Term
|
Definition
| Subject S with Clearance (Ls, Cs) may be granted write access to object O with classification (L0, C0) only if (Ls, Cs) <= (L0, C0) |
|
|
Term
| Advanced Encryption Standard (AES) |
|
Definition
| A specification for the encryption of electronic data. It was adopted by the US government and is now used worldwide. |
|
|
Term
|
Definition
A modal logic of belief. Wikipedia: A set of rules for defining and analyzing information exchange protocols |
|
|
Term
| Bell-LaPadula Model (BLP) |
|
Definition
| Wikipedia: State machine model for enforcing access control in government and military applications. Uses simple security Property and *-property. |
|
|
Term
| Biba's Low Water Mark Policy |
|
Definition
Where an attribute monotonically floats down when something low reads it. A subject's integrity level fails if it ever reads low integrity information. If s reads o then i'(s) = min(i(s), i(o)), where i'(s) is the subject's new integrity level after the read. |
|
|
Term
|
Definition
| More trusting of the subject, assuming that a subject can properly filter the information it receives. |
|
|
Term
| Biba's Strict Integrity Policy |
|
Definition
| A mandatory integrity access control policy and is dual of the BLP |
|
|
Term
|
Definition
| monoalphabetic cipher in which each letter is replaced in the encryption by another letter a fixed "distance" away in the alphabet |
|
|
Term
|
Definition
| monoalphabetic cipher in which each letter is replaced in the encryption by another letter a fixed "distance" away in the alphabet |
|
|
Term
|
Definition
| A security Model where read/write access to files is governed by membership of data in conflict-of-interest classes and datasets. |
|
|
Term
|
Definition
| provides a foundation for specifying and analyzing an integrity policy for a computing system. |
|
|
Term
|
Definition
| A virus that attacks unpatched machines by generating a random list of ip addresses to DDOS certain sites. Has a fixed seed and could be removed by rebooting. |
|
|
Term
|
Definition
| A virus that is the same as the version 1 except it has a random seed. |
|
|
Term
|
Definition
| A virus that exploited the buffer-overflow vulnerability in Microsoft's IIS webservers. First it determine sif the system has been infected, if not, it sets up a backdoor. Does not deface web pages or DDOS. Installs in root level and so cannot be fixed with reboot. |
|
|
Term
|
Definition
| A set of standards recognized by 26 countries of how secure systems will be evaluated. |
|
|
Term
|
Definition
| The first practical method for establishing a shared secret over an unsecured communication channel. Both sides agree on prime number p and a base g. This algorithm involved sending g^a mod p and g^b mod p. |
|
|
Term
| Evaluation Assurance Level (EAL) |
|
Definition
| A numerical grade assigned by following the completion of a Common Criteria security evaluation. The level determines the rigor that the product is tested. |
|
|
Term
|
Definition
| An encoding that is guaranteed to find an efficient code for a given language if you know the probability of the symbols. |
|
|
Term
|
Definition
| an adaptive coding algorithm used in many commercial text compression utilities. It builds an encoding on the fly according to the strings it encounters. It is asymptotically opotimal. That is as the text length tends to infinity, the compression approaches optimal. |
|
|
Term
| Lipner's integrity matrix model |
|
Definition
| Combines BLP and BIba Integrity. |
|
|
Term
|
Definition
|
|
Term
| Needham-Schroeder Protocol |
|
Definition
| This is a shared key authentication protocol designed to generate and propagate a session key. No public key infrastructure in place. This is so the receivers knows that a message is fresh. |
|
|
Term
|
Definition
| A computer network authentication protocol designed for use on insecure networks. It allows individuals communicating over network to prove their identity to each other while preventing eavesdropping or replay attacks. Allows detection for modification. |
|
|
Term
|
Definition
|
|
Term
| Pretty Good Privacy (PGP) |
|
Definition
| It is a encryption that uses the best available cryptographic algorithms as building blocks and integrates them into a general purpose algorithm. It is packaged and has documentation including source code. |
|
|
Term
| Principle of Easiest Penetration |
|
Definition
| An intruder will use any means to subvert tthe security of a system. |
|
|
Term
| Principle of Least Privilege |
|
Definition
| Any subject should have access to the minimum amount of information needed to do its job. |
|
|
Term
| Shared Resource Matrix Methodology |
|
Definition
| The idea is to build a table describing system commands and their potential effects on shared attributes of objects. Can be used to find Covert Channels |
|
|
Term
|
Definition
| An example of a polyalphabetic cipher sometimes called a running key cipher because the key is another text |
|
|
Term
|
Definition
| Stores permissions with the objects of the system |
|
|
Term
|
Definition
| Given all subjects and objects in the system, the matrix shows explicitly what accesses are allowed for each subject/object pair |
|
|
Term
|
Definition
It is a policy that shows the subject object accesses. (May be wrong)
(constrains information flowing by subjects reading or writing objects) |
|
|
Term
|
Definition
| the attribute of a cipher that cannot be encrypted and decrypted with the same key |
|
|
Term
|
Definition
| Protection from phishing. This is to make sure that the receiver knows if the sender is really who they think it is. |
|
|
Term
|
Definition
| It is a characteristic on how reliable a system is. |
|
|
Term
|
Definition
| The amount of information that can be transmitted from one thing to another per second. |
|
|
Term
|
Definition
| allow reasoning about what principals within the protocol should be able to infer from the messages they see. Allows abstract proofs, but may miss some important flaws. |
|
|
Term
|
Definition
| Encrypt a group of plaintext symbols as one block. |
|
|
Term
|
Definition
| A mode that generates ciphertext that stores the message in encrypted but recoverable form. |
|
|
Term
|
Definition
| characteristic of an algorithm where if given enough time, an analyst can recover the plaintext |
|
|
Term
|
Definition
| Stores the permissions with subjects |
|
|
Term
|
Definition
| A combination of two or more ciphers. Also known as a product cipher |
|
|
Term
|
Definition
| An electronic equivalent of a "letter of introduction". It is constructed with digital signatures and hash functions. A public key and user's identity are bound together within this. |
|
|
Term
|
Definition
| This authority vouches for the accuracy of the binding of the certificate. |
|
|
Term
|
Definition
| a chain of trust when through certificates. |
|
|
Term
|
Definition
| An attack where the attacker can decrypt selected ciphertack. |
|
|
Term
|
Definition
| An attack where the attacker can cause messages of his choosing to be encrypted. |
|
|
Term
| Cipherblock chaining mode (CBC) |
|
Definition
| Xor each successive plaintext block with the previous ciphertext block and then encrypt. An initialization vector IV is used as a seed for the process. |
|
|
Term
|
Definition
| Each byte is XORed with the first block of the previous output and fed back into the encryption. |
|
|
Term
|
Definition
| Attack where attacker has only encrypted text. |
|
|
Term
|
Definition
| Something is this when it is hard to find two messages with the same hashcode. |
|
|
Term
|
Definition
| writing the plaintext characters in a a number of fixed length rows, then read out column by column. |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Secrecy/privacy. answers the question, who can read or write information. |
|
|
Term
|
Definition
| Transforming information in plaintext so the interceptor cannot readily extract it. |
|
|
Term
|
Definition
| The attacker gets logically between the client and service and somehow disrupts the communication |
|
|
Term
|
Definition
| The attacker produces, offers or requests so many services that the server is overwhelmed. |
|
|
Term
|
Definition
| If SL ever sees varying results depending on varying actions by SH, that could be used to send a bit of information from SH to SL in violation of the metapolicy |
|
|
Term
|
Definition
| the study of methods for obtaining the meaning of encrypted information, without access to the secret information that is normally required to do so |
|
|
Term
| Cryptographic hash functions |
|
Definition
| This is used to protect integrity. The qualities it has are that it is difficult to construct without changing the hash itself and it is unlikely that two different hashes have the same hash. |
|
|
Term
|
Definition
| A protocol using cryptographic mechanisms to accomplish some security-related function |
|
|
Term
|
Definition
| the practice and study of techniques for secure communication in the presence of third parties |
|
|
Term
|
Definition
| A system that includes cryptography. |
|
|
Term
|
Definition
| Spreading the information from a region of plaintext widely over the ciphtest |
|
|
Term
|
Definition
| a mathematical scheme for demonstrating the authenticity of a digital message or document |
|
|
Term
| Discretionary Access Control |
|
Definition
| Rule enforcement may be waived or modified by some users. |
|
|
Term
| Distributed Denial of Service (DDOS) |
|
Definition
| These involve co-opting the services of many other machines to participate in the attack, ex: botnet. |
|
|
Term
|
Definition
(L1, S1) dominates (L2, S2) iff 1) L1 > L2 2) S2 subset S1 |
|
|
Term
|
Definition
| PGP uses radix-64 conversion , which makes this compatibility easier. |
|
|
Term
| Electronic Code book Mode |
|
Definition
| Encrypt each block in the plaintext with the same key. |
|
|
Term
|
Definition
| changing plaintext to make it easier to transmit. |
|
|
Term
|
Definition
| to render the message less useful/meaningful to any eavesdropper. |
|
|
Term
|
Definition
| to render an encrypted message into a readable file. |
|
|
Term
|
Definition
| The measure of the information content of an average symbol in the language |
|
|
Term
|
Definition
| A genuine attack is not detected |
|
|
Term
|
Definition
| Harmless behavior is mis-classified as an attack. |
|
|
Term
|
Definition
| Assuming that all symbols are independent of one another. |
|
|
Term
|
Definition
| computing the entropy of a language when the symbols are dependent of 1 or more symbols. |
|
|
Term
|
Definition
| Characteristic of a message that is not a replay from an earlier exchange. |
|
|
Term
| Fundamental Theorem of the noiseless channel |
|
Definition
| If a language has entropy h (bits per symbol) and a channel can transmit C bits per second, then it is possible to encode the signal in such a way as to transmit at an average rate of (C/h) - e symbols per second where e can e made arbitrarily small. It is impossible to transmit t an average rate greater than C/h |
|
|
Term
|
Definition
| The different levels of a subject or object in BLP or Biba's Integrity model |
|
|
Term
|
Definition
| This attempts to turn the message sent into its intended semantics. It gets from protocol steps to logical inferences. One purpose is to omit parts of the message that do not contribute to the beliefs of the recipients. It depends on the interpretation of the meaning of some steps. |
|
|
Term
|
Definition
This is the amount of uncertainty a message resolves
(appropriate unit of measurement is bits?) |
|
|
Term
| Information Flow Policies |
|
Definition
| It specifies the security of the system by stating which flows are allowed. |
|
|
Term
|
Definition
| Sniffing incoming packets and discarding those with source IP addresses outside a given range. |
|
|
Term
|
Definition
| Subject s can write to object o only if i(o) <= i(s) |
|
|
Term
|
Definition
| who can write or modify information? |
|
|
Term
|
Definition
| an asset becomes unusable, unavailable, or lost. |
|
|
Term
|
Definition
| attacker injects spurious messages into a protocol run to disrupt or subvert it. |
|
|
Term
|
Definition
| An unauthorized party gains access to an asset |
|
|
Term
| Intrusion Detection System (IDS) |
|
Definition
| this can analyze traffic patterns and react to anomalous patterns. However, often there is nothing apparently wrong but the volume of requests. An IDS reacts after the attack has begun. |
|
|
Term
| Intrusion prevention System (IPS) |
|
Definition
| attempts to prevent intrusion by more aggressively blocking attempted attacks. This assumes that the attacking traffic can be identified. |
|
|
Term
|
Definition
| given the need to communicate securely, how do the sender and receiver agree on a secret that they can use in the algorithm. If sender and receiver already have a secure channel, do they need this secret? If they don't, how do they give it out securely. |
|
|
Term
|
Definition
| given a large number of keys, how do we preserve their safety and make them available as needed. |
|
|
Term
|
Definition
| A user may want to revoke a public key because the key is compromised, or the limit for the key is up. |
|
|
Term
|
Definition
| Once a key is agreed on, how are they keys exchanged? |
|
|
Term
| Key stream generation mode |
|
Definition
| the cipher is used more as a pseudorandom number generator. The result is a key stream that can be used as in one-time pad. Decryption uses the same key stream. |
|
|
Term
|
Definition
| A algorithm that uses a key |
|
|
Term
|
Definition
| A algorithm that has no key. |
|
|
Term
|
Definition
| set of all possible keys that can be used to initialize cryptographic algorithm. |
|
|
Term
|
Definition
| Attacker has some ciphertext/plaintext pairs |
|
|
Term
|
Definition
| A structure that is formed in an Multi-Level Security system. |
|
|
Term
|
Definition
| It must be possible to recover the entire original sequence of symbols form the transmission. |
|
|
Term
|
Definition
| An encryption algirthm is this if transformations on the ciphertext produce meaningful changes in the plaintext. Ex: C = E(P), it is possible to generate C1 = f(c) such that D(C1) = P1 = f'(P) |
|
|
Term
| Mandatory Access Controls (MAC) |
|
Definition
| Rules are enforced on every attempted access, not at the discretion of any system user. |
|
|
Term
|
Definition
| another name for hash value |
|
|
Term
|
Definition
| The overall security goals of the system |
|
|
Term
|
Definition
| A uniformly substituted cipher where each symbol of the plaintext is exchanged for another symbol. |
|
|
Term
|
Definition
| the application of a computer system to process information with different sensitivities (i.e., at different security levels), permit simultaneous access by users with different security clearances and needs-to-know, and prevent users from obtaining access to information for which they lack authorization |
|
|
Term
|
Definition
| categories from an unordered set expressing membership within some interest group. e.g. Crypto, Nuclear, Janitorial, Personnel |
|
|
Term
|
Definition
| Can the information be transmitted without loss or distortion |
|
|
Term
|
Definition
| Something is this if it is difficult to change the message because it can be detected |
|
|
Term
|
Definition
| A very general security policy. If security demands that SH must never communicate with SL, there shouldn't be anything that SH can do that has effects visible to SL. |
|
|
Term
|
Definition
| A property of Digital Signatures where S cannot deny producing the signature |
|
|
Term
|
Definition
| short for numbers used once. These are randomly generated values included in messages |
|
|
Term
|
Definition
| The information containers protected by the system (documents, folders, files, directories, databases) |
|
|
Term
|
Definition
| A theoretically perfect cipher |
|
|
Term
|
Definition
| An easily computed function but difficult to invert without additional information. |
|
|
Term
| Output feedback mode (OFB) |
|
Definition
| Similar to CFB except that the quantity XORed with each plaintext block is generated independently of both plaintext and ciphertext. Essentially by repeating encrypting the seed. |
|
|
Term
|
Definition
| a filter that detects patterns of identifiers in the request stream and block messages in that pattern. |
|
|
Term
|
Definition
| A binary relationtion that is reflexive, antisymmetric, and transitive. |
|
|
Term
| Passphrase-based symmetric keys |
|
Definition
| This passphrase is used to protect private keys. |
|
|
Term
|
Definition
| No reduction of the search space is gained from knowing the encryption algorithm, and the ciphertext. The attacker's uncertainty of the message is exactly the same whether or not she has access to the ciphertext. |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| A set of rules for implementing specific security goals |
|
|
Term
| Polyalphabetic Substitution |
|
Definition
| A substitution cipher. If different substitutions are made depending on where in the plaintext the symbol occurs |
|
|
Term
|
Definition
| The string representing any symbol cannot be an initial prefix of the string representing any other symbol |
|
|
Term
|
Definition
| A table of rows containing timestamp, key ID, Public Key, Private key, and user ID. |
|
|
Term
|
Definition
| A combination of two or more ciphers |
|
|
Term
|
Definition
| A description of a family of products in terms of threats, environmental issues and assumptions, security objectives, and requirements of the Common Criteria. It includes overview, product description, product security environment, security objectives, IT security requirements, and rationale. |
|
|
Term
| Pseudo-random number generator |
|
Definition
| A key stream generation modes is used more as this. The result is a keystream that can be used as in one-time pad. |
|
|
Term
| Public Key infrastructure |
|
Definition
| with this infrastructure, if A knows B's public key, then A can send a message securely to B and be assured that a message from B really originated with B. |
|
|
Term
|
Definition
| A table of rows containing timestamp, Key ID, public key, and user ID. It can be indexed by User ID or Key ID. |
|
|
Term
|
Definition
| Maps groups of three octets into four ASCII characters. |
|
|
Term
|
Definition
| In BLP, if an object O exists and Ls >= Lo, then return its current value; otherwise return 0. |
|
|
Term
|
Definition
| In BLP, If object exists O and Ls <= Lo, change its value to V; otherwise do nothing. |
|
|
Term
|
Definition
| In BLP, If no object with name O exists anywhere on the system, create a new object O at level Ls; otherwise do nothing. |
|
|
Term
|
Definition
| In BLP, if nan object with name O exists and the Ls <= Lo, destroy it; otherwise do nothing. |
|
|
Term
|
Definition
| attacker records messages and replays them at a later time. |
|
|
Term
| Role-based access control (RBAC) |
|
Definition
| A widely used security framework claimed to be especially appropriate for commercial settings. It associates permissions with functions/jobs/roles within an organization. |
|
|
Term
|
Definition
| Protection of assets against threats |
|
|
Term
|
Definition
| A label that contains the security level and the category it belongs to that is usually attached to a subject and object |
|
|
Term
|
Definition
| a document that contains the security requirements of a product to be evaluated (TOE), and specifies the measures offered by the product to meet those requirements. It includes an Introduction,TOE description, TOE security environment, Security objectives, IT security requrements, TOE summary specifications, Protection Profile claims. |
|
|
Term
|
Definition
| the breaking up of long messages to be mailed separately in PGP. |
|
|
Term
|
Definition
| The person that sends a message |
|
|
Term
|
Definition
| The person that receives the message |
|
|
Term
|
Definition
| Several different subjects must be involved to complete a critical function |
|
|
Term
|
Definition
| A single subject cannot complete compelmentary roles iwthin a critical process |
|
|
Term
|
Definition
| single-use symmetric key used for encrypting all messages in one communication session. |
|
|
Term
| Shared-key authentication protocol |
|
Definition
| Needham Schroedar is this type of protocol designed to generate and propagate a session key. |
|
|
Term
| Simple Integrity Property |
|
Definition
| Subject S can read object o only if i(s) <= i(o). |
|
|
Term
|
Definition
| Subject S with clearance (Ls, Cs) may be granted access to object O with classification (Lo, Co) only if (Ls, Cs) >= (Lo, Co) |
|
|
Term
| Simple Substitution cipher |
|
Definition
| When a substitution cipher is done uniformly. |
|
|
Term
|
Definition
| A covert channel which uses resource not found or Access denied. SH is recording information within the system state. |
|
|
Term
|
Definition
| convert one symbol of plaintext directly into a symbol of ciphertext. |
|
|
Term
| Strong tranquility property |
|
Definition
| Subjects and objects do not change labels during the lifetime of the system. |
|
|
Term
|
Definition
| Entities that execute activities and request access to objects |
|
|
Term
|
Definition
| A cipher where each symbol of the plaintext is exchanged for another symbol |
|
|
Term
|
Definition
| A cipher that uses the same key to encrypt and decrypt. |
|
|
Term
|
Definition
| The attacker does not respond to the server and it ties up the server resources because it keeps waiting for a response. |
|
|
Term
|
Definition
| An attribute of the system |
|
|
Term
| Target of Evaluation (TOE) |
|
Definition
| The system submitted for evaluation |
|
|
Term
|
Definition
| act of coercion wherein an act is proposed to elicit a negative response |
|
|
Term
|
Definition
| In Public Private Keys, A time that is combined with a private or public key ring to see when the key pair was generated. |
|
|
Term
|
Definition
| A covert channel that records the ordering or duration of events on the system. |
|
|
Term
|
Definition
| A relation that is antisymmetric, transitive, and total |
|
|
Term
|
Definition
| in which the order of symbols is rearranged |
|
|
Term
|
Definition
| A characteristic of a digital signature where it is difficult to recreate the signature. |
|
|
Term
|
Definition
| For any encoded string there must be only one possible decoding |
|
|
Term
|
Definition
| a weakness which allows an attacker to reduce a system's information assurance. |
|
|
Term
|
Definition
| In Biba, it is where an attribute monotonically floats up or down because it reads something that might possibly be bad information. |
|
|
Term
| Weak Tranquility Property |
|
Definition
| Subjects and objects do not change labels in a way that violates the "spirit" of the security policy |
|
|
Term
|
Definition
| Assume that all characters are equally likely in a text. |
|
|
Term
| Words that were not use/not found |
|
Definition
addRoundKey Capacity Throughput Interruption Modes of Usage Mix Columns Nth order markov Mechanism Assurance Dinction Principals Protocol Public key algorithm Security Model Security Policy shiftRows strong cryptosystem subBytes Symmetric Channel Secret Key Algorithm System High System Low Trusted Subject Unwinding Theorm |
|
|