Shared Flashcard Set

Details

Computer Security
Computer Security with Bill Young
175
Computer Science
Undergraduate 2
12/03/2011

Additional Computer Science Flashcards

 


 

Cards

Term
*-property
Definition
Subject S with Clearance (Ls, Cs) may be granted write access to object O with classification (L0, C0) only if (Ls, Cs) <= (L0, C0)
Term
Advanced Encryption Standard (AES)
Definition
A specification for the encryption of electronic data. It was adopted by the US government and is now used worldwide.
Term
BAN Logic
Definition
A modal logic of belief.
Wikipedia: A set of rules for defining and analyzing information exchange protocols
Term
Bell-LaPadula Model (BLP)
Definition
Wikipedia: State machine model for enforcing access control in government and military applications. Uses simple security Property and *-property.
Term
Biba's Low Water Mark Policy
Definition
Where an attribute monotonically floats down when something low reads it. A subject's integrity level fails if it ever reads low integrity information.
If s reads o then i'(s) = min(i(s), i(o)), where i'(s) is the subject's new integrity level after the read.
Term
Biba's Ring Policy
Definition
More trusting of the subject, assuming that a subject can properly filter the information it receives.
Term
Biba's Strict Integrity Policy
Definition
A mandatory integrity access control policy and is dual of the BLP
Term
Caesar Cipher
Definition
monoalphabetic cipher in which each letter is replaced in the encryption by another letter a fixed "distance" away in the alphabet
Term
Caesar Cipher
Definition
monoalphabetic cipher in which each letter is replaced in the encryption by another letter a fixed "distance" away in the alphabet
Term
Chinese Wall Policy
Definition
A security Model where read/write access to files is governed by membership of data in conflict-of-interest classes and datasets.
Term
Clarke Wilson Policy
Definition
provides a foundation for specifying and analyzing an integrity policy for a computing system.
Term
CodeRed
Definition
A virus that attacks unpatched machines by generating a random list of ip addresses to DDOS certain sites. Has a fixed seed and could be removed by rebooting.
Term
CodeRed Version 2
Definition
A virus that is the same as the version 1 except it has a random seed.
Term
CodeRedII
Definition
A virus that exploited the buffer-overflow vulnerability in Microsoft's IIS webservers. First it determine sif the system has been infected, if not, it sets up a backdoor. Does not deface web pages or DDOS. Installs in root level and so cannot be fixed with reboot.
Term
Common Criteria
Definition
A set of standards recognized by 26 countries of how secure systems will be evaluated.
Term
Diffie-Hellman algorithm
Definition
The first practical method for establishing a shared secret over an unsecured communication channel. Both sides agree on prime number p and a base g. This algorithm involved sending g^a mod p and g^b mod p.
Term
Evaluation Assurance Level (EAL)
Definition
A numerical grade assigned by following the completion of a Common Criteria security evaluation. The level determines the rigor that the product is tested.
Term
Huffman Encoding
Definition
An encoding that is guaranteed to find an efficient code for a given language if you know the probability of the symbols.
Term
Lempel-Ziv
Definition
an adaptive coding algorithm used in many commercial text compression utilities. It builds an encoding on the fly according to the strings it encounters. It is asymptotically opotimal. That is as the text length tends to infinity, the compression approaches optimal.
Term
Lipner's integrity matrix model
Definition
Combines BLP and BIba Integrity.
Term
MD4/MD5/SHA1
Definition
Cryptographic hashes
Term
Needham-Schroeder Protocol
Definition
This is a shared key authentication protocol designed to generate and propagate a session key. No public key infrastructure in place. This is so the receivers knows that a message is fresh.
Term
Otway-Rees Protocol
Definition
A computer network authentication protocol designed for use on insecure networks. It allows individuals communicating over network to prove their identity to each other while preventing eavesdropping or replay attacks. Allows detection for modification.
Term
Phil Zimmerman
Definition
The man who made PGP.
Term
Pretty Good Privacy (PGP)
Definition
It is a encryption that uses the best available cryptographic algorithms as building blocks and integrates them into a general purpose algorithm. It is packaged and has documentation including source code.
Term
Principle of Easiest Penetration
Definition
An intruder will use any means to subvert tthe security of a system.
Term
Principle of Least Privilege
Definition
Any subject should have access to the minimum amount of information needed to do its job.
Term
Shared Resource Matrix Methodology
Definition
The idea is to build a table describing system commands and their potential effects on shared attributes of objects. Can be used to find Covert Channels
Term
Vigenere cipher/tableau
Definition
An example of a polyalphabetic cipher sometimes called a running key cipher because the key is another text
Term
Access Control List
Definition
Stores permissions with the objects of the system
Term
Access Control Matrix
Definition
Given all subjects and objects in the system, the matrix shows explicitly what accesses are allowed for each subject/object pair
Term
Access Control Policy
Definition
It is a policy that shows the subject object accesses. (May be wrong)

(constrains information flowing by subjects reading or writing objects) 
Term
Asymmetric Cipher
Definition
the attribute of a cipher that cannot be encrypted and decrypted with the same key
Term
Authentication
Definition
Protection from phishing. This is to make sure that the receiver knows if the sender is really who they think it is.
Term
Availability
Definition
It is a characteristic on how reliable a system is.
Term
Bandwidth
Definition
The amount of information that can be transmitted from one thing to another per second.
Term
Belief Logic
Definition
allow reasoning about what principals within the protocol should be able to infer from the messages they see. Allows abstract proofs, but may miss some important flaws.
Term
Block Cipher
Definition
Encrypt a group of plaintext symbols as one block.
Term
Block encryption mode
Definition
A mode that generates ciphertext that stores the message in encrypted but recoverable form.
Term
Breakable
Definition
characteristic of an algorithm where if given enough time, an analyst can recover the plaintext
Term
Capability-based system
Definition
Stores the permissions with subjects
Term
Cascade Cipher
Definition
A combination of two or more ciphers. Also known as a product cipher
Term
Certificate
Definition
An electronic equivalent of a "letter of introduction". It is constructed with digital signatures and hash functions. A public key and user's identity are bound together within this.
Term
Certification authority
Definition
This authority vouches for the accuracy of the binding of the certificate.
Term
Certification chain
Definition
a chain of trust when through certificates.
Term
Chosen ciphertext attack
Definition
An attack where the attacker can decrypt selected ciphertack.
Term
Chosen Plaintext attack
Definition
An attack where the attacker can cause messages of his choosing to be encrypted.
Term
Cipherblock chaining mode (CBC)
Definition
Xor each successive plaintext block with the previous ciphertext block and then encrypt. An initialization vector IV is used as a seed for the process.
Term
Cipher feedback mode
Definition
Each byte is XORed with the first block of the previous output and fed back into the encryption.
Term
ciphertext-only attack
Definition
Attack where attacker has only encrypted text.
Term
Collision resistant
Definition
Something is this when it is hard to find two messages with the same hashcode.
Term
Columnar transposition
Definition
writing the plaintext characters in a a number of fixed length rows, then read out column by column.
Term
Compression
Definition
Make a file smaller
Term
Confidentiality
Definition
Secrecy/privacy. answers the question, who can read or write information.
Term
Confusion
Definition
Transforming information in plaintext so the interceptor cannot readily extract it.
Term
Consumer problem
Definition
The attacker gets logically between the client and service and somehow disrupts the communication
Term
Producer problem
Definition
The attacker produces, offers or requests so many services that the server is overwhelmed.
Term
Covert Channel
Definition
If SL ever sees varying results depending on varying actions by SH, that could be used to send a bit of information from SH to SL in violation of the metapolicy
Term
Cryptanalysis
Definition
the study of methods for obtaining the meaning of encrypted information, without access to the secret information that is normally required to do so
Term
Cryptographic hash functions
Definition
This is used to protect integrity. The qualities it has are that it is difficult to construct without changing the hash itself and it is unlikely that two different hashes have the same hash.
Term
Cryptographic Protocol
Definition
A protocol using cryptographic mechanisms to accomplish some security-related function
Term
Cryptography
Definition
the practice and study of techniques for secure communication in the presence of third parties
Term
Cryptosystem
Definition
A system that includes cryptography.
Term
Diffusion
Definition
Spreading the information from a region of plaintext widely over the ciphtest
Term
Digital signature
Definition
a mathematical scheme for demonstrating the authenticity of a digital message or document
Term
Discretionary Access Control
Definition
Rule enforcement may be waived or modified by some users.
Term
Distributed Denial of Service (DDOS)
Definition
These involve co-opting the services of many other machines to participate in the attack, ex: botnet.
Term
Dominate Relation
Definition
(L1, S1) dominates (L2, S2) iff
1) L1 > L2
2) S2 subset S1
Term
e-mail compatibility
Definition
PGP uses radix-64 conversion , which makes this compatibility easier.
Term
Electronic Code book Mode
Definition
Encrypt each block in the plaintext with the same key.
Term
Encoding
Definition
changing plaintext to make it easier to transmit.
Term
Encryption
Definition
to render the message less useful/meaningful to any eavesdropper.
Term
Decryption
Definition
to render an encrypted message into a readable file.
Term
entropy
Definition
The measure of the information content of an average symbol in the language
Term
False Negative
Definition
A genuine attack is not detected
Term
False Positive
Definition
Harmless behavior is mis-classified as an attack.
Term
first-order model
Definition
Assuming that all symbols are independent of one another.
Term
Higher-order model
Definition
computing the entropy of a language when the symbols are dependent of 1 or more symbols.
Term
Freshness
Definition
Characteristic of a message that is not a replay from an earlier exchange.
Term
Fundamental Theorem of the noiseless channel
Definition
If a language has entropy h (bits per symbol) and a channel can transmit C bits per second, then it is possible to encode the signal in such a way as to transmit at an average rate of (C/h) - e symbols per second where e can e made arbitrarily small. It is impossible to transmit t an average rate greater than C/h
Term
Hierarchical levels
Definition
The different levels of a subject or object in BLP or Biba's Integrity model
Term
Idealization
Definition
This attempts to turn the message sent into its intended semantics. It gets from protocol steps to logical inferences. One purpose is to omit parts of the message that do not contribute to the beliefs of the recipients. It depends on the interpretation of the meaning of some steps.
Term
Information Content
Definition
This is the amount of uncertainty a message resolves

(appropriate unit of measurement is bits?)
Term
Information Flow Policies
Definition
It specifies the security of the system by stating which flows are allowed.
Term
Ingress filtering
Definition
Sniffing incoming packets and discarding those with source IP addresses outside a given range.
Term
Integrity *-property
Definition
Subject s can write to object o only if i(o) <= i(s)
Term
Integrity
Definition
who can write or modify information?
Term
Interruption
Definition
an asset becomes unusable, unavailable, or lost.
Term
Interleaving attack
Definition
attacker injects spurious messages into a protocol run to disrupt or subvert it.
Term
Interception
Definition
An unauthorized party gains access to an asset
Term
Intrusion Detection System (IDS)
Definition
this can analyze traffic patterns and react to anomalous patterns. However, often there is nothing apparently wrong but the volume of requests. An IDS reacts after the attack has begun.
Term
Intrusion prevention System (IPS)
Definition
attempts to prevent intrusion by more aggressively blocking attempted attacks. This assumes that the attacking traffic can be identified.
Term
Key Distribution
Definition
given the need to communicate securely, how do the sender and receiver agree on a secret that they can use in the algorithm. If sender and receiver already have a secure channel, do they need this secret? If they don't, how do they give it out securely.
Term
Key management
Definition
given a large number of keys, how do we preserve their safety and make them available as needed.
Term
Key Revocation
Definition
A user may want to revoke a public key because the key is compromised, or the limit for the key is up.
Term
Key exchange problem
Definition
Once a key is agreed on, how are they keys exchanged?
Term
Key stream generation mode
Definition
the cipher is used more as a pseudorandom number generator. The result is a key stream that can be used as in one-time pad. Decryption uses the same key stream.
Term
Keyed Cipher
Definition
A algorithm that uses a key
Term
Keyless Cipher
Definition
A algorithm that has no key.
Term
Keyspace
Definition
set of all possible keys that can be used to initialize cryptographic algorithm.
Term
Known plaintext attack.
Definition
Attacker has some ciphertext/plaintext pairs
Term
Lattice-based security
Definition
A structure that is formed in an Multi-Level Security system.
Term
Lossless Encoding
Definition
It must be possible to recover the entire original sequence of symbols form the transmission.
Term
Malleable algorithm
Definition
An encryption algirthm is this if transformations on the ciphertext produce meaningful changes in the plaintext. Ex: C = E(P), it is possible to generate C1 = f(c) such that D(C1) = P1 = f'(P)
Term
Mandatory Access Controls (MAC)
Definition
Rules are enforced on every attempted access, not at the discretion of any system user.
Term
Message Digest
Definition
another name for hash value
Term
Metapolicy
Definition
The overall security goals of the system
Term
Monoalphabetic Cipher
Definition
A uniformly substituted cipher where each symbol of the plaintext is exchanged for another symbol.
Term
Multi-level Security
Definition
the application of a computer system to process information with different sensitivities (i.e., at different security levels), permit simultaneous access by users with different security clearances and needs-to-know, and prevent users from obtaining access to information for which they lack authorization
Term
Need-to-know categories
Definition
categories from an unordered set expressing membership within some interest group. e.g. Crypto, Nuclear, Janitorial, Personnel
Term
Noisy/noiseless
Definition
Can the information be transmitted without loss or distortion
Term
Non-alterable
Definition
Something is this if it is difficult to change the message because it can be detected
Term
Non-interference
Definition
A very general security policy. If security demands that SH must never communicate with SL, there shouldn't be anything that SH can do that has effects visible to SL.
Term
Non-repudiation
Definition
A property of Digital Signatures where S cannot deny producing the signature
Term
Nonces
Definition
short for numbers used once. These are randomly generated values included in messages
Term
Objects
Definition
The information containers protected by the system (documents, folders, files, directories, databases)
Term
One-time pad
Definition
A theoretically perfect cipher
Term
One-way function
Definition
An easily computed function but difficult to invert without additional information.
Term
Output feedback mode (OFB)
Definition
Similar to CFB except that the quantity XORed with each plaintext block is generated independently of both plaintext and ciphertext. Essentially by repeating encrypting the seed.
Term
Packet Sniffing
Definition
a filter that detects patterns of identifiers in the request stream and block messages in that pattern.
Term
Partial Order
Definition
A binary relationtion that is reflexive, antisymmetric, and transitive.
Term
Passphrase-based symmetric keys
Definition
This passphrase is used to protect private keys.
Term
Perfect Cipher
Definition
No reduction of the search space is gained from knowing the encryption algorithm, and the ciphertext. The attacker's uncertainty of the message is exactly the same whether or not she has access to the ciphertext.
Term
Plaintext
Definition
The original message
Term
Ciphertext
Definition
The encrypted message
Term
Policy
Definition
A set of rules for implementing specific security goals
Term
Polyalphabetic Substitution
Definition
A substitution cipher. If different substitutions are made depending on where in the plaintext the symbol occurs
Term
Prefix-Free
Definition
The string representing any symbol cannot be an initial prefix of the string representing any other symbol
Term
Private Key ring
Definition
A table of rows containing timestamp, key ID, Public Key, Private key, and user ID.
Term
Product Cipher
Definition
A combination of two or more ciphers
Term
Protection Profile
Definition
A description of a family of products in terms of threats, environmental issues and assumptions, security objectives, and requirements of the Common Criteria. It includes overview, product description, product security environment, security objectives, IT security requirements, and rationale.
Term
Pseudo-random number generator
Definition
A key stream generation modes is used more as this. The result is a keystream that can be used as in one-time pad.
Term
Public Key infrastructure
Definition
with this infrastructure, if A knows B's public key, then A can send a message securely to B and be assured that a message from B really originated with B.
Term
Public Key Ring
Definition
A table of rows containing timestamp, Key ID, public key, and user ID. It can be indexed by User ID or Key ID.
Term
Radix 64 Conversion
Definition
Maps groups of three octets into four ASCII characters.
Term
Read
Definition
In BLP, if an object O exists and Ls >= Lo, then return its current value; otherwise return 0.
Term
Write
Definition
In BLP, If object exists O and Ls <= Lo, change its value to V; otherwise do nothing.
Term
Create
Definition
In BLP, If no object with name O exists anywhere on the system, create a new object O at level Ls; otherwise do nothing.
Term
Destroy
Definition
In BLP, if nan object with name O exists and the Ls <= Lo, destroy it; otherwise do nothing.
Term
Replay Attack
Definition
attacker records messages and replays them at a later time.
Term
Role-based access control (RBAC)
Definition
A widely used security framework claimed to be especially appropriate for commercial settings. It associates permissions with functions/jobs/roles within an organization.
Term
Security
Definition
Protection of assets against threats
Term
Security Labels/levels
Definition
A label that contains the security level and the category it belongs to that is usually attached to a subject and object
Term
Security Target
Definition
a document that contains the security requirements of a product to be evaluated (TOE), and specifies the measures offered by the product to meet those requirements. It includes an Introduction,TOE description, TOE security environment, Security objectives, IT security requrements, TOE summary specifications, Protection Profile claims.
Term
Segmentation
Definition
the breaking up of long messages to be mailed separately in PGP.
Term
Sender
Definition
The person that sends a message
Term
Receiver
Definition
The person that receives the message
Term
Separation of Duty
Definition
Several different subjects must be involved to complete a critical function
Term
separation of function
Definition
A single subject cannot complete compelmentary roles iwthin a critical process
Term
Session Key
Definition
single-use symmetric key used for encrypting all messages in one communication session.
Term
Shared-key authentication protocol
Definition
Needham Schroedar is this type of protocol designed to generate and propagate a session key.
Term
Simple Integrity Property
Definition
Subject S can read object o only if i(s) <= i(o).
Term
Simple Security Property
Definition
Subject S with clearance (Ls, Cs) may be granted access to object O with classification (Lo, Co) only if (Ls, Cs) >= (Lo, Co)
Term
Simple Substitution cipher
Definition
When a substitution cipher is done uniformly.
Term
Storage Channels
Definition
A covert channel which uses resource not found or Access denied. SH is recording information within the system state.
Term
Stream Cipher
Definition
convert one symbol of plaintext directly into a symbol of ciphertext.
Term
Strong tranquility property
Definition
Subjects and objects do not change labels during the lifetime of the system.
Term
Subjects
Definition
Entities that execute activities and request access to objects
Term
Substitution Cipher
Definition
A cipher where each symbol of the plaintext is exchanged for another symbol
Term
Symmetric Cipher
Definition
A cipher that uses the same key to encrypt and decrypt.
Term
Syn Flooding
Definition
The attacker does not respond to the server and it ties up the server resources because it keeps waiting for a response.
Term
System Attribute
Definition
An attribute of the system
Term
Target of Evaluation (TOE)
Definition
The system submitted for evaluation
Term
Threat
Definition
act of coercion wherein an act is proposed to elicit a negative response
Term
Timestamp
Definition
In Public Private Keys, A time that is combined with a private or public key ring to see when the key pair was generated.
Term
Timing Channels
Definition
A covert channel that records the ordering or duration of events on the system.
Term
Total Order
Definition
A relation that is antisymmetric, transitive, and total
Term
Transposition
Definition
in which the order of symbols is rearranged
Term
Unforgeable
Definition
A characteristic of a digital signature where it is difficult to recreate the signature.
Term
Uniquely Decodable
Definition
For any encoded string there must be only one possible decoding
Term
Vulnerability
Definition
a weakness which allows an attacker to reduce a system's information assurance.
Term
Water mark policy
Definition
In Biba, it is where an attribute monotonically floats up or down because it reads something that might possibly be bad information.
Term
Weak Tranquility Property
Definition
Subjects and objects do not change labels in a way that violates the "spirit" of the security policy
Term
Zero-order Model
Definition
Assume that all characters are equally likely in a text.
Term
Words that were not use/not found
Definition
addRoundKey
Capacity
Throughput
Interruption
Modes of Usage
Mix Columns
Nth order markov
Mechanism
Assurance Dinction
Principals
Protocol
Public key algorithm
Security Model
Security Policy
shiftRows
strong cryptosystem
subBytes
Symmetric Channel
Secret Key Algorithm
System High
System Low
Trusted Subject
Unwinding Theorm
Supporting users have an ad free experience!