MOD 6 - Network Security Flashcards

1
Q

Name all 4 types of security threats and examples for each.

A

IIFM

  1. Interception/sniffing:
    ex: Host A and Host B are doing a online transaction, but Host C sniffs and steals Host A’s credit card info
  2. Interruptions:
    when an asset is no longer available ex: Flooding the network
  3. Fabrication:
    An unauthorized user fabricates objects into the network
    Ex: email spam
  4. Modification:
    Tampering information, ressources or services/ man in the middle attack
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 4 values of network security?

A
  1. Confidentiality
    - Only sender and receiver should understand message contents (sender encrypts, receiver decrypts)
  2. Authentication
    - Sender and receiver can confirm each others identities
  3. Message integrity
    - Message was not altered before, during or after transit
  4. Access and availability
    - Services must be accessible
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the 3 ways to break an encryption scheme?

A

1) ciphertext only attack (brute-force, stat analysis)
2) known plaintext attack (can determine pairings)
3) chosen plaintext attack (Trudy sends a plain text she knows, then gets back cypher text, can then determine pairings)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is substitution cipher?

A

simple encryption scheme

replace one letter for another. Ex: h->o, i->q , plaintext = hi-> cyphertext= oq

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is ciphertext?

A

plain text that was encrypted with an encryption algorithm, to become ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what’s an encryption key?

A

unique string of bits used to transform plain-text to cipher-text or vise-versa

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is private key crypto?

A

-sender and receiver DO NOT share a key
-public key = (encryption) KNOWN TO ALL
-private key = (decryption) KNOWN ONLY TO RECEIVER(OWNER), SECRET

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

in the context of bob, what is K+B, K-B, K-B(m), and if K+B(K-B(m)) = m

A

K+B = bobs public key
K-B = bobs private key
K-B(m) = message m encrypted with bobs private key

K+B(K-B(m)) = m here we applied bobs public key to the message signed with his private key. If this is equal to m, this proves that bob indeed signed m with his private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is CA?

A

Certification Authority

  • Binds public key to particular entity, E
  • E (person/router) registers its public key with CA

ex:
-bob registers his public key with CA (with proof that hes bob)
-CA signs bobs public key with their private key
- Alice wants to send bob smt, and requests his public key
-bob sends Alice his public key signed by CA
-alice applies CA’s public key on bobs public key to decrypt it (to make sure its bob)
-now alice can use bobs public key to encrypt and send a message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Alice wants to send a secure email to Bob, explain the process.

A

Alice:
-Generates symmetric private key, Ks
-Encrypt message m with Ks : Ks(m)
-Also encrypts Ks with bobs public key : K+B(Ks)

Bob:
-Uses his private key to decrypt Ks (from K+B(Ks))
-Then uses Ks to decrypt message m

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is SSL?

A

Secure Socket Layer = widely deployed security protocol for TCP sockets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is a VPN

A

Virtual Private Network : secure and encrypted connection that allows users to access the internet as if they were connected to a private network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is IPsec?

A

Suite of protocols that provide cryptographic security and integrity for internet communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the 2 modes of IPsec operation? compare them

A

Transport mode = IPsec is applied on the DATA FROM TRANSPORT LAYER (payload) & sent and received by end system. Transport mode does not protect the IP header.

Tunneling mode = IPsec is applied on the ENTIRE PACKET & sent and received by end system. Tunneling mode protects the entire IP packet, then adds new IP header. (prof said: pushing packet through tunnel with new ip, idea is to hide the IP from another user)

SUMMARY: transport encrypts only IP payload, tunneling encrypts the entire IP packet and adds a new header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the 2 IPsec protocols?

A

AH = Authentication Header protocol
- provides source authentication and data integrity, but NOT confidentiality

ESP = Encapsulation Security Protocol
- provides source authentication, data integrity AND confidentiality (encryption)
-build upon AH and is more widely used

both protocols supports the 2 modes of IPsec transport (transport and tunneling)

Summary: AH provides source authentication & integrity, ESP additionally provides encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is a SA?

A

Security Association

  • set of security parameters and keys that define the rules for securing communication between two network entities in IPsec
  • simplex logical connections : for only one direction ( from source to destination)
  • before sending data, “security association (SA)” established from sending to receiving entity
16
Q

If IPsec was properly executed, will Trudy – be able to see original contents of datagram? How about source, dest IP address, transport protocol, application port?
- flip bits without detection?
- masquerade as Alice using Alice ’s IP address?
- replay a datagram?

A
  • IPsec provides confidentiality, encrypting the payload of the datagram, making it unreadable to an eavesdropper like Trudy.
  • IPsec provides integrity checking, which means that if Trudy were to alter any part of the datagram, the changes would be detected. Tampering with the datagram, such as flipping bits, would result in the receiver rejecting the packet due to failed integrity checks.
  • IPsec includes authentication mechanisms to verify the identities of communicating parties. Without the proper authentication keys, Trudy should not be able to convince Bob that she is Alice.
  • IPsec includes protection against replay attacks. Each datagram is typically assigned a unique sequence number, and if Trudy were to attempt to replay a previously intercepted datagram, it would be detected and rejected.
17
Q

what is a firewall?

A

= isolates organization’s internal network from larger Internet, allowing some packets to pass, blocking others

Prevents:
- DoS attacks
- Illegal mods/acces of internal data
- Unauthorized access - to inside network

18
Q

Draw a diagram to show how Alice can send Bob a message that ensures confidentiality, authentication, integrity, ..

A

Reminder:
confidentiality = only bob and alice can understand the contents of the message
authentication = sender can prove their identity
integry = message was not compromised

authentication + integrity = hash the message and encrypt it with ka-, send message in plain text for comparison

confidentiality = encrypt ks with kb+, encrypt tot message with ks

19
Q

What is the main function of a digital signature and how is it obtained.

A

= used to verify the the sender if indeed the owner/creator before sending the message

simple digital signature = sender encrypts message with their private key, creating a “signed” message. Receiver can then decrypt and verify the sender identity by using the senders public key.

CA can also be used to bind public key to particular entity

20
Q

Name 2 possible ways to break a mono-alphabetic cypher

A

Brute force = search through all keys ( all possible mappings)

statistical analysis

21
Q

What are the 4 SSL blocks/components?

A

1) Handshake protocol : server authentication, negotiation: agree on crypto algorithms, establish keys, client authentication (optional)

2) Record Protocol : fragmentation, compression, message authentication and integrity protection, encryption

3) Alert Protocol : error messages (fatal alerts and warnings)

4) Change Cipher Spec Protocol : a single message that indicates the end of the SSL handshake

22
Q

Why are random numbers used during an SSL handshake?

A

To prevent replay attacks when generating keys.

23
Q

What is the use of the message authentication code inside the SSL record?

A

Ensures the integrity and authenticity of the data transmitted between the client and the server

24
Q

When do you use transport mode, and when do you use tunneling mode?

A

Use transport when : when securing communication between individual hosts

Use tunneling when :
when securing communication between networks (EX: VPN uses tuneling)

25
Q

What’s in a ESP header, and what do they do?

A

ESP header contains:
* SPI(Security Parameter Index): so receiving entity knows what to do
* Sequence number: to prevent replay attacks

26
Q

What is the use of the SAD in your computer?

A

Security Association Database = used to store and manage security associations (SA), which helps your computer identify and apply the appropriate security settings when sending or receiving protected data, ensuring secure and authenticated communication.

27
Q

What are the 3 kinds of firewalls? Which one is more secure for TCP based servers?

A

▪ stateless packet filters = router filters packet-by-packet, decision to forward/drop packet based on: source IP address, destination IP address, TCP/UDP source and destination port numbers, ICMP message type, TCP SYN and ACK bit

▪ stateful packet filters = track status of every TCP connection, track connection setup (SYN), teardown (FIN): determine whether incoming, outgoing packets “makes sense”

▪ application gateways = filter packets on application data as well as on IP/TCP/UDP fields

28
Q

What are application gateways?

A

typeof firewall
= filter packets based on application data as well as on IP/TCP/UDP fields.
example: allow select internal users to telnet outside

Simple terms: filters packets based on what they wanna do/ bodyguard

29
Q

What are limitations of firewalls and gateways?

A

IP spoofing: router can’t know if data “really” comes from claimed source

30
Q

A firewall filters packets based on?

A

rules or criteria set by the network
administrator

  • EX: source and destination IP addresses, port numbers, and the protocol used (e.g., TCP or UDP)
31
Q

Which of the following implementations of IPsec is the least secure:
a. AH with ESP in tunnel mode
b. AH with ESP in transport mode
c. AH without ESP in either mode
d. ESP without AH in either mode

A

C.

AH alone only provides source authentication

32
Q

Which of the following is an interdomain protocol?
a. BGP
b. RIP
c. OSPF

A

a.

BGP = interdomain
RIP & OSPF = intra domain