0% found this document useful (0 votes)
142 views10 pages

Reviews Seg Opera Tiva 2018

Reviews Seg Opera Tiva 2018

Uploaded by

giraldod
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
142 views10 pages

Reviews Seg Opera Tiva 2018

Reviews Seg Opera Tiva 2018

Uploaded by

giraldod
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 10
indeed should apse sive encryption | as fnetion simple approach -ryption package ate a key from a rd disk. The PGP ers the password ‘user protects his the files are fully | (COLL06} servers and stor- torage system, and rerypt data at close oftware on servers zures the appliance A data are supplied. | of a co-processor e. The co-processor @ board. The tapes jrive hardware. The hat is transported r is not available at re decryption pack- { vendors offer soft 1 to the application and folders. Other nt, encrypt an entire , or maintained ona | ccrypted. Various key . owner of the data. jellman key exchange ignature Signature Standard >) curve eryplosraphy message authentication sage authentication code (MAC) odes of operation fone-way hash function second preimage resistant preimage resistant private key pseudorandom number public key public-key certificate public-key encryption random number RSA secret key secure hash algorithm (SHA) secure hash function strong collision resistan symmetric encryption uiple DES ‘weak collision resistant What are the essential ingredients of a symmetric ip How many keys are tequited for two people to communicate via a symmetric cipher? ‘What are the two principal requirements forthe secure use of symmetric eneryption? List three approaches to message authentication. ‘What is a message authentication code? Briefly deseribe the three schemes illustrated in Fi ‘What properties musta hash function have to be useful for message authentication? What are the principal ingredients of a public-key eryptosystem? List and briefly define three uses of a public-key erypiosystem. ‘What isthe difference between a private key and a secret key? What isa digital signature’? What isa public-key certificate? How can public-key eneryption be used to distribute @ secret key? plems Suppose someone suggests the following way to confirm thatthe two of you are both jnPbeseston ofthe same seret key. You create a zandom bit string the length of the Hee SOR it withthe key, and send the result over the channel. Your partner XORs the AS3sming block with the key (which should be the same as your key) and sends it back Joo cheek, and if what you receive is your original random string, you have verified ne sceret Key, yet neither of you has ever transmitted the that your partner has the s key. Is there a law in this scheme? ‘This problem uses a real-world example of a symmetric cipher, from an old US Special Forees manual (public domain). The document, filename Special Forees,pdfis available at box.com/CompSecte. Using the two keys (memory words) cryptographic and network security, encrypt the following message: Be at the thitd pillar from the left outside the Iyecum theatre tonight at seven, If you are distrustful bring two friends. Make reasonable assumptions about how to treat redundant letters and excess let- Aaa the memory words and how to tat spaces and punctuation. Indicate wht your assumptions are. Note:The message is from the Sherlock Holmes novel The Sign of Four . Decrypt the ciphertext, Show your work, Cearyeint on when it would be appropriate to use this technique and what its advantages are, | security mechanism affic analysis security policy unauthorized disclosu security service usurpation | separation of prvileg nerabilities Define computer security ‘What isthe difference between passive and active security threats? List and briefly define categories of passive and active network security attacks. List and briefly define the fundamental security design principles. Explain the difference between an attack surface and an attack tree Consider an automated teller machine (ATM) to which users provide a personal identification number (PIN) and a card for account access. Give examples of cont dentiality, integrity, and availability requirements associated with the system and, in each case, indicate the degree of importance of the requirement, Repeat Problem L1 for a telephone switching system that routes calls through a switching network based on the telephone number requested by the caller Consider a desktop publishing system used to produce documents for various Give an example of a type of publication for which confidentiality of the stored data isthe most important requirement. '. Give an example ofa type of publication in which data integrity is the most impor- tant requirement iive an example in which system availablity isthe most important requirement For each of the following assets, assign a low, moderate, or high impact level for the loss of confidentiality, availability, and integrity respectively, Justify your answers An organization managing public information on its Web server. A law enforcement 0 inaging extremely sensitive investigative information AA financial organization managin related information) routine administrative information (not privacy 4. An information system used for large acquisitions in a contracting organization contains both sensitive, pre-solcitation phase contract information and routine ‘administrative information. Assess the impact forthe two data sets separately and the information system as a who © A power plant contains a SCADA (supervisory control and data acquisition) sys tem controling the distribution of electric power fora large military installation The SCADA system contains both real-time sensor data and routine administra tive information, Assess the impact for the two data sets separately and the infor- mation system as a whole Consider the following general code for allowing access toa resource: ORD dwRet = IsAccessA: Goat a. Explain the security la in this program, b._ Reviite the code to avoid the flaw. Hint, Consider the design principle of fail-safe defaults Develop an attack tree for Consider a company whose operations are housed in two buildings on the same property: one building is headquarters, the other building contains network and com- puter services The property s physialy protected by a fence around the perimeter | Thhe only entrance to the property is through a guarded front gate. The local networks are split between the Headquarters’ LAN and the Network Services’ LAN. Internet tusers connect to the Web server through a firewall. Dial-up users get access to a par ticular server on the Network Services’ LAN, Develop an attack tree in which the root node represents disclosure of proprietary secrets. Include physical, social engineering, ‘and technical attacks. The tree may contain both AND and OR nodes Develop a tree provide a personal examples Of cont that has at least 15 leaf nodes. the system and, in Read all of the classic papers cited in the Recommended Reading document at http williamstallingscom/ComputerSecurity! Compose a 500-1000 word paper (or 8-12 (es calls through a slide presentation) that summarizes the key concepts that emerge from these papers, he caller emphasizing concepts that are common to most or all of the papers. ments for various jality of the stored isthe most impor rant requirement mpact level for the itive invest pation (not privacy nation and routine sets separately and ta acquisition) sys- ilitary installation utine administra ately and the infor , and indeed should effective encryption .A simple approach encryption package nerate a key from a hard disk. The PGP enters the password, he user protects his d, the files are fully in [COLL06} cen servers and stor- e storage system, and enerypt data at close | software on servers: igures the appliance ed data are supplied 18 of a co-processor re. The ¢0-processor pe board. The tapes drive hardware. The e that is transported is not available at re decryption pack- f vendors offer soft- t to the application s and folders. Other It, encrypt an entire or maintained on a rypted. Various key owner of the data, Iman key exchange ature nature Standard ve cryptography tocar hath algorithm (SHA) | preimage resistant private key pseudorandom number public key public-key certificate public-key encryption random number RSA. message authentication secure hash function message authentication code (MAC) modes of operation svay hash function strong collision resistant symmetric encryption triple DES ‘weak collision resistant dents of a symmetric cipher? How many keys are required for wo people to communicate via a symmetric cipher? What are the essential 5 What are the two principal requirements forthe secure use of symmetric encryption? 24 List three approaches to message authentication. 2.5 What isa message authentication code? Briefly describe the three schemes illustrated in Figure 23. 2.7 What properties must a hash function have to be useful for message authentication? ‘What are the principal ingredients of a public-key cryptosystem? List and briefly define three uses of a public-key eryptosystem 10 What is the difference between a private key and a secret key? 2.11 What isa digital signature? 2.12 What isa public-key certificate? How can public-key encryption be used to distribute a secret key? 2.1. Suppose someone suggests the following way to confirm that the two of you are both in possession of the same secret key, You create a random bit string the length of the key, XOR it withthe key, and send the result over the channel. Your partner XORS the incoming block with the key (which should be the same as your key) and sends it back. You check, and if what you receive is your original random string, you have verified that your partner has the same secret Key, yet neither of you has ever transmitted the key: fs there a law in this scheme? 22. This problem uses a real-world example of a symmetric cipher, from an old US. Special Forces manual (public domain). The document, filename Special Forcespdfis available at box.com/CompSecte. ‘a. Using the two keys (memory words) cryptographic and network security, encrypt the following message: Be at the third pillar from the left outside the lyceum theatre tonight at seven. If you are distrustful bring two friends. Make reasonable assumptions about how to treat redundant letters and excess let ters in the memory words and how to treat spaces and punctuation, Indicate what your assumptions are, Note:The message is from the Sherlock Holmes novel The Sign of Four. b. Decrypt the ciphertext. Show your work. © Comment on when it would be appropriate to use this t advantages are. chnique and what its the network either by implementing strict firewall rule sets or physically dividin, the networks altogether. An additional short-term fix is to implement network-leve encryption between routers that the ATM traffic traverses. Long-term fixes involve changes in the a confidentiality requires eneryptin, the network, Ensuring data inte cation between the ATM and p to counter replay attacks, ware, Protectin cd information that traverse: ity requires better machine-to-machine authenti all customer-rela ocessor and the use of challenge-response protocol verification | dynamic biometric relying party (RP) verifier enol salt hashed password shadow password file In general terms, what are four means of authenticating a user’s identity? List and briefly describe the principal threats tothe secrecy of passwords What a List and briefly describe four common technique’ for selecting ;wo Common techniques used to protect a password file? or assigning passwords Explain the difference between a simple memory card and a smart card List and briefly describe the principal physical characteristics used for biometric identification In the context of biomet cation, and identification, ic user authentication, explain the terms, enrollment, verif Define the terms false match rate and false nonmatch rate, and explain the use of threshold in relationship to these two rates, ' Describe the gene concept of a challe 1e-response protocol Explain the suitability or unsuitability ofthe following passwords | 8 YK334 —b, mfmitm (for“my favorite —¢. Nataliel— d, Washington | movie is tender mercies) fe Aristotle f, tw5stove 12345678, cribs An early attempt to force users to use less predictable passwords involved computer supplied passwords. The passwords were eight characters long and were takes trom MI = | Role A has numer » each of the three pank, there are 65 inch Manager, toa rent job functions e 23,920 different is in line with the curity profiles are ket control policy 143 redential management cernel mode prerequisite role iseretionary access control _| least privilege privilege (Dac limited role hierarchy protection domain ispute resolve | mandatory access control rn ‘dynamic separation of duty (MAC) resource (psp) mutually exclusive roles | rights | ntitlements object role-based access control | environment attribute object attribute (RBAC) | i. ‘up. identity identity, credential, and access management (ICAM) identity management identity provider Information Card Foundation (Ick) role constraints role hierarchies ‘open access control policy (Open Identity Exchange Corporation (OIX) (Open Identity Trust Framework (OITF) OpenID (OpenID Foundation (OIDF) le hierarchy separation of duty static separation of duty (SSD) subject subject attribute ‘rust framework trust framework provider permission policy Briefly define the difference between DAC and MAC to DAC and MAC? three classes of subject in an access control system, How does RBAC r List and define th In the context of access control, what is the difference between a subject and an object? ‘What is an access right? ‘What isthe difference between an access control lst and a capability ticket? ‘What is a protection domain? Briefly define the four RBAC models of Figure 4.8 List and define the four types of entities in a base model RBAC system. Describe three types of role hierarchy constraints In the NIST RBAC model, what is the difference between SSD and DSD? For the DAC model discussed in Section 4.3, an alternative representation ofthe pro- tection state isa directed graph. Each subject and each object in the protection state is represented by a node (a single node is used for an entity that is both subject and dbject), A directed line from a subject to an object indicates an access right, and the Tabel on the link defines the access right. ‘a. Draw a directed graph that corresponds to the access matrix of Figure bh. Drawa directed graph that corresponds to the access matrix of Figure 43. ©. Is there a one-to-one correspondence between the directed graph representation land the access matrix representation? Explain. attribute blind SOL injection cascading authorizations inband attack inference inference channel inferential attack out-of-band attack parameterized query insertion partitioning run-time prevention Structured Query Lan; (sau) SOL inje tautology tuple ‘compromise jon (SQLi) attack data center data swapping database database ac dat (DBMs) defensive coding detection cend-ol-line comment foreiga key ss control pigeybacked queries ase encryption primary key query language relation relational databas relational database manay ‘ment system (RDBMS) De ‘What isa relational database and what are its principal ing How many primary keys and how many foreign keys may a table have in a relational database? List and briefly describe some administrative policies that can be authorizations. ine the terms database, database management system, and query language dients? witha RDBMS. Explain the concept of cascadin Explain the nature of the inference threat to an RDBMS. ‘What ate the disadvantages of database encryption? List and briefly define four data center availability tiers. Consider a simplified university database that includes information on courses (name, number, day. time, room number, and max enrollment) and on faculty teaching courses and students attending courses, Suggest a relational database for efficiently managing this information. “The following table provides information on members of a mountain climbing club GiimberID | Name | Skilitevel [Age | Eamund [Experienced] 00 | Amold 35 313 Bridget Experienced a) | 212 James Medium: 27 | gress monitors, the exter: software, Indeed, the two ress monitor is designed g outgoing traffic for signs toring could look for the sd by worms and rate limit, to abnormally high e-mail vam payloads. It may also nter measures, monitoring mn out of the organization, sonding to botnet activity is activity. Once bots are used to detect the attack, able the botnet during its s we have just discussed gate this type of payload. distributed configuration. I perimeter sensors, relays late and analyze the data, terns to enable all of the are attacks. A number of ple of a distributed intru- we will discuss further in kit ning phishing th virus Joor an horse ing-hole attack bie day exploit _ jee broad mechanisms that malware can use to propagate’ What are four broad categories of payloads that malware may carry? What characteristics of an advanced persistent threat give it that name? What are typical phases of operation of a virus or worm? What mechanisms can a virus use to conceal itself? ‘What isthe difference between machine executable and macro viruses? What means can a worm use to access remote systems to propagate? What isa “drive-by-dowmnload” and how does it differ from a worm How does a Trojan enable malware to propagate? How common are Trojans on computer systems? Or on mobile platforms? What is a“log What is the difference between a backdoor, bot, a keylogger, spyware, and a rootkit Can they all be present in the same malware? What is the difference between a “phishing” attack and a “spear-phishing” attack, ff who the target may be? List some the different levels in system that a rootkit may use. bomb"? Describe some malware countermeasure List three places malware mitigation mechanisms may be located Briefly describe the four generations of anti-virus software. A computer virus places a copy of itself into other programs, and arranges for that ‘code 10 be run when the program executes, The “simple” approach just appends the code after the existing code, and changes the address where code execution starts This will clearly increase the size of the program, which is easily observed. Investigate and briefly lst some other approaches that do not change the size of the pro} The question arises as to whether itis possible to develop a program that can analyze ‘piece of software to determine if itis a virus, Consider that we have a program D that is supposed to be able to do that. That is, for any program P,if we run D(P), the result returned is TRUE (P is a virus) or FALSE (P is not a virus), Now consider the following program: In the preceding program, infect-executable isa module that scans memory for exe cutable programs and replicates itself in those programs. Determine if D can correctly decide whether CV isa virus, “The following code fragments show a sequence of virus instructions and a metamor- Dhie version of the virus. Describe the effect produced by the metamorphic code, 355 Tibrary function shell ] memory management shelleode buffer overflow nonexecutable memory stack frame buffer overrun no-execute stack buffer overtlow | NoP stea stack smashing off-by-one vulnerability position independent ' Define buffer overflow List the three distinct types of locations in a process address space that buffer over flow attacks typically target. ‘What are the possible consequences of a buffer overflow occurrs What are the two key elements that must be identified in order to implement a buffer overflow? What types of programming languages are vulnerable to buffer overflows? Describe how a stack buffer overflow attack is implemented, r ‘What restrictions are often found in shelleade, and how ean they be avoided? ine shellcade Describe what a NOP sled is and how its used in a bulfer overflow attack List some of the different operations an attacker may design shelleode to perform. What are the two broad categories of defenses against buffer overflows List and briefly describe some of the defenses against buffer overflows that can be used when compiling new programs List and briefly describe some of the defenses against buffer overflows that can be implemented when running existing, vulnerable programs, Describe how a return-to-system-call attack is implemented and why itis used Describe how a heap buffer overflow attack is implemented. Describe how a global data area overflow attack is implemented. Investigate each ofthe unsafe standard C library functions shown in Figure 102using the [UNIX man pages or any C programming text, and determine a safer alternative to use Rewrite the program shown in Figure 10.la $0 itis no longer vulnerable to a buffer overflow, Rewrite the function shown in Figure 10.5as0 it isno longer vulnerable toa stack buf- {er overflow Rewrite the function shown in Figure 10.7a so itis no longer vulnerable to a stack but fer overflow, a | IPS services. The ni onnect them to suitable iwork interfaces on the c between them in the ities, as on a physically a virtual UTM installed ‘configured, and run as tual bastions compete n that system. apabilities provided by re that host in the same rovided directly by the steful packet inspection trafic between VMs, to vity within its VMs This 1d bastion host firewalls, etwork structure. It can t part of the virtualized more efficient than the occur within the hyper it requires a hypervisor plexity any virtualized systems re or more data centers, needed where suitable exibility and scalability ¢ may still be a need for gh traffic volumes either Internet. ystems, as typically used ese result from the pres- side, the hypervisor and urther, the users of such 1d to any VM images and svide additional features, ns, than to isolate these ese systems, on solution that is more .pproach may be used to ss to enterprise networks f these images. However, ise of the underlying host | archive guest OS patching hardening permissions plication virtualization hosted virtualization software defined network hypervisor type | hypervisor logging type 2 hypervisor native virtualization Virtualization container virtualization overlay network ull vietualization patches What are the basie steps needed in the process of securing a system? ‘What isthe aim of system security planning? What are th Why is ke What are the pros and cons of automated patching? asie steps needed to secure the base operating system? ing all software as up to date as possible so important? What is the point of removing unnecessary services, applications, and protocols? What types of additional security controls may be used to secure the base operating What additional steps are used to secure key applications? What steps are used to maintain system security? Whereis application and service configuration information stored on Unix and Linux ‘What type of access contro! model do Unix and Linux systems implement? ‘What permissions may be specified, and for which subjects,on Unix and Linux systems? What commands are used to manipulate extended file attributes acces lists in Unix and Linux systems? uting files on Unix ‘What effect do set user and set group permissions have when e and Linux systems? What is the main host firewall pr Why is it important to rotate og files? Hovis a chroot jail used to improve application security on Unix and Linux systems? Wher What are the major differences between the implementations of the discretionary aecess control models on Unix and Linux systems and those on Windows systems? What are mandatory integrity controls used for in Windows systems? -ge overrides all ACL checks, and why? Whereis application and service configuration information stored on Windows systems? What is virtualization? sam used on Linux systems? {sv0 places user and group information may be stored on Winclows systems? (On Windows, whieh prvi What virtualization alternatives do we discuss securing?

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy