Shared Flashcard Set

Details

Comptia Security+
Comptia Security+ Study
179
Computer Science
Professional
04/27/2008

Additional Computer Science Flashcards

 


 

Cards

Term
C.I.A. of Security
Definition
Confidentiality
Integrity
Availability
Term
Operational Model of Security
Definition
Protection = Prevention + Detection + Response
Term
Least Privilege
Definition
Give only the absolute minimum rights and privileges needed
Term
Layers of Security
Definition
Multiple barriers working in conjunction help eliminate single points of failure
Term
Diversity of Defense
Definition
Layers of security should be implemented using dissimilar methods and vendors.

Layers should be so dissimilar that if one layer is penetrated, the next layer cannot be penetrated using the same method.
Term
Security Through Obscurity
Definition
Ice cream hidden in the back of the freezer will be found
Term
Keep it Simple (Stupid) (KISS)
Definition
1. Turn off nonessential services, etc
2. Complex systems are difficult to secure
Term
Access Control
Definition
The ability of a subject to interact with an object
Term
Access Control List (ACL)
Definition
A list stating who has specific types access to what
Term
Discretionary Access Control (DAC)
Definition
Access control based on identity of subjects or groups to which they belong

*Certain subjects (eg "Owner") may pass permissions on to any other subject
Term
Mandatory Access Control (MAC)
Definition
Access control based on levels of sensitivity assigned to objects (Labels) and formal levels of authorization (ie clearance) of subjects.

These relationships are strictly enforced.
Term
Role-Based Access Control (RBAC)
Definition
Access control based on subjects being assigned certain roles. Access control is managed at the role level instead of the subject level.
Term
Authentication
Definition
Verifying the identity of a subject
Term
3 general Authentication methods
Definition
1. Something you know (ie password)
2. Something you have (ie token)
3. Something you are (ie biometrics)
Term
Kerberos
Definition
Network authentication protocol

Ticket, Authentication Server(AS)
Time-based

Driver's license analogy?
Term
Replay Attack
Definition
Term
CHAP
Definition
Challenge Handshake Protocol
-authentication across a point-to-point link using PPP
-challenge/response (3-way handshake)
Term
Three-way Handshake
Definition
Term
Certificate
Definition
Term
Token
Definition
Hardware device? used in authentication (something you have)
(e.g. RSA secureToken)
Term
Multifactor Authentication
Definition
Uses more than one authentication mechanism at the same time (ie ATM card + PIN)
Term
Mutual Authentication
Definition
Authentication of both sides of a communication. Helps prevent man-in-the-middle attacks.
Term
Information Assurance
Definition
Term
Information Security
Definition
Term
Nonrepudiation
Definition
Nonrepudiation is a way to
guarantee that senders cannot deny they sent a message
Term
TCP 3-way Handshake
Definition
SYN ->
<- SYN/ACK
ACK ->
Term
DOS Attack
Definition
Denial of Service Attacks aim to disrupt the availability of services
Term
SYN Flood
Definition
DOS attack exploiting the TCP 3-way handshake. A multitude of SYN requests are sent to the target. The target responds with a SYN/ACK and waits for a default period for an ACK. The attacker will never reply so the target may use up all it available connections.
Term
DDOS Attack
Definition
Distributed Denial of Service attacks rely on using multiple computers to conduct DOS attacks.
Term
Backdoor/Trap Door
Definition
Term
Root kit
Definition
Term
Sniffing
Definition
Term
Spoofing
Definition
Making data look like it's coming from a different source than it is.
Term
Smurf Attack
Definition
DOS attack where the attacker sends ICMP echo requests to the broadcast address of a network with the From address spoofed to be the IP address of the target.
Term
Man-in-the-Middle Attack
Definition
An attack in which the attacker will intercept communications between two parties and modify the messages between them.???
Term
Replay Attack
Definition
Attackers "record" portions of conversations (eg authentication sequences) and then replay them at a later time
Term
Brute-force attack
Definition
A method of finding a cryptographic or other key by systematically trying all possible combinations of keys
Term
Indirect attack
Definition
A method of breaking a cryptographic or other system by attacking the implementation of the system/algorithm rather than the system itself (ie using a weakness in a key exchange to find a key rather than using a brute-force attack)
Term
Dictionary attack
Definition
A method of finding a key by trying many commonly used or probable keys (ie guessing a password using all the words in an English dictionary)
Term
Birthday Attack
Definition
Term
Birthday Paradox
Definition
Term
Buffer overflow exploit
Definition
Term
Virus
Definition
Malicious software that self-replicates by copying itself to other executable files.
Term
Trojan
Definition
Malicious software that masquerades as useful software. Trojans rely on the end-user to run them.
Term
Logic-bomb
Definition
Malicious software installed by an authorized user that is designed to drop it's payload at a designated time or after a set of conditions ha been met
Term
Worm
Definition
Malicious, self-replicating software that runs stand-alone/without the need for a host
Term
Social Engineering
Definition
Con-artistry. An indirect attack on a system that relies on the inherent trusting nature, or gullibility of human beings.
Term
War-driving
Definition
Listening for the presence of wireless networks while driving
Term
Telnet
Definition
Standard, insecure TCP/IP remote terminal session protocol
Term
Telnet Standard Port #
Definition
23
Term
SSH
Definition
Secure Shell - ????????????
Term
SSH Standard Port #
Definition
22
Term
Tunneling
Definition
The encapsulation of one packet in another.

Encapsulation can allow you to obfuscate communications or to change the network transport method.

The contents of the data traveling within a tunnel only needs to be understood by the tunnel end-points.
Term
PPTP
Definition
Point-to-Point Tunneling Protocol
-Layer 2
Term
PPP
Definition
???Point-to-Point Protocol - isawidelyusedprotocolforestablishingdial-incon-
nectionsoverseriallinesorISDNservices.PPPhasseveralauthenticationmechanisms,
includingPasswordAuthenticationProtocol(PAP),ChallengeHandshakeAuthentica-
tionProtocol(CHAP),andtheExtensibleAuthenticationProtocol(EAP).Theseproto-
cols are usedtoauthenticate the peer device, not a user of the system. PPPis a
standardizedInternetencapsulationofIPtrafficoverpoint-to-pointlinks,suchasserial
lines. The authentication process is performed only when the link is established.
Term
GRE
Definition
Generic Routing Encapsulation(GRE)
Term
CHAP
Definition
Term
PSTN
Definition
Public switched telephone network = POTS
Term
POTS
Definition
Plain Old Telephone Service = PSTN
Term
L2TP
Definition
/?? Layer 2 Tunneling Protocol
Term
L2TP Control Port #
Definition
1701
Term
PPTP Port Number
Definition
1723
Term
802.16
Definition
Wireless MANs
Term
WEP
Definition
Wired Equivalent Privacy - fail
40 or 128bit RC4 stream cipher
Static shared secret, variable initialization vector
Term
VPN
Definition
Virtual Private Network- an encrypted tunnel between two nodes over a public network.
Term
IPSec
Definition
??? IP Security -
IETF based Layer 3 set of protocols for the secure exchange of packets

IPsec has two defined methods—transport and tunneling—and these
two methods provide different levels of security.IPsec also has three modes of connection: host to server, server to server, and host to host.
Term
IPSec Transport Method
Definition
Encrypts only the data portion of the packet, still exposing the source and destination address. "content protection"
Term
IPSec Tunneling Mode
Definition
Encrypts the entire packet including the source and destination addresses, and the data portion. The encrypted packet must be encapsulated. (Context protection)
Term
Content protection
Definition
Obfuscation of the data within a conversation
Term
Context protection
Definition
Obfuscation of the identity of the sender and receiver of data
Term
Diffie-Hellman Key Exchange
Definition
Term
Authentication Header (AH)
Definition
IPsec uses two protocols to provide traffic security.
when added to an IP datagram, ensures the integrity
of the data and also the authenticity of the data’s origin. By protecting the non-changing
elements in the IPheader,the AH protects the IPaddress,which enables data-origin authentication.
Term
Encapsulating Security Payload (ESP)
Definition
IPsec uses two protocols to provide traffic security:

TheEncapsulatingSecurityPayload(ESP)providessecurityservicesforthe
higher-level protocol portion of the packet only, not the IP header.
Term
Internet Security Association and Key Management Protocol (ISAKMP)
Definition
For key management and exchange, three protocols exist:
• Internet Security Association and Key Management Protocol (ISAKMP)
• Oakley
• Secure Key Exchange Mechanism for Internet (SKEMI)
ThesekeymanagementprotocolscanbecollectivelyreferredtoasInternetKeyManage-
ment Protocol (IKMP) or Internet Key Exchange (IKE).
Term
Oakley
Definition
For key management and exchange, three protocols exist:
• Internet Security Association and Key Management Protocol (ISAKMP)
• Oakley
• Secure Key Exchange Mechanism for Internet (SKEMI)
ThesekeymanagementprotocolscanbecollectivelyreferredtoasInternetKeyManage-
ment Protocol (IKMP) or Internet Key Exchange (IKE).
Term
Secure Key Exchange Mechanism for Internet (SKEMI)
Definition
For key management and exchange, three protocols exist:
• Internet Security Association and Key Management Protocol (ISAKMP)
• Oakley
• Secure Key Exchange Mechanism for Internet (SKEMI)
ThesekeymanagementprotocolscanbecollectivelyreferredtoasInternetKeyManage-
ment Protocol (IKMP) or Internet Key Exchange (IKE).
Term
IPSec "security association"
Definition
Term
IEEE 802.1x
Definition
Term
RADIUS
Definition
?????Remote Authentication Dial-In User Service
Term
AAA Protocol
Definition
look itup
Term
DIAMETER
Definition
???DIAMETERisaproposednameforthenewAAAprotocolsuite,designatedbytheIETF
toreplacetheagingRADIUSprotocol
Term
TACACS+
Definition
Term
Kerberos Port #
Definition
88
Term
AAA
Definition

Access Control,

Authentication,

Auditing

Comptia
Term
MIT Kerberos Maximum Time Delta
Definition
10 minutes
Term
Microsoft Kerberos Maximum Time Delta
Definition
5 minutes
Term
monkey-in-the-middle
Definition
?
Term
snoop
Definition
solaris built in sniffer
Term
tcpdump
Definition
unix built in sniffer
Term
nessus
Definition
Vulnerability Scanner
Term
wireshark
Definition
network sniffer (formerly ethereal)
Term
2 Roles of KDC
Definition
AS - Authentication Server
TGS - Ticket Granting Server
Term
Ticket Granting Ticket (TGT)
Definition
Cached Authentication Credential from TGS allows client to request Session Ticket
Term
Session Ticket
Definition
Authentication Credential from KDC allows client access to resource server
Term
EAP
Definition
????EAP, defined by RFC 3748, is an authentication framework providing
a functionality for a variety of authentication mechanisms. It does not
provide encryption itself, but rather the ability to utilize several encryp-
tion methods within an authentication construct.
Term
EAP-TLS
Definition
???? EAP-TLS is considered a very secure form of authentication as it
employs the security of TLS, which is the successor to SSL, and makes use
of both server-side and client-side certificates. Although considered very
secure (especially when client-side certificates are stored on devices like
Smart Cards), the overhead of this form of authentication keeps it from
being a more frequently implemented solution.
Term
EAP-TTLS
Definition
?????EAP-TTLS also provides very good security utilizing Public Key
Infrastructure (PKI) certificates on the authentication server only to
create a tunnel between the client and the server.
Term
PEAP
Definition
????PEAP is the result of a joint development effort from Microsoft, Cisco
Systems, and RSA Security. Like EAP-TTLS, it provides security via server-
side PKI certificates. There are at least two sub-types of PEAP certified
for the WPA and WPA2 standard: PEAPv0/EAP-MSCHAPv2 (Microsoft
Challenge Handshake Authentication Protocol) and PEAPv1/EAP-GTC
(Generated Token Card)
Term
TLS
Definition
??? new version of ssl
Term
supplicant
Definition
???
Term
authenticator
Definition
????
Term
LEAP Cisco
Definition
???
Term
EAP over IP (EAPoIP)
Definition
Term
EAP-MD5-CHAP
Definition
??? Message Digest Algorithm/Challenge-Handshake Authentication Protocol
Term
stream cipher
Definition
????
Term
Carrier Protocol
Definition
RE:TUNNELING The protocol used by the network (IP on the
Internet) that the information is traveling over
Term
Encapsulating Protocol
Definition
RE: TUNNELING This term includes both the tunneling protocol
(PPTP,L2TP) and the encrypting protocol (IPSec,Secure Shell [SSH])
that is wrapped around the original data
Term
Passenger Protocol
Definition
RE: TUNNELING The original data being carried
Term
3 protocols required for tunneling
Definition
Carrier Protocol
Encapsulating Protocol
Passenger Protocol
Term
2 types of VPNs
Definition
site-to-site and remote access
Term
VPDN
Definition
virtual private dial-up network
Term
POP
Definition
Point of Presense
Term
TACACS+ Transport Protocol
Definition
TCP
Term
RADIUS Transport Protocol
Definition
UDP
Term
TACACS Transport Protocol
Definition
UDP
Term
PPTP Transport Protocol
Definition
TCP
Term
L2TP Transport Protocol
Definition
UDP
Term
L2TP uses _______ for encrypted tunnels
Definition
IPSec
Term
PPTP only works over ___ networks
Definition
IP
Term
IPSec Layer
Definition
Network
Term
IPSec Mode where only the data(payload) is encrypted
Definition
Transport Mode
Term
IPSec Mode where data and IP headers are encrypted
Definition
Tunnel Mode
Term
IKE
Definition
Internet Key Exchange is used to authenticate the two
ends of a secure tunnel by providing a secure exchange of a shared key before
IPSec transmissions begin.
Term
ISAKMP
Definition
????
Term
HMAC
Definition
Hashed Message Authentication Code
Term
MIME
Definition
Multi-Purpose Internet Mail
Extensions
Term
S/MIME encryption algorithms
Definition
DES, 3DES, RC2
Term
PGP
Definition
Pretty Good Privacy ?????????????
Term
DNSBL
Definition
DNS Blackhole List
Term
FCrDNS - Forward Confirmed reverse DNS
Definition
Verifies that an email's originating IP address matches the fqdn used in the email's "from address" by doing a reverse DNS lookup on the IP, a nslookup on the fqdn, and then comparing.
Term
zero day
Definition
a vulnerability that is not known to the security public and therefore no protections, patches, or detection signatures exist for it
Term
cipher text attack?? pgp???

PGP can fall victim to a _________________ attack,which occurs when a
hacker creates a message and sends it to a targeted userid with the expectation
that this user will then send the message out to other users.When a targeted
user distributes a message to others in an encrypted form,a hacker can listen
to the transmitted messages and figure out the key from the newly created
ciphertext.
Definition
?????????????
Term
Bastion Host
Definition
System located in a DMZ that has been hardened against hackers
Term
DNS Zone Transfer
Definition
???
Term
Intranet
Definition
Every part of a network that lies on the
inside of the last firewall from the Internet
Term
proxy server
Definition
a server that sits between an intranet and its Internet
connection and handles requests to access internet resources on behalf of intranet clients
Term
extranet
Definition
Networking zone walled off from the general public, but open to certain authenticated hosts. Access to an extranet does not give access to the intranet.
Term
honeypot/net
Definition
honeypot is a computer system/network that is deliberately exposed to public access for the express purpose of attracting and distracting attackers.
Term
IDEA Key Length
Definition
128 bits
Term
DES Key Length
Definition
56 bits
Term
DES Blocksize
Definition
64 bits
Term
IDEA blocksize
Definition
64 bits
Term
IDEA Trivia
Definition
used in PGP,
Term
Skipjack trivia
Definition
NSA for clipper and capstone chips, requires key escrow (ie nsa has your secrets)
Term
skipjack key length
Definition
80 bits
Term
skipjack blocksize
Definition
64 bits
Term
gost trivia
Definition
russian,
Term
gost key size
Definition
256 bits
Term
blowfish trivia
Definition
designed to be fast on 32bit procs
Term
blowfish key length
Definition
up to 448 bits
Term
RC 5
Definition
RSA variable length block-cipher
Term
RC 4
Definition
RSA variable length stream cipher
Term
size of MD5 hash
Definition
128 bits
Term
SHA 1 Hash Size
Definition
160 bits
Term
MAC
Definition
Message authentication code is a key-dependent one-way hash
function.
Term
PGP
Definition
freeware electronic-mail security program, originally designed by Philip Zimmermann [1652]. It uses IDEA for data encryption, RSA (with keys up to 2047 bits) for key management and digital
signatures, and MD5 as a one-way hash function. Key distribution and revocation is done ad-hoc w/ a web of trust model
Term
LFM
Definition
Log File Monitor is an IDS that reads log files to determine if the network is under attack
Term
SIV
Definition
System Integrity Verifier is an IDS that notifies when essential files have changed
Term
KHMAC
Definition
Key Hashing for Message Authentication Code is used to digitally sign packets on IPSec connections
Term
Number of Rounds for DES
Definition
16
Term
Number of rounds for 3DES
Definition
48
Term
L2TP Port
Definition
1701
Term
Kerberos Port
Definition
88
Term
802.11 Media Access method
Definition
CSMA/CA
Term
802.3 Media Access Method
Definition
CSMA/CD
Term
WEP Low Security key size
Definition
nominally 64 bits
Term
WEP high security key size
Definition
128 bits
Term
X.509 version 1 certificate (vs version 2 & 3)
Definition
??????????
Term
Bluetooth promiscuous security mode
Definition
SM1
Term
Bluetooth security modes
Definition
SM1(promiscous) < SM2 (establish security after pairing) < SM3 (establish security required first)
Term
Microsoft's Tunneling Protocol
Definition
PPTP
Term
AH Port
Definition
50
Term
ESP Port
Definition
51
Term
L2TP Packet Header Protocol Field Number
Definition
115
Term
TCP Packet Header Protocol Field Number
Definition
6
Term
UDP
Definition
17
Term
ICMP
Definition
1
Term
IGMP
Definition
2
Term
SMIME RFC #s
Definition
2632 , 2634
Supporting users have an ad free experience!