cards

Public-Key for Integrity and Authentication

If someone uses their private key to send a message to someone else. Then that other person can decrypt using the senders public key and verify that the message was sent from them.

31
New cards

Digital Signature

Asymmetric encryption of a hash of message

32
New cards

What is the purpose of a hash function in a digital signature?

Makes the signature faster to compute

33
New cards

Public key for both integrity and confidentiality

Sender encrypts hash using private key as the digital signature. Receiver decrypts message using their own private key. After decrypting the digital signature of the sender then if the result is equal to the hash function ,then integrity is validated.

34
New cards

Public Key Certificates

Used to validate if a public key belongs to a certain person. Certificate Authority is passed in a message.

35
New cards

Digital Envelope

a technique that uses symmetric encryption for large documents, but public key encryption to encrypt and send the symmetric key

36
New cards

RSA Encryption

The system used an algorithm that involves multiplying two large prime numbers to generate a public key, used to encrypt data and decrypt an authentication, and a private key, used to decrypt the data and encrypt an authentication.

37
New cards

What makes it hard for hackers to generate private key for RSA?

-Easy to compute modulus if chi(n) is known, but they do not have it

-If p and q are big enough then it is very hard to factorize n

38
New cards

Security of RSA

-Brute force attacks that try all possible keys

-Mathematical approach with figuring out the prime factorization

39
New cards

User Authentication

-The process of verifying an identity claimed by or for a system entity

-Fundamental building block and first line of defense

40
New cards

Steps of authentication

Identification and Verification

41
New cards

Problems with various forms of authentication

-Password can be stolen

-Tokens could be stolen or forged

-A lot of overhead for managing passwords and tokens

42
New cards

Password Authentication

- widely used line of defense against intruders

> user provides name/login and password

> system compares password with the one stored for that specified login

- the user ID:

> determines that the user is authorized to access the system

> determines the user's privileges

> is used in discretionary access control

43
New cards

Password Vulnerabilities

Offline dictionary attack (System Files)

Specific account attack

Popular password attack

Password guessing against a single user

Workstation hijacking

Exploiting user mistakes

Exploiting multiple password use

Electronic monitoring

44
New cards

Password Vulnerability Countermeasures

-Enforcing password policies

-System logon protocols

-Etc.

45
New cards

Hashed Passwords with Salt Value

-Password is combined with a fixed-length salt value to make attacks harder

-MD5 and Bcrypt are common hash/salt schemes used

46
New cards

Advantages of salt value

-Without salt, attacker can pre-compute hashes of all common passwords once

-With salt, attacker must compute hashes of all common passwords for each possible salt value.

47
New cards

Password Cracking

-Dictionary Attacks

-Rainbow Table Attacks(Not feasible with larger salt values)

-Custom GPU Hardware and cloud-based cracking tools exist

48
New cards

Multi-Factor Authentication

-A method of confirming users claimed identities by using a combination of two or more different factors

49
New cards

Remote User authentication

- Authentication over a network, the Internet, or a communications link is more complex

- Additional security threats such as:

eavesdropping, capturing a password, replaying an

authentication sequence that has been observed

50
New cards

Authentication Security Issues

-Client Attacks

-Host Attacks

-Eavesdropping, Theft, copying

-Replay(Repeats previous user response)

-Mitigated with longer unpredictable passwords and multi factor authentication.

51
New cards

Access Control

-Constraints what a user can do directly as well as what programs executing on behalf of the users are allowed to do.

-Coexists with identification and verification

52
New cards

Access Control Elements

subject, object, and access right

53
New cards

Discretionary Access Control (DAC)

-User oriented security policy

-Entity has rights to enable another entity to access a resource

-Uses a control matrix, which has subjects for rows and objects for columns

54
New cards

Access Control List (ACL)

-Access rights stored with objects

-ACL can contrain default entries

-Elements of ACL include individuals and groups

-Linked list with each node containing the subject and the access rights for each object

-ACL requires authentication

-Used in UNIX and Windows

55
New cards

Capability List

- The subject is stored with the access right for each subject.

- A linked list where each node is an object and access right and the head is the subject

56
New cards

DAC Security Issues

It is prone to trojan horse attacks to grant an attacker privileges

57
New cards

Role-Based Access Control (RBAC)

-Access control based on employee job functions rather than data ownership since company owns objects.

-Based on roles users assume in organization

58
New cards

Role

Represents users and defines permissions

59
New cards

Security Management with RBAC

-User-role relationship changes over time

-Roles are likely to be static

-Role Permissions relatively stable

60
New cards

Advantages of RBAC

-Authorization management (Easy revocation of rights)

-Hierarchal roles

-Least Privilege

-Separation of duties

61
New cards

Attribute-based access control (ABAC)

This is an access control paradigm whereby access rights are granted to users with policies that combine attributes together.

62
New cards

Subject Attributes

-A subject is an active entity that causes

information to flow among objects

- Attributes define the identity and characteristics of the

subject

63
New cards

Object Attributes

-Information system-related entity containing or receiving information

-Can make access control decisions

64
New cards

Environment Attribues

-Describes operation or technical environment in which information access occurs

65
New cards

ABAC Logical access control model

-Relies on evaluation of attributes of subject and object

-Can enforce any access control rule

66
New cards

ABAC Policies

Set of rules and relationships that govern allowable behavior within an organization, based on privileges of subjects

67
New cards

Intrusion

A security event, in which an intruder gains or attempts to gain access to a system

68
New cards

Anomaly Detection

Current observed behavior is analyzed to determine whether this behavior is that of a legitimate user or that of an intruder

69
New cards

Signature/Heuristic Detection

Uses a set of known malicious data patterns or attack rules that are compared with current behavior. Also known as misuse detection. Can only identify known attacks for which it has patterns or rules.

70
New cards

Signature Detection (Misuse Detection)

-IDS uses attack signatures to detect intrusion

-Signatures are events that describe a known attack

-Attacks of the same kind show the same patterns

71
New cards

Signature Detection (Misuse Detection) Advantages

Very good at detecting attacks without creating false alarms

72
New cards

Signature Detection (Misuse Detection) Disadvantages

-Can only detect attacks they know of, so system must be constantly updated to detect new attacks

-Some misuse detection cannot detect variants of a certain attack

73
New cards

Anomaly Detection Advantages

-Can detect unusual behavior

-Can produce information used to identify attack signatures

74
New cards

Anomaly Detection Disadvantages

-Produce a large number of false alarms

-Require event records to identify normal behavior patterns

75
New cards

host-based intrusion detection system (HIDS)

-Adds specialized layer of security to vulnerable systems

-Can use anomaly or signature based approaches

-Monitors suspicious behavior (intrusions, suspicious events, sends alerts)

76
New cards

Network-Based Intrusion Detection System (NIDS)

-Deploying sensors at strategic locations

-Inspect network traffic and user activities

77
New cards

Network Based vs. Host Based

-Network based can detect intrusions that cross a network segment

-Host Based can examine log files and inbound/outbound packets

-In an organization it is best to use both.

78
New cards

Confusion Matrix

A matrix that has if an intrusion is made in the columns and if there was an alarm in the rows. The data in the matrix consists of if there were true positives or false alarms.

79
New cards

Firewall

Hardware and software that isolates an organizations internal network from the internet at large.

80
New cards

Need for firewalls

-Protecting LANs

-Establish a controlled link

-Used as perimeter defense

81
New cards

Firewall goals

-Traffic inside and outside the firewall must pass through it

-Only authorized traffic will be allowed to pass

82
New cards

Firewall Filter Characterisitcs

-IP Address

-Application protocol

-User identity

-Network Activity

83
New cards

packet-filtering firewall

- Applies rules to each incoming and outgoing IP packet

- Typically a list of rules based on matches in the IP or TCP header

- Forwards or discards the packet based on rules match

84
New cards

Packet Filter Advantages

-Simplicity

-Typically transparent to users and are very fast

85
New cards

Packet Filter Disadvantages

-Cannot prevent attacks that are application specific

-Limited logging functionality

-Does not support advanced user authentication

-Vulnerable to TCP/IP protocol bugs

-Improper configuration can lead to breaches

86
New cards

Stateful Inspection Firewall

-Tightens rules for TCP traffic by creating a directory of outbound TCP connections:

-There is an entry for each currently established connection.

-Reviews packet information but also records information about TCP connections

-Keeps track of TCP sequence numbers to prevent attacks that depend on the sequence number

-Inspects data for protocols like FTP, IM, and SIPS commands

87
New cards

Application level gateway

-Acts as a relay to application level traffic

-Must have proxy code for each application

-Tends to be more secure than packet filter

-Disadvantage is the additional processing and overhead.

Explore top flashcards

flashcards
Chapters 10 & 11 Test
56
Updated 1093d ago
0.0(0)
flashcards
AP Euro Unit 1+2 Anchors
39
Updated 160d ago
0.0(0)
flashcards
Intro to Cognitive Psychology
24
Updated 895d ago
0.0(0)
flashcards
Ch. 17 & 18 Vocabulary
37
Updated 1105d ago
0.0(0)
flashcards
COMPSCI 1210 ( COMP ORG)
116
Updated 1106d ago
0.0(0)
flashcards
Present Perfect
34
Updated 1086d ago
0.0(0)
flashcards
Chapters 10 & 11 Test
56
Updated 1093d ago
0.0(0)
flashcards
AP Euro Unit 1+2 Anchors
39
Updated 160d ago
0.0(0)
flashcards
Intro to Cognitive Psychology
24
Updated 895d ago
0.0(0)
flashcards
Ch. 17 & 18 Vocabulary
37
Updated 1105d ago
0.0(0)
flashcards
COMPSCI 1210 ( COMP ORG)
116
Updated 1106d ago
0.0(0)
flashcards
Present Perfect
34
Updated 1086d ago
0.0(0)