Shared Flashcard Set

Details

CSE551
Final Exam for CSE 551
100
Computer Science
Undergraduate 4
03/10/2012

Additional Computer Science Flashcards

 


 

Cards

Term
Information System
Definition
an entire set of
software, hardware, data, people, procedures,
and networks necessary to use information as
a resource in the organization
Term
Critical Characteristics of Information
Definition
Confidentiality, Integrity, Availability, Authenticity, Accuracy, Utility, Possession
Term
Integrity
Definition
bitwise identical to the original
Term
Accuracy
Definition
Free from mistakes and errors
Term
Necessary Tools for InfoSec
Definition
policy, awareness, training, education, technology
Term
Balancing Info Sec and Access
Definition
- Impossible to obtain perfect security
- It is a process not an absolute

- Considered a balance between protection and availabilty

- To achieve balance, level of security must allow reasonable access, yet protect against threats
Term
History
Definition
- Began immediately after first mainframes were developed

- Groups developing code-breaking computations during WWII created the first modern computers
Term
Sequence Number
Definition
byte stream number of first byte in segment's data
Term
ACK number
Definition
Sequence number of next byte expected from other side
Term
UDP
Definition
User Datagram Protocol

- best effort service
- connectionless
- small segment header
Term
Why use UDP with DNS?
Definition
DNS uses UDP for name lookups because it is faster than forming a TCP connection. Loss is not significant in this case because the entity performing the query can simply send the request again
Term
Why use UDP with SNMP?
Definition
SNMP uses UDP as its transport protocol because it has no need for the overhead of TCP. Reliability is not required because each request generates a response. If the SNMP application does not receive a response, it simply reissues the request. Sequencing is not needed because each request and each response travels as a single datagram.
Term
ICMP
Definition
Internet Control Message Protocol

- communicate network-level information
- runs over IP
- Message Format:
- type, code, first 8 byted of IP datagram causing the error
Term
AS
Definition
Autonomous System

Types
- stub: small corporation
- multihomed: large corporation
- transit: network provider

Routing
- IGP
- BGP
Term
Vulnerability
Definition
Weakness or fault that can lead to an exposure
Term
Threat
Definition
Generic term for objects, people who pose a potential danger to and asset
Term
Threat agent
Definition
Specific object, person who poses such a danger by carrying out the attack

DDOS attacks are a threat, if a hacker carries out a DDOS attack he's a threat agent
Term
Risk
Definition
P(event occurs) X Exp(Damage)
Term
Exposure
Definition
Successful Attack
Term
Vector
Definition
How the attack was carried out
Term
Malware
Definition
malicious code
Term
Disclosure
Definition
Types:
- responsible, full, partial, none, delayed
Term
Authentication
Definition
determining the identity of a person, computer, or service on a computer
Term
Authorization
Definition
determining whether an entity has access to an object
Term
Incident
Definition
Varying Definitions
- any attack, all attacks using vulnerability X, etc

- Anything resulting in service degradation other than problem management, service request fulfillment
Term
Categories of threat
Definition
- Acts of human error or failure
- Accidents
- Employee Mistakes
- Deliberate software attacks
- Viruses
- Worms
- Macros
- DOS
Term
Acts of Human Error or Failure
Definition
Includes acts performed without malicious intent

Causes
- inexperience
- improper training
- incorrect assumptions

Among the greatest threats to an organization's data
Term
Results of Human Error or Failure
Definition
- Revelation of classified data
- entry of erroneous data
- accidental data deletion or modification
- data storage in unprotected areas
- failure to protect information
Term
Attack Replication Vectors
Definition
- IP scan and attack
- Web browsing
- Virus
- Unprotected shares
- Mass mail
- SNMP
Term
Active Worms
Definition
Autonomous

1) scan
2) probe
3) transfer copy
Term
Buffer Overflow
Definition
Inject malicious code into a process's virtual memory space

Modify RET to redirect execution flow to malicious code
Term
Cultural Mores
Definition
fixed morals or customs of a group of people

form basis of ethics
Term
Ethics
Definition
Rules that define socially acceptable behavior, not necessarily criminal, not enforced
Term
Laws
Definition
Rules that mandate or prohibit behavior, enforced by governing authority
Term
Policy
Definition
Organizational Laws
- body of expectations that defines acceptable workplace behavior
- general and broad
- must be distributed, readily available, easily understood and acknowledged by employees in order to be enforceable
Term
Standards, Guidelines, Best Practices
Definition
define what must be done to comply with policy
Term
Jurisdiction
Definition
a court's right to hear a case if a wrong was committed in its territory or against its citizens
Term
Long-arm Jurisdiction
Definition
court's ability to reach far and apply law (ie another state, country)
Term
Case Law
Definition
documentation about application of law in various cases
Term
Liability
Definition
Legal obligation beyond what's required by law, increased if you fail to take due care
Term
Due care
Definition
taken when employees know what is/isn't acceptable, what the consequences are
Term
Due diligence
Definition
sustained efforts to protect others
Term
Ethical Differences Across Cultures
Definition
- create difficulty in determining what is and is not ethical

- Example: many ways in which Asian cultures use computer technology is software piracy
Term
Victim Impact
Definition
What happens to victim as the result of a successful attack
Term
Attacker benefit
Definition
what attacker gains from successful attack
Term
Attacker cost
Definition
what attacker spends to launch attack
Term
Risk Management
Definition
process of identifying and controlling risks facing and organization
Term
Risk Identification
Definition
process of examining an organization's current information technology security situation
Term
Risk control
Definition
applying controls to reduce risks to an organization's data and information systems
Term
Assets
Definition
targets of various threats and threat agents
Term
Risk Control
Definition
- Avoidance
- Transference
- Mitigation
- Acceptance
Term
Residual Risk
Definition
remaining risk after identification and control
Term
Transference
Definition
- Control approach that attempts to shift risk to other assets, processes, or organizations
Term
Mitigation
Definition
- Attempts to reduce the impact of vulnerability through planning and preparation

Three Types of Plans
- Incident Response Plan (IRP)
- Disaster Recovery Plan (DRP)
- Business Continuity Plan (BCP)
Term
Firewall Processing Modes
Definition
- Packet Filtering
- Application Gateways
- Circuit Gateways
- MAC layer firewalls
- hybrid
Term
Firewall Categorization
Definition
- Processing Mode
- Development Era
- Intended Deployment Structure
- Architectural Implementation
Term
Packet Filtering
Definition
Examine header information and apply policies

- Relevant fields:
- src/dest IP
- protocol
- direction
Term
Subsets of PF
Definition
- Static Filtering
- uses rules/policies already in place
- Dynamic filtering
- allows firewall to react to emergent event and update or create rules to deal with event

- Stateful Inspection
- firewalls that keep track of each network connection using a state table
Term
Screened Subnet Firewalls
Definition
- Two or more internal bastion hosts behind PF router with each host protecting trusted network

Connection comes from outside, routed int and out of routing firewall to DMZ.

Only connections from DMZ allowed into internal trusted network
Term
VPN
Definition
Virtual Private Network

- Private and secure network connection between systems

- Securely extends organization's internal network connections to remote locations beyond trusted network
Term
VPN Must Haves
Definition
- encapsulation of incoming and outgoing data
- encryption of incoming and outgoing data
- authentication of remote computer and remote user
Term
IDS Classification
Definition
Detection methods:
- signature-based
- statistical anomaly-based

Operate as:
- network-based
- host-based
- application-based
Term
Signature-based IDS
Definition
- examine traffic in search of patterns that match known signatures

- many attacks have clear and distinct signatures

- DB of signatures must be continually updated
Term
Statistical Anomaly-Based IDS
Definition
- Samples network activity to compare to traffic that is known to be normal
- triggers alert when measured activity is outside baseline parameters
- can detect new types of attacks
- much more overhead and processing capacity than sig-based
- may generate many false positives
Term
NIDS
Definition
Network-Based IDS

- Resides on a computer or appliance connected to segment of an organization's network

- looks for attack patterns in packets

- installed at a specific place in the network where it can watch traffic going into and out of a particular network segment
Term
Advantages of NIDS
Definition
- enable organization to use a few devices to monitor large network
- passive and can be deployed to network with little disruption
- not usually susceptible to direct attack, may not be detectable
Term
Disadvantages of NIDS
Definition
- can become overwhelmed by network volume and fail to recognize attacks
- require access to all traffic being monitored
- cannot analyze encrypted packets
- cannot reliably ascertain if attack was successful or not
- some form of attacks are not easily discerned
Term
Host-Based IDS
Definition
- monitor single computer/server
- benchmark and monitor the status of key system files and detect when intruder creates, modifies, or deletes files
- Most HIDS work on the principle of config or change management
- access encrypted information
Term
Advantages of HIDS
Definition
- detect local events that may elude NIDS
- functions on host system where encrypted traffic will have been decrypted
- not affected by use of switched network protocols
- detect inconsistencies in how apps and programs were used by checking audit logs
Term
Disadvantages of HIDS
Definition
- Pose more management Issues
- Vulnerable to both direct attacks and attacks against host OS
- Doesn't detect multi-host scanning, or scanning of non-host network devices
- susceptible to DOS
- can use large amounts of disk space
- inflict performance overhead on host system
Term
IDS Control Strategies
Definition
- Centralized
- all IDS control functions are implemented and managed in a centralized location

- Fully Distributed
- All control functions are applied at the physical location of each IDS component

- Partially Distributed:
- Combination of the two
Term
Honeypots, Honeynets, and Padded Cell Systems
Definition
- decoy systems designed to lure potential attackers away from critical systems and encourage attacks against themselves
- Padded Cell:
- honey pot that has been protected so it cannot be compromised
Term
Trap and Trace Systems
Definition
- Trap with honeypot
- Legal Drawbacks
- Enticement
- Legal
- Entrapment
- Illegal
Term
Packet Sniffers
Definition
- collect copies of packets from network and analyzes them
- provide network admin with valuable info for diagnosing and resolving network issues
- can be used to sniff traffic in wrong hands
Term
Addressing DDOS
Definition
- Ingress Filtering
- Traceback
- Mitigation during attack
Term
IP Traceback
Definition
- Allows victim to identify attackers origin
- Approaches
- ICMP
- Probabilistic Packet Marking (PPM)
Term
PPM
Definition
- Probabilistically inscribe local path info
- Use constant space in the packet header
- Reconstruct attack path with high probability
Term
Cryptography
Definition
- the practice/study of rendering information unintelligible to everyone except the intended recipient
Term
Cryptanalysis
Definition
- study of obtaining plaintext without knowing key and/or algorithm
Term
Cryptology
Definition
- study of science of encryption
Term
Steganography
Definition
- process of hiding messages in images, text, etc
Term
Plaintext
Definition
unencrypted message
Term
Ciphertext
Definition
encrypted message
Term
Cipher/Cryptosystem
Definition
encryption method, consisting of algorithm, key, and encryption/decryption procedures
Term
Key
Definition
secret info used with algorithm to form cipher
Term
Kerchoff's Principle
Definition
a cryptosystem should be secure if everything but the key is publicly known
Term
Keyspace
Definition
# of values that can be used in a key
Term
Entropy
Definition
# of different actual values something can have
Term
Work Factor
Definition
amount of work required to perform cryptanalysis on ciphertext to recover plaintext without knowing key or algorithm
Term
PRNG
Definition
Pseudo-Random Number Generator
- creates a random number sequence with properties similar to those of real random number sequences
Term
One-Way Hash Function
Definition
converts message to a message digest, MD
Term
Hash collision
Definition
two messages produce same MD
Term
Nonce
Definition
Number used only once, helps prevent replay attacks
Term
Bit Stream Cipher
Definition
each plaintext but transformed into cipher one bit at a time
Term
Block Cipher
Definition
message divided into blocks and each is transformed into encrypted block of cipher bits using algorithm and key
Term
Substitution Cipher
Definition
substitute one value for another
Term
Transition Cipher
Definition
rearranges values within a block to create ciphertext
Term
Symmetric Encryption
Definition
uses same key to encrypt and decrypt message

Examples:
DES, 3DES, AES
Term
Asymmetric Encryption
Definition
public key and private key
if encrypted with key A can only be decrypted with key B
Term
CIA
Definition
Confidentiality, Integrity, Availability
Supporting users have an ad free experience!