Term
|
Definition
| EX: Invisible ink, hidden messages in lower-order bits in image |
|
|
Term
|
Definition
Cryptology is a branch of mathematics Security is a system issue, uses cryptogoly |
|
|
Term
| Cryptography always involves two things |
|
Definition
| Transformation and secret |
|
|
Term
| Security should depend only on the |
|
Definition
|
|
Term
| Message Authentication Codes (MACs) |
|
Definition
Create a hash that includes all of the data and a secret shared between sender and receiver. |
|
|
Term
|
Definition
| Additional block prepended and additional round of hashing |
|
|
Term
| What encryption algorithm makes brute force attacks harder? |
|
Definition
| DES, limits speed in which attacker can compute strings from passwords |
|
|
Term
|
Definition
| Try a list of common passwords |
|
|
Term
|
Definition
| Use hash chains to reduce storage requirement |
|
|
Term
| Computers can only verify a “token”. What's a token? |
|
Definition
Password • Cardkey • Fingerprint • Other stuff |
|
|
Term
| What's the best technical way to get a "token"? |
|
Definition
|
|
Term
Encryption with a _____ is typically done to sign a message |
|
Definition
|
|
Term
Encryption with a _____ is done for secrecy |
|
Definition
|
|
Term
Trees (or web) of trust • Public-key encryption • Message authentication codes • Passwords are tools for |
|
Definition
|
|
Term
| Real protocols for authentication? |
|
Definition
| Real protocols for authentication |
|
|
Term
| Real protocols for secure communications |
|
Definition
|
|
Term
|
Definition
• Provide authentication (without encryption) • Provide encryption (includes authentication) |
|
|
Term
| Digital signature is basically |
|
Definition
|
|
Term
| PGP encrypts message with |
|
Definition
|
|
Term
|
Definition
|
|
Term
| PGP uses compression for several reasons |
|
Definition
• Save message space • Reduce encryption time • Strengthen encryption: lower redundancy |
|
|
Term
| PGP uses four kinds of keys |
|
Definition
• Session keys (symmetric encryption) • Public keys (from many users) • Private keys (typically from one user) • Passphrase-based conventional keys |
|
|
Term
| Session key generation is run in which mode? |
|
Definition
|
|
Term
|
Definition
Data fragmented into blocks of 214 bytes or less ❖ Compression applied (optional) ❖ MAC calculated ❖ Payload & MAC encrypted ❖ Header prepended • Content type • Major & minor version • Compressed length |
|
|
Term
| Change Cipher Spec Protocol |
|
Definition
❖ Single message that contains a single byte ❖ Causes the pending state to be copied into the current state • Updates the cipher information used by this connection • State must have been set by the Handshake Protocol (more on this in a bit) |
|
|
Term
|
Definition
❖ Conveys protocol-related alerts to the peer ❖ Alert messages are compressed and encrypted (and thus secure) ❖ Message consists of exactly two bytes • Level: severity of the alert (warning or fatal) • Alert code: what kind of alert is this? • Unexpected message • Bad record MAC • Decompression failure • Handshake failure • Illegal parameter • Other possible alerts… |
|
|
Term
| SSL Handshake Protocol first phase is |
|
Definition
establish security capabilities • Exchange info • Find common ground for secure message exchange |
|
|
Term
| SSL Handshake Protocol's Second phase is |
|
Definition
authenticate server & exchange key |
|
|
Term
| SSL Handshake Protocol's third phase is |
|
Definition
authenticate client and exchange key |
|
|
Term
| SSL Handshake Protocol Fourth phase: |
|
Definition
finish up • Change_cipher_spec not really part of the handshake protocol |
|
|
Term
|
Definition
|
|
Term
| What is an intrusion, anyway? |
|
Definition
| is an attempt to gain illicit access to a computer system (typically via network) |
|
|
Term
|
Definition
❖ Masquerader • Not authorized to use the computer • Impersonates a legitimate user ❖ Misfeasor • Legitimate user who abuses his privileges • Legitimate user who accesses resources for which he’s not authorized ❖ Clandestine user • Intruder who controls system completely • Fixes up auditing and access controls to hide her accesses |
|
|
Term
|
Definition
❖ Illegal access • Intruder gains access to resources for which he’s not authorized • May not bother other users—only uses hardware and software, not data • Often used as a stepping stone to other types of intrusions ❖ Data compromise • Intruder gains access to data • Intruder may even be able to plant false data ❖ Denial of service • No access is actually gained, but… • Legitimate users can’t gain access to the resources or data either! |
|
|
Term
|
Definition
❖ Individual networks are unencrypted • No need for special software on computers • Untrusted services can run locally ❖ Connections to other networks are encrypted • Not all traffic need be encrypted • Traffic to untrusted sites runs as normal ❖ Incoming traffic is scanned for intrusions • Block traffic that might cause problems • Control the content of packets that go by |
|
|
Term
|
Definition
secure end-to-end user traffic using both authentication and encryption |
|
|
Term
|
Definition
• Strong security for traffic between firewalls • Internal network has no overhead • Resistant to bypass: if it’s in the firewall, no way to avoid using it • Transparent to applications • Transparent to users • May be implemented on a smaller scale for individuals |
|
|
Term
• Mandatory access control • Discretionary access control • Role-based access control Are types of what? |
|
Definition
|
|
Term
| Discretionary access control (DAC) is control access based on |
|
Definition
• Identity of requestor • Access rules (authorizations) granted to requestor • Rules may allow requestor to pass on its access to a different entity |
|
|
Term
| Mandatory access control (MAC) is control access based on |
|
Definition
security labels (labels based on security levels (clearances)) • Requestor can’t pass on access to others |
|
|
Term
| Role-based access control (RBAC) is control access based on |
|
Definition
roles • Users assigned to roles • Assignment may be dynamic: user may have to explicitly “activate” a permitted role |
|
|
Term
| In access control terms a Unix user is a |
|
Definition
|
|
Term
| In access control terms a Unix file is a |
|
Definition
|
|
Term
| In access control terms a File access permissions is a |
|
Definition
|
|
Term
|
Definition
lists subjects, objects, and access rights. Columns are access control Rows are capabilities (tickets) |
|
|
Term
| An example of a protection domains is |
|
Definition
|
|
Term
| Rows of the table are called |
|
Definition
|
|
Term
| Rows of the table are called |
|
Definition
|
|
Term
| Rows of the table are called |
|
Definition
|
|
Term
|
Definition
| ❖ Database can only answer statistical queries |
|
|
Term
| Which database has the least amount of security? |
|
Definition
|
|
Term
| In databas terms, policies may support |
|
Definition
• Centralized administration: all policies controlled centrally • Ownership-based administration: owner of a table controls access policies • Decentralized administration: owner of a table can allow further delegation |
|
|
Term
| In database terms, access rights |
|
Definition
• Rights include create, insert, update, delete, read, write • Granularity can vary: database, table, column, row • Rights may be data-dependent |
|
|
Term
| Three basic categories of database users |
|
Definition
• Application owner: owns DB objects • End user: operates on objects, but doesn’t own them • Administrator: makes access decisions, but might not have access to data (by default) |
|
|
Term
| Authentication can be done using any mechanism the DBMS supports |
|
Definition
• Login via password • Access from a particular machine • Access from a particular application • Authenticating via public-key methods |
|
|
Term
| Security holes can occur when assumptions about identity are violated |
|
Definition
• Application credentials are copied • DB administrator account is compromised • “Backup user” account does real queries • HVAC controls are allowed inside a “secure” network from which all accesses are allowed… |
|
|
Term
|
Definition
authorized queries can lead to deduction of unauthorized data • Combining non-sensitive items allows construction of sensitive information • Combining data items allows inference of sensitive data |
|
|
Term
| How to prevent compromise like query size restriction? |
|
Definition
| limit the size of the result set |
|
|
Term
| How do you prevent compromise like query set overlap control |
|
Definition
Keep a record of all previous queries • Deny queries that have too large of an overlap with prior queries |
|
|
Term
| How do you prevent compromise in partitioning? |
|
Definition
| Partitioning groups records into disjoint groups |
|
|
Term
| How do you prevent compromise in perturbation |
|
Definition
| ❖ Instead of trying to prevent information leakage, make results fuzzy |
|
|
Term
| Securing cloud storage is possible with |
|
Definition
• Encryption to keep data safe from prying eyes • Auditing to ensure that the provider still has your data |
|
|
Term
| Malcode that requires host program |
|
Definition
-Trapdoors -Logic bombs -Trojan horses -Viruses |
|
|
Term
| Malcode that is independant |
|
Definition
|
|
Term
| ILoveYou, Melissa, Fizzer are examples of |
|
Definition
|
|
Term
|
Definition
| Program does something useful, but designer leaves a back door through which she can get it in user's stuff |
|
|
Term
|
Definition
| preserve access even after someone has finished the job |
|
|
Term
| Logic bombs are like trap doors in that |
|
Definition
program usually does what it’s supposed to do |
|
|
Term
|
Definition
After a set of conditions are met, “bomb” goes off • Program refuses to run • Program runs, but gives incorrect output • Program runs, but gives subtly incorrect output |
|
|
Term
|
Definition
Payroll program refuses to run unless “N. Coder” is on the payroll • Payroll program stops, asks for password on a certain date • Payroll program rounds taxes down, gives extra fractional cents to single person |
|
|
Term
|
Definition
• Consists of relatively small amount of code • Code harmless on its own: needs a “host” program to replicate • Damage often in the form of resource usage / denial of service |
|
|
Term
|
Definition
• Compressing itself • Becoming polymorphic: changing the bytes that make up its code • Not acting until it’s ready to do damage |
|
|
Term
| For detecting viruses you should look out for |
|
Definition
-Modification times of code -MD5/SHA1 signature -Sequences of bytes that appear in the virus -Programs doing things they shouldn’t do |
|
|
Term
| How do worms differ from viruses? |
|
Definition
| typically use background processes (daemons) to run |
|
|
Term
| Buffer overflow attacks are basically |
|
Definition
| results from input that is longer than the implementor intended. |
|
|
Term
| Heap overflows can alter programs behavior by |
|
Definition
write values to adjacent variables • Change permissions on an object • Change a program’s state (and thus behavior) • Change other “interesting” values |
|
|
Term
| Preventing buffer overflow attacks. Name three different ways |
|
Definition
Use run-time checks on all memory references • Safe languages (Python, Java, Perl, etc.) • Safe libraries for C (don’t use gets, strcpy, etc.) ❖ Separate code and data segments • Make code segment unwriteable (once application loaded) • Only allow jumps to code segment • Turn off execution bits for data segment • Check jumps as they happen (compiler-driven) ❖ Random placement of structures in memory • Makes it more difficult to write an attack that works on every invocation ❖ Static analysis • Check binary or source code ❖ “Canary words”: randomly-chosen values to detect when an overflow occurs |
|
|
Term
| Example of a String format attacks |
|
Definition
val1 = “One thing”; val2 = “Another”; s = “%s -> %s”; printf (s, val1, val2); |
|
|
Term
| Stack smashing is a type of |
|
Definition
|
|
Term
| Code injection exploits a bug by |
|
Definition
processing invalid data which causes the program to execute instructions not originally intended by the designer |
|
|
Term
| What does Eval injection do? |
|
Definition
| pass valid code to be evaluated in a scripting language |
|
|
Term
| What does shell injection do? |
|
Definition
| pass a valid command to be run with exec (or similar) |
|
|
Term
| What does include file injection do? |
|
Definition
| pass the name of a file to be included (via HTML or otherwise) |
|
|
Term
| Best why to prevent SQL injection? |
|
Definition
| verify all inputs at the server side and use cryptographic techniques to verify veracity |
|
|
Term
| Cross-site scripting (XSS) is a type of |
|
Definition
|
|
Term
| Why is it important for server-side scripts to sanitize info from the user? |
|
Definition
the result can cause the client’s browser to do unpredictable things... • Navigate to a URL • Send data to a third site! |
|
|
Term
| Cross-site scripting injects code directing that information |
|
Definition
|
|
Term
|
Definition
| server-side or client-side |
|
|
Term
| An example of a XSS non-persistent attack |
|
Definition
| Send a link to someone that when clicked opens a script that runs a evil program. |
|
|
Term
| XSS example of a persistent attack |
|
Definition
| Url containing the script to run a bad program is already on a page that has been posted from a blog post or a comment |
|
|
Term
|
Definition
| set of software to maintain root access to a system |
|
|
Term
| Rootskits are typically installed via |
|
Definition
|
|
Term
| How do you typically recover from a rootkit attack |
|
Definition
| requires reinstalling the OS |
|
|
Term
|
Definition
❖ Intercept system calls ❖ Modify files on disk ❖ Actively counter attempts to “win back” the system |
|
|
Term
| So how can we classify malcode? |
|
Definition
• Understand techniques used by malcode • Understand how to defend against them |
|
|
Term
| How should one prevent malcode from running |
|
Definition
• Virus scanners: recognize known malcode • Firewalls: strip malcode from incoming packets • Education: make users smarter |
|
|
Term
| How can you limit damage malcode can do? |
|
Definition
• Sandbox (“playpen”, “jail”): run malcode in protected virtual machine • Reference monitors: enforce policy on execution • System maintenance |
|
|
Term
How can we ensure that software is run securely? |
|
Definition
❖ Constrain program behavior ❖ Make potentially harmful code less likely ❖ Ensure program integrity |
|
|
Term
| Reference monitors prevent against what kind of attack? |
|
Definition
|
|
Term
| How can you prevent against stack-smashing |
|
Definition
• Writes a “canary” word adjacent to the return address • If word is modified, don’t return to the address |
|
|
Term
| What's a problem of using MemGuard? |
|
Definition
| can be inefficient when many words share the same page as the return address and can be slower |
|
|
Term
| What is Software fault isolation (SFI)? |
|
Definition
| Get memory safety by inserting checking instructions around loads, stores, and jumps |
|
|
Term
| What provides reference monitors for most security-critical resources? |
|
Definition
|
|
Term
| OS systems as reference monitors use very ___ -grained monitoring |
|
Definition
|
|
Term
|
Definition
a software construct that only allows access to a limited set of resources |
|
|
Term
| What is the goal of sandboxing? |
|
Definition
| Limit the damage malcode can do |
|
|
Term
| If a vendor refuses to provide source code they may |
|
Definition
|
|
Term
| How can you tell program was written in the safe language? |
|
Definition
• Get the source code and compile it • Special compilation service signs object files generated from the safe language • Verify that object files preserve safety properties of source language (Java) |
|
|
Term
| What does Bytecode verifier do? |
|
Definition
❖ Checks that JVML code satisfies Java™’s safety properties ❖ Type safe – stack and variable slots must store and load as same type ❖ Memory safe (guaranteed by instruction set) ❖ Control flow safe: jumps must be within function, or call/return |
|
|
Term
| Biggest problem in security with Python |
|
Definition
| eval-type calls could be evaluating anything |
|
|
Term
| In Python, everything is a |
|
Definition
|
|
Term
| Often better to have testing done by someone who |
|
Definition
|
|
Term
| For error handling is typically easier to |
|
Definition
| do with exception handling rather than extensive checking |
|
|
Term
| With code to update a password record elevate to root only in the code |
|
Definition
| that actually updates the password file |
|
|
Term
| Users can control their execution environment with |
|
Definition
• Loaded libraries • Default search paths for binaries • Environment variables |
|
|
Term
| You might think that ls is a harmless program, but it need not be… |
|
Definition
libc can easily be modified and then used in a program that runs as root! |
|
|
Term
| To ensure that code is from a “reputable” place you should |
|
Definition
| get it only from the author and use cryptographic techniques(Sign the code (actually a hash of the code) with the author’s private key and make the public key widely known |
|
|
Term
| What are the problems of signed code? |
|
Definition
how do we check the signature? what if someone steals the private key? what if the author knowingly (or unknowingly) signs malcode? individual modules are signed, but collective program has a security hole |
|
|
Term
| For content-derived names you should |
|
Definition
| Name code objects with cryptographic hashes |
|
|
Term
| Statistical anomaly detection |
|
Definition
• Produce a profile of the normal behavior of each user (or independent of user) • Notice statistical deviations from that behavior |
|
|
Term
|
Definition
• Think really hard and make up rules that describe intruder behavior • Hope intruders can’t read and figure out the rules also • Lay traps that normal users won’t trigger… |
|
|
Term
| How do you detect SYN floods |
|
Definition
| Firewall (or other gateway) notices large number of SYN packets but few ACK packets |
|
|
Term
|
Definition
Firewall temporarily suspends delivery of SYN packets. Unfortunately, nobody can connect to those hosts while they’re being protected |
|
|
Term
| For network intrusion detection you should |
|
Definition
❖ Monitor activity on many hosts ❖ Aggregate audit records to detect anomalous behavior • Innocuous behavior on several (individual) hosts may signal an intrusion • Example: limited (or slow) port scan across many computers in sequence ❖ Managed Security Monitoring (Counterpane, Inc.) |
|
|
Term
| Network intrusion detection you should |
|
Definition
| scan computer sequentially |
|
|
Term
| Network intrusion detection you should |
|
Definition
| scan computer sequentially |
|
|
Term
| For network intrusion detection firewalls should |
|
Definition
| examines all packet, take action against intruder, should see all port scan packets destined for any computer |
|
|
Term
| If all of network attacks come from one IP address you should |
|
Definition
| check for network-type attacks coming from a small set of IP addresses |
|
|
Term
| Rule-based intrusion detection example is |
|
Definition
set up fake user accounts and passwords and make them more than one character different from “real” user names. If someone attempts to log into a fake account several times, it’s probably an intruder |
|
|
Term
| Rule-based intrusion detection example of a simple rule is |
|
Definition
| all data sent to the SMTP (mail) port must be textual, and must have line length < 80 |
|
|
Term
Rule-based intrusion detection example |
|
Definition
| Simple rule: incoming HTTP packets may not contain Java applets |
|
|
Term
| A problem with Rule-based intrusion detection is you can’t tell the difference between “good” and “bad” Java so what should you do? |
|
Definition
| Try to recognize incoming Java known as malicious. Also try to recognize attacks by keeping signatures of Java files that have come in recently, to prevent repeat offenders. |
|
|
Term
| A Rule-based intrusion detection for malware is |
|
Definition
| user-run programs should never change ownership of a file to root |
|
|
Term
| Intrusion detection & prevention is hard you should use |
|
Definition
|
|
Term
| Service control in firewalls |
|
Definition
• Determine which services can be accessed • Disallow those that might be risky |
|
|
Term
| Direction control in firwalls |
|
Definition
• Control the direction in which certain services are available • Network Address Translation may help with this… |
|
|
Term
| User control in firewalls |
|
Definition
Control access to services based on user • Requires that users authenticate themselves somehow |
|
|
Term
| Behavior control in firewalls |
|
Definition
• Disallow dangerous behaviors • Example: filter email for viruses • Example: allow only certain types of HTTP requests |
|
|
Term
| The rules of firewall packet filters are based on |
|
Definition
• IP addresses • Protocol • Port number • Packet content? |
|
|
Term
| What are the limits of firewall filtering |
|
Definition
❖ Firewall can only filter on individual packet contents ❖ May be vulnerable to address spoofing Better solution: allow firewall to filter on entire sessions, not just individual packets |
|
|
Term
| Stateful Packet Inspection (SPI) |
|
Definition
Keep track of history of packets • Allow filtering and actions based upon history! |
|
|
Term
| To protect your networks against intruders you should deploy |
|
Definition
• Application-level gateways (proxy servers) • Circuit-level gateways (SOCKS) • Bastion hosts • Honeypots |
|
|
Term
| You should run applications on proxy server that relay information between inside and outside like |
|
Definition
| HTTP Proxy and mail servers |
|
|
Term
| To make security easier: single point to secure, but the drawbacks |
|
Definition
| Slower and you have to set up a proxy for every protocol |
|
|
Term
| Circuit-level gateway (SOCKS) |
|
Definition
❖ Proxy server requires one proxy per application ❖ Circuit gateway does its work at the TCP level |
|
|
Term
| What are the advantages for Circuit-level gateway (SOCKS) |
|
Definition
• Simpler than using a separate proxy for each service • Other advantages of proxy server (monitoring, etc.) |
|
|
Term
| Drawbacks of Circuit-level gateway (SOCKS) |
|
Definition
• May require changes on client side • Still somewhat slow: SOCKS server acts as relay |
|
|
Term
| This single server is often called a |
|
Definition
|
|
Term
| Bastion host can have simpler, more secure code |
|
Definition
• Proxies are often smaller than full servers • Proxies need not perform disk access • Proxies don’t permanently store any sensitive data • Proxies can run as normal users (not root) |
|
|
Term
| For good defense how many firewalls and bastion hosts should you have |
|
Definition
|
|
Term
|
Definition
❖To keep the system safe, set up resources that an attacker can (relatively easily) get a hold of ❖ Make sure that these resources can’t lead to further breakins ❖ Keep the intruder on the system as long as possible to trace where he’s coming from! |
|
|
Term
| Disadvantage of making a honeypot on VM is |
|
Definition
| A smart hacker knows if the user is using a VM |
|
|
Term
| For honeypots in VM you should |
|
Definition
• Restrict calls that read or write the file system • Limit the ability to create new processes or allocate memory • Limit the programs that are available |
|
|
Term
| The issues of using VMs as sandboxes are |
|
Definition
• Performance is a bit slower • Intruders may be able to compromise the underlying hypervisor: very difficult to respond in this case! • Taking down a hypervisor kills many VMs! • Intruder may be able to override resource isolation |
|
|
Term
| What should you do if an intrusion is detected in sandbox? |
|
Definition
❖ Log intruder’s actions to a “safe” computer ❖ Contact system administrator (email and/or page) ❖ Shut down system ❖ Do several of the above |
|
|
Term
| How would you restore from an attack |
|
Definition
❖ Restore files from a backup ❖ Reinstall as much as you can ❖ Use a file system that doesn’t overwrite in place |
|
|
Term
| How would one perform a basic DoS attack? |
|
Definition
• Use buffer overflows to subvert local programs • More common: use remote systems to send a flood of requests at the server |
|
|
Term
| How do you deal with botnets? |
|
Definition
❖ Go after a botnet by attacking its control nodes ❖ Behavior-based tracking: figure out who’s sending messages to the zombie computers ❖ Code analysis: read the code and use that to find the address on the zombie computers |
|
|
Term
| What are the challenges in intrusion detection |
|
Definition
❖ The first thing a smart intruder will do is tamper with the intrusion detection system! ❖ Few activities are either obviously normal or obviously malicious ❖ False positives dilemma |
|
|
Term
|
Definition
|
|
Term
|
Definition
| that it meets the necessary security requirements |
|
|
Term
| The different types of security policies are |
|
Definition
|
|
Term
| General goal of security policies is |
|
Definition
|
|
Term
|
Definition
❖ Information ranked by sensitivity level ❖ Information access limited by “need-to-know” ❖ Access to information requires |
|
|
Term
|
Definition
No security clearances (usually) No dominance function (usually) |
|
|
Term
| Security model based on this approach is |
|
Definition
|
|
Term
| Bell-La Padula confidentiality model |
|
Definition
❖ Basis for Department of Defense evaluation criteria ❖ Information flows up! |
|
|
Term
|
Definition
Ordering is on integrity: I(s) or I(o) • Write: s can write o only if I(s) ≥ I(o) • Read: if s has read access to o, s can have write access to p iff I(o) ≥ I(p) |
|
|
Term
| Bell-La Padula and Biba only address |
|
Definition
|
|
Term
| Security considerations have to be central in designing a |
|
Definition
|
|
Term
| Security in normal operating systems |
|
Definition
❖ User authentication ❖ Memory protection ❖ Access controls for files & I/O devices ❖ Allocation controls for objects ❖ Sharing enforcement: require users to share resources ❖ Guarantee of fair service ❖ Interprocess communication ❖ Self-protection: OS must guard its own data ❖ All of these are necessary for minimal security |
|
|
Term
| Centralize access control decisions in Mandatory (non-discretionary) access control is |
|
Definition
• Owner of an object can’t decide on access to it • Access rights granted by higher-level policy • Example: military security • Users can’t determine the access rights for their own objects |
|
|
Term
| For deleting data it is best to |
|
Definition
• Overwrite space with a fixed pattern (usually 0s or 1s) • Overwrite space several times with fixed or random pattern |
|
|
Term
| Intruder may spoof a login screen or other access mechanism, so what do you do to make it safe? |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| portion of the security kernel that actually controls accesses to objects |
|
|
Term
| TCB: all of the parts of the trusted OS that we have to trust |
|
Definition
• Security kernel / reference monitor (of course) • Processes • Memory management • Interprocess communication • Some files |
|
|
Term
|
Definition
Process activation • Execution domain (protection domain) switching • Memory protection • I/O operations & protection |
|
|
Term
| Structuring OS for secure design tips |
|
Definition
❖ Layering is a good idea • Put more secure-critical functions (as in the TCB) in the innermost layer • Layers towards the outside are less trusted • Can’t modify structures in inner layers • Inner layers can (possibly) modify things in outer layers ❖ Trust the inner layers more • Security kernel fully (?) trusted • Outer layers not trusted as much ❖ Isolation improves security and trust |
|
|
Term
| A goal of securing your system is |
|
Definition
| make it more difficult to compromise |
|
|
Term
| For planning security you should set a plan with |
|
Definition
• Policy • Current state • Requirements • Recommended controls • Accountability • Timetable • Continuing attention |
|
|
Term
| What does the system need to do to ensure a “secure” environment? |
|
Definition
|
|
Term
|
Definition
|
|
Term
| Important to treat risk analytically |
|
Definition
• Risk impact: what if something bad happens? • Risk probability: how likely is the risk to occur? • Risk control: can we make the risk less likely to occur? • How much does it cost to do this? • Risk exposure: impact * probability |
|
|
Term
| Why is understanding risk difficult? |
|
Definition
❖ Risk is emotional ❖ Some risks are too infrequent to worry about ❖ People are bad at estimating risk ❖ People worry about things about which they can do nothing |
|
|
Term
| For risk analysis your assets are |
|
Definition
• Hardware & software • Data • People (time!) |
|
|
Term
| Policy must identify balance needs of groups like |
|
Definition
• Users: people who use the resources • Owners: people who own the resources • Beneficiaries: people who benefit from the resources |
|
|
Term
| What makes a good policy? |
|
Definition
❖ Coverage ❖ Realism ❖ Usefulness ❖ Durability CRUD |
|
|
Term
| Non-technical threats often are |
|
Definition
• Localized (weather, vandalism, etc.) • Somewhat random (though not always) |
|
|
Term
|
Definition
| See what’s on the screen using EM radiation |
|
|
Term
|
Definition
information that belongs to someone • Book • Movie • Program • Secret formula |
|
|
Term
| Intellectual property may be protected by |
|
Definition
• Copyright • Patent • Trade secret |
|
|
Term
|
Definition
❖ Designed to protect the expression of ideas ❖ Limited in time ❖ Public domain |
|
|
Term
| Copyrighted item is subject to |
|
Definition
|
|