IS 430 Chapter 2 Slides

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/60

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

61 Terms

1
New cards

Authentication

Proving someone is who they say they are.

2
New cards

Identity

a claimed role or person

3
New cards

Authorization

determination if someone is allowed to access or do something

4
New cards

Methods of authentication

Something you know (knowledge)

Something you are (biometric)

Something you have (token)

5
New cards

Attacks on "something you know"

Passwords

Security questions

Dictionary attacks

Inferring passwords

Guessing

Brute force attack

Rainbow tables

6
New cards

Problems with biometrics

Intrusive

Expensive

Single point of failure

Sampling error

False readings

Speed

Forgery

7
New cards

multifactor authentication

Using two or three things from separate categories

8
New cards

Access Policies Goals

Check every access

Enforce least privilege

Very acceptable usage

9
New cards

Federated identity management

union of separate identification and authentication systems. One profile with one authentication method. Separate systems share access to the authenticated identity database.

10
New cards

Single sign on

Log in once per sessions. Maintains your identities and authentication codes for all different processes you access.

11
New cards

Difference between Federated IM and Single on

FIM involves a single identity management module that replaces identification and authentication in all other systems.

With Single on, systems still call for individual identification and authentication but the umbrella task performs those interactions on behalf of the user.

12
New cards

T/F Single sign on takes over sign-on and authentication to several independent systems for a user.

True

13
New cards

Reference monitor

access control notion that is always invoked, tamper-proof, verifiable

14
New cards

Access Control Directory

Every file has unique owner with control access rights. Each user has a filer directory which lists all files to which user has access to.

15
New cards

Difficulties with Access Control Directory

1) List becomes too large if many shared objects are accessible to all users.

2) Revocation of access.

3) pseudonyms. A and B have two diff files names F, both want to allow access by S.

16
New cards

Access control matrix

a table in which each row represents a subject, each column represents an object, and each entry is the set of access rights for that subject to that object

17
New cards

Access Control List

corresponds to columns of access of control matrix. There is one such list for each object and list shows all subjects who should have access to the object and what their access is.

18
New cards

Procedural access control

each object is "hidden" behind a controller that accesses it

19
New cards

Role-Based Access Control (RBAC)

User are assigned certain roles

20
New cards

Usage controls

Adds purpose to object subject and actions

21
New cards

Privilege List

row of access matrix, showing all those privileges or access rights for a given subject.

Advantage: Revocation.

22
New cards

Capability

unforgeable token that gives possessor certain rights to an object.

ticket giving permission to a subject to have certain type of access to an object.

23
New cards

Propogate

One possible access right, subject can pass copies of capabilities to other subjects.

24
New cards

Domain

Collection of objects to which process has access.

25
New cards

Problems address by encryption

Attacker wants to:

Block the message

Intercept the message

Modify the message

Fabricate the message

26
New cards

cryptosystem

a system for encryption and decryption

27
New cards

plaintext

material in intelligible form

28
New cards

Ciphertext

The encrypted message

29
New cards

Symmetric encryption

One key encrypts and decrypts

30
New cards

asymmetric key

one key encrypts, different key decrypts

31
New cards

Cryptography

using encryption to conceal text

32
New cards

Steam Cipher

each bit, or byte of the data steam is encrypted separately

advantage: can be applies immediately to whatever data items are ready to transmit. (can be expensive)

33
New cards

Block Cipher

encrypts a group of plaintext symbols as one block

34
New cards

Stream Advantages

Speed of transformation

Low error propagation

35
New cards

Steam Disadvantages

Low diffusion

Susceptibility to malicious insertions and modifications

36
New cards

Block advantages

High Diffusion

Immunity to insertion of symbol

37
New cards

Block Disadvantages

Slowness of encryption

padding

error propagation

38
New cards

DES (Data Encryption Standard)

Cryptographic standard. Developed in 1970s by IBM for NIST.

Careful and complex combination of two fundamental building blocks of encryption: substitution and transposition. 56 bit key

Inadequate for high security apps

39
New cards

Double DES

two 56 bit keys.

40
New cards

Two-key triple DES

Two 56-bit keys

41
New cards

Three-key triple DES

Three 56-bit keys

42
New cards

AES (Advanced Encryption Standard)

Developed in 1999 by cryptographers.

43
New cards

Asymmetric Cryptography

In this Cryptography a Key Pair - Private and Public Key is used. Private Key is kept secret and the Public Key is Widely distributed.

44
New cards

Secret key (Symmetric)

1 key

56-112 (DES) 128-356 (AES)

Must be kept secret

Must be out-of band

Fast Speed

45
New cards

Public Key (Asymmetric)

2 keys

Unlimited key size

One key must be kept secret; other freely exposed

public key can be used to distribute other keys

Slow speed (10,000 times slower)

46
New cards

Error Detecting Codes

Block of data has been modified

47
New cards

Simple error detecting codes

Parity checks

Cyclic redundancy checks

48
New cards

Parity check

extra bit is added onto each byte of data similar to check digits.

even 0

odd 1

49
New cards

Cyclic Redundancy Check (CRC)

checks detects errors in recording and playback

50
New cards

Cryptographic error detecting codes

One-way hash functions

Cryptographic check sums

Digital Signatures

51
New cards

one-way hash function

a function that is easy to compute on every input, but hard to invert given the image of a random input.

52
New cards

Properties of digital signatures

Non-repudiation

Authenticity

53
New cards

Certificate

a public key and identity bound together and signed by a certificate authority

54
New cards

Certificate Authority

authority that users trust to accurately verify identities before generating certificates that bind those identities to keys.

55
New cards

Secret key

Protecting confidentiality and integrity of data at rest or in transit

56
New cards

public key

Exchanging encryption keys

Signing data to show authenticity and proof of origin

57
New cards

Error detection codes

Detect change in data

58
New cards

Cryptographic Hash Function

Detect changes in data, using function only data owner can computer

59
New cards

Error correction codes

Detect and repair errors in data

60
New cards

Digital signatures

Attest to authenticity of data

61
New cards

Digital certificates

Allow parties to exchange cryptographic keys with confidence of identities of both parties