Shared Flashcard Set

Details

C - SES-602 - Module 3 - Security Features
N/A
25
Computer Networking
Graduate
11/21/2011

Additional Computer Networking Flashcards

 


 

Cards

Term
Product (systemigram-like sentence)
Definition
A product implements features by performing certain behaviors that operate on resources.
Term
Product (definition)
Definition
A software package, protocol design, architecture, etc.
Term
Feature (definition)
Definition

A main capability offered by a product.

 

Note: A feature is not a technical capability.

Term
Resource (definition)
Definition
An entity that is used, modified, or provided by the product, such as memory, CPU, file, cookie, news article, or network connection.
Term
Behavior (definition)
Definition
An action that the product takes to provide a feature, or an action that a user performs.
Term
Security Feature (definition)
Definition

A security feature is a system capability that contributes to its security, and can be reused for systems with similar goals.

 

Note: A security feature combines people, process, and technology capabilities into a prevent, detect, recover cycle.

Term
Difference between security feature and technology
Definition

A security feature describes WHAT security will be implemented.

 

A security technology is used to determine HOW it will be implemented.

Term
Three Big Ideas of Crypto
Definition

1) Confusion

2) Diffusion

3) Secrecy Only in the Key

Term
Crypto Big Idea 1: Confusion
Definition
Refers to making the relationship between the key and the ciphertext as complex and involved as possible.
Term
Crypto Big Idea 2: Diffusion
Definition

Refers to the property that the redundancy in the statistics of the plaintext is "dissipated" in the statistics of the ciphertext, i.e., spread out the message

 

ATTA

CKAT

DAWN

 

ACD TKA TAW ATN

Term
Crypto Big Idea 3: Secrecy Only in the Key
Definition
After thousands of years, we learned that it's a bad idea to assume that no one knows how your method works. Someone will eventually find that out, i.e., you can only decode the message with the key, not be knowing the method of encryption (assuming there isn't a flaw in the key or some other crypto breakthrough).
Term
Symmetric Encryption Authentication
Definition
Encryption and Decryption keys are the same; authemtication is only for community, not individual; it requires confidentiality and guarantees of not sharing keys beyond the community.
Term
Asymmetric Encryption-based Authentication
Definition
Public encryption key and private decryption key; requires complete integrity of public key and complete confidentiality of private key.
Term
Message Integrity Authentication via Digital Signature (process)
Definition

Sign (Sender):

1) Hash data

2) Encrypt hash with private signature key (i.e., the digital signature)

3) Combine with certificate

4) Attach to data

Verify (recipient)

5) Separate digital signature from data

6) Decrypt using public signature key

7) Re-hash data

8) Compare new hash of data to decrypted hash

9) If hashes are equal then signature is valid.

Term
Message Integrity Authentication via Digital Signature combine with Confidentiality via Asymmetric Key Encryption (process)
Definition

Sender:

1) Hash data

2) Encrypt data with recipient public key

3) Encrypt everything with sender private signature key

 

Recipient:

4) Decrypt with sender public signature key

5) Decrypt message with recipient private key

6) Re-hash data

7) Compare new hash and original hash

8) If hashes match, then data is authentic.

Term
Handshaking (definition)
Definition
An automated process of negotiation that dynamically sets parameters of a communications channel established between two entities before normal communication over the channel begins. It follows the physical establishment of the channel and precedes normal information transfer.[
Term
Federated Identity (definition)
Definition
The means of linking a person's electronic identity and attributes, stored across multiple distinct identity management systems
Term
Single Sign On (SSO)
Definition
A property of access control of multiple related, but independent software systems. With this property a user logs in once and gains access to all systems without being prompted to log in again at each of them.
Term
Handshakes using tokens (process)
Definition

1) Username + PIN + Token

2) Auth Server: username is assoicated with PIN; simple lookup.

3) "Seed" key on server recalculates token using current time to perform auth. Token = algorithm(time, key).

4) "Child" key resides on hand-held device and recalcuates token every X seconds according to algorithm. Battery keeps device in sync.

Term
Least Privilege (definition)
Definition

Principal that everyone should have exactly the permissions they need to perform their role in systems operation, and no more

 

Note: Not the same as need–to-know, which refers to minimum spread of information for its expected utility – much more difficult

Term
Non-repudiation
Definition
  • A service that provides proof of the integrity and origin of data.
  • An authentication that with high assurance can be asserted to be genuine.
  • Usually requires a combination of physical and logical controls.
Term
Chokepoints
Definition
Network configuration to ensure traffic is subject to controls.
Term
Segregation of Duties (definition)
Definition

Provides distinction between at least two roles,
and corresponding mechanisms to ensure that a
single system function must require
collaboration from at least two distinct subjects
in order for the function to be successfully
accomplished.


• Examples:
• Two physical keys required to turn on switch
to launch nuclear missiles
• Two accounting system logins required to
process a payment, one to enter details,
another to release payment.

Term
Out of Band Signaling
Definition
Communications that occur outside of a previously established communication method or channel.
Term
Resilience (systemigram)
Definition
The adaptive capacity of systems to meet and achieve priorities and goals in order to absorb or limit disruptions while retaining service continuity.
Supporting users have an ad free experience!