Lecture 18: 13th November 2019 Flashcards

Wifi & Cloud Security

1
Q

What is Wifi?

A

= Wireless Fidelity = a family of wireless networking technologies, based on the IEEE 802.11 family of standards, which are commonly used for local area networking of devices and Internet access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is cloud computing?

A

The practice of using a network of remote computers hosted on the Internet to perform computational tasks, rather than doing so locally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is RFID?

A

Radio-frequency identification = using the engineered electromagnetic fields of objects to automatically identify and track tags attached them. The tags contain electronically stored information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is WEP? What cipher does it use?

A

Wired Equivalent Privacy = an obsolete security algorithm for IEEE 802.11 wireless networks. It was designed to provide a wireless local area network (WLAN) with a level of security, confidentiality, and privacy comparable to what is usually expected of a wired LAN.

it uses RC4.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is RC4?

A

Rivest Cipher4 = an obsolete stream cipher used for encrypting data. It is very simple and fast but is very insecure, having multiple vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is TKIP?

A

Temporal Key Integrity Protocol = an encryption protocol used in the IEEE 802.11 wireless networking standard to replace WEP in WPA. It was a temporary fix to WEP’s vulnerabilities that extended its functionality without having to replace legacy hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is WPA?

A

Wi-Fi Protected Access = a security standard for 802.11 that has more sophisticated data encryption and better user authentication than WEP. The first version was designed to be backwards-compatible and able to be implemented on the same hardware as WEP to quickly fix its vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is WPA2?

A

The second version of the WPA which fixed issues in WPA arising from plugging the gaps of WEP - it made it a lot harder to exploit vulnerabilities but it was still possible. it did this with the introduction of the AES algorithm over TKIP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a MIC?

A

Message Integrity Code = a digest of a hash algorithm applied to data that ensures its integrity and authenticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the differecnes between WEP, WPA, and WPA2?

A

WEP was original, used RC4, and is very insecure. WAP was a WEP fix compatible on old hardware and introduced TKIP which extended WEP and made it a lot harder to exploit. WPA2 made a more robust and stable solution, using AES instead of TKIP (though it can also support TKIP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the modes of WPA2?

A

personal and enterprise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is personal mode in WPA2?

A

Uses a Pre Shared Key (PSK) and therefore does not require separate authentication. This is the same as WPA.

Aka WPA2PSK, a method of securing your network using WPA2 with the use of the optional Pre-Shared Key (PSK) authentication, which was designed for home users without an enterprise authentication server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is enterprise mode in WPA2?

A
uses IEEE 802.1X based authentication, the Extensible
Authentication Protocol (EAP) which has various levels such as Transport Level Security (EAP-TLS), or Tunneled TLS (EAP-TTLS), Protected EAP versions – some with token cards or an identity module.

greater level of security than personal mode. not just 1 password for everyone, makes encrypted tunnels for each device after authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is an AP?

A

Access Point = WAP = a networking hardware device that allows other Wi-Fi devices to connect to a wired network. The AP usually connects to a router (via a wired network) as a standalone device, but it can also be an integral component of the router itself. An AP is differentiated from a hotspot, which is the physical location where Wi-Fi access to a WLAN is available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is RADIUS?

A

Remote Authentication Dial-In User Service = a networking protocol, operating on port 1812 that provides centralized Authentication, Authorization, and Accounting management for users who connect and use a network service. A RADIUS server utilizes a central database to authenticate remote users. RADIUS functions as a client-server protocol, authenticating each user with a unique encryption key when access is granted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a PAE?

A

Port Access Entity = The protocol entity associated with a port. May support functionality of Authenticator, Supplicant or both. A conceptual controller to allow or drop network traffic ingress and egress to/from a controlled port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is EAPoL?

A

Extensible Authentication Protocol (EAP) over LAN (EAPoL) = a network port authentication protocol used in IEEE 802.1X (Port Based Network Access Control) developed to give a generic network sign-on to access network resources.

Extensible Authentication Protocol (EAP) over LAN (EAPoL) is a network port authentication protocol used in IEEE 802.1X (Port Based Network Access Control) developed to give a generic network sign-on to access network resources.

It provides an authentication mechanism to devices wishing to attach to a LAN or WLAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How does WPA2 authentication work?

A

In WPA2 Personal mode, authentication is between the client and an Access Point (AP) with the AP generating a PSK from a plain text passphrase that is used for all devices.

In Enterprise mode, the AP provides access control to the authentication (RADIUS) server. The AP has 2 logical parts: service and authentication and Port Access Entity (PAE). The authentication PAE is always open. The service is opened after successful authentication using
EAPoL (EAP over LAN). Because each device is authenticated before it connects, a personal, encrypted tunnel is effectively created between the device and the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a PTK?

A

Pairwise Transient Key = a key containing keys that are used to encrypt unicast data frames that traverse the wireless medium. Used for the broadcast/multicast of neighbour-to-neighbour keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a GTK?

A

Group Transient Key = a key used to decrypt multicast and broadcast traffic. Used for the broadcast/multicast of neighbour-to-neighbour keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

How does key generation work in WPA2?

A

There are 2 sets of 2 handshakes to try and ensure fresh key generation and distribution, problems with previous WPA generations. The 4-way handshake is for Pairwise Transient Key (PTK) and Group Transient Key (GTK).

There are four EAPoL messages between the client and the Access Point (AP) to confirm the client knows the Pairwise Master Key. From this a PTK is generated which should be fresh for each transaction, nonces are generated by both client and AP.

GTK and MTK are used for the broadcast/ multicast neighbour-to-neighbour keys.

22
Q

How do WPA2 handshakes work?

A

In a 4-way handshake:

  • authenticator (A) to supplicant (S): EAPOL-KEY msg 1 => PTK made in S
  • S to A: EAPOL-KEY msg 2 => PTK made in A
  • GTK made in A then sent to S in E-K msg 3
  • S to A: E-K msg 4 confirming temporal keys (PTK and GTK) installed in both
23
Q

What are some vulnerabilities of WPA2?

A

DOS can be frequency jamming, data flooding, layer 2 session hijacking.

Deauthentication can happen by forcing the client to reauthenticate. The attacker could spoof MAC addresses.

Disassociation is when the authenticated client with multiple APs disassociate from some of them.

24
Q

How does RFID work?

A

An RFID (dumb) tag is read from an EM field by a reader to get its info; in shops, they are searched against a database to locate and monitor goods.

25
Q

What are some vulnerabilities of RFID? What are some defensive measures?

A

Tags can be eavesdropped, traffic analysed, spoofed or even subjected to DoS.

Tag memory can be password protected or locked with a unique ID. Special readers or detectors can be used to read/ detect groups of RFID tags.

Some tags can have a kill command embedded to protect privacy or shielded within a Faraday Cage to stop scanning. A Hash-lock integrity value could be added to the RFID memory. Active jammers could be used to protect against reading.

26
Q

What are some security issues with cloud computing?

A
  • Many users, operating systems, servers, clients, and applications
  • Many transactions using Virtual Machines and Virtual Networks
  • Separation of VMs, VNs
  • Storage issues, Insecure APIs
  • Service Level Agreements (SLAs)
27
Q

What are some services provided on the cloud? (xaaS)

A

infrastructure, software, platform, network, storage, data, desktop, mobile backend, security, etc

28
Q

How can you defend cloud-based systems?

A
  • Firewall (inc. IDS)
  • AntiVirus
  • Authentication
  • Access Control
  • Application/ Web
  • Monitoring/ Response etc.

Be sure to apply defence in depth and have a multilayered approach: no 1 tool can protect against all vulnerabilities

29
Q

What are the 5 top threats facing cloud computing systems in 209 according to the Cloud Security Alliance?

A
  1. Data Breaches
  2. Misconfiguration and inadequate change control
  3. Lack of security architecture and strategy
  4. Weak or Insufficient Identity, Credentials, Access and Key Management
  5. Account Hijacking
30
Q

What steps can be taken to defend cloud-based systems from their top threats?

A
  • Reinforce internal security
  • Demand transparency
  • Consider legal and commercial implications

Gartner considers the following security concerns:

  • User / privileged access
  • Compliance
  • Data location
  • Data segregation
  • Disaster recovery
  • Long term Viability
  • Investigative support (for any nefarious activity
31
Q

What is virtualisation?

A

Virtualisation is the process of making software-based, or virtual, representations of things, such as servers, applications and networks.

In computing, virtualisation refers to the act of creating a virtual (rather than actual) version of something, including virtual computer hardware platforms, storage devices, and computer network resources.

32
Q

What are VMs?

A

Virtual Machine.

An emulation of a computer system. Virtual machines are based on computer architectures and provide the functionality of a physical computer. Their implementations may involve specialized hardware, software, or a combination.

A virtual machine is a software computer that, like a physical computer, runs an operating system and applications. The virtual machine is comprised of a set of specification and configuration files and is backed by the physical resources of a host.

33
Q

What are VNs?

A

Virtual Network.

Collectins of Virtual Machine computers that communicate with each other. VMs can be accessed by remote hosts and communicate in a way that makes the remote hosts appear to be connected in a real physical network even if they are remote from each other.

34
Q

How have Wifi standards changed over time?

A

Started with WEP in 1997. It used RC4, and is very insecure.

WAP was a WEP fix compatible on old hardware and introduced TKIP which extended WEP and made it a lot harder to exploit. It was introduced in 1999.

WPA2 made a more robust and stable solution, using AES instead of TKIP (though it can also support TKIP). It was released in 2002.

35
Q

What is isolation?

A

Segregating elements of a cloud computing system

36
Q

How can isolation be achieved?

A

Segregate threads, users, storage, processing, VMs, etc. Isolation can be done through different ports, masking and addressing, VPNs.

37
Q

What is a slice?

A

A computer network split by its topology (e.g. at a port or switch), a mapping (of links or ports), or packet predicates.

38
Q

What is a predicate?

A

Boolean atomic variables stored on packets which determine how they are routed in predicate routing.

39
Q

What were the key findings of the Ristenpart experiments on cloud security? What does it mean for two VMs to be co-resident?

A
  • it is possible to map the internal cloud infrastructure
  • it is possible to identify where a particular target VM is likely to reside
  • it is possible to instantiate new VMs until one is placed co-resident with a targeted one
  • it is possible to extract information from a target VM with another controlled one that is co-resident with it

Co-resident VMs = running on the same physical machine.

40
Q

What is risk assessment?

A

The process of identifying threats and vulnerabilities
and their impacts.

The analysis that leads to identifying threats and
determining the costs and actions required.

A cybersecurity risk assessment identifies the various information assets that could be affected by a cyber attack (such as hardware, systems, laptops, customer data, and intellectual property), and then identifies the various risks that could affect those assets.

Risk assessments are used to identify, estimate, and prioritize risk to organizational operations (i.e., mission, functions, image, and reputation), organizational assets, individuals, other organizations, or a nation, resulting from the operation and use of information systems.

41
Q

What is qualitative risk assessment?

A

Involves experts judging, analysing, and forming a consensus on the implications of the results of tests involved in a risk assessment, based on historical evidence. Involves describing problems and not getting/presenting data (though can cite it as evidence).

42
Q

What is quantitative risk assessment?

A

Gathering numeric data regarding the possibility of events harmful to a computer system and their impact should they occur. Makes no judgement - just getting raw data.

It involves the gathering of metrics, measurements, and probabilities of the impacts of possible events that may affect the system under analysis. Tools and techniques used may include cause and effect analysis, cost and benefit analysis, parto charts or baseline identification.

43
Q

What are some technology risks not involving security or privacy?

A
  • engineering aspects such as systems testing, systems control, and basic IT operations
  • physical safety such as flooding, break-ins, etc
  • corporate safety: going broke or being outcompeted
44
Q

Why can cloud-based services amplify the magnitude of risks?

A

A vulnerability in the cloud platform will then effectively be present in all who use it. Even on the scale of one server machine (physical or VM) in the cloud, this would affect many users, let alone a whole cloud services provider.

45
Q

What is the difference between a risk, a threat, and a vulnerability?

A

Vulnerability = weaknesses or security gaps in computer systems that may be exploited for attacks.

Threat = An attack vector: a means by which an attacker may exploit system vulnerabilities.

Risk = the likelihood of a threat and the resulting impact should it occur

46
Q

What priorities did ENISA recommend for future research in cloud computing?

A
  • effects of breach reporting
  • end-to-end data confidentiality
  • higher assurance clouds
  • incident handling
  • a comparison of regulation differences for data protection and privacy
  • resource isolation mechanisms
  • resilience and interoperability
47
Q

What security problems did ENISA find with risk assessments for cloud computing?

A
  • most methodologies are not specific or considerate enough to cloud systems
  • a lack of structured analysis approaches for risk
  • a lack of shared data of vulnerabilities and approaches
48
Q

What did ENISA identify as top security risks related to cloud computing?

A
  • loss of governance
  • lock-in
  • isolation failure
  • compliance risks
  • management interface compromise
  • data protection
  • incomplete data deletion
  • malicious insiders
49
Q

What are the 4 types of risk defence Tanimoto identified in their research?

A
  • Risk Avoidance
  • Mitigation
  • Transference
  • Acceptance
50
Q

What is 802.11i?

A

An amendment to the original 802.11 (Wifi) standard that aimed to improve its security against known vulnerabilities.

it brought TKIP, WPA, WPA2, and AES overWEp and RC4.

51
Q

What is a PSK?

A

PSK = Pre-Shared Key = a shared secret that was previously shared between the two parties using some secure channel before it needs to be used. To build a key from a shared secret, the key derivation function should be used. Such systems almost always use symmetric key cryptographic algorithms.

The term PSK is used in Wi-Fi encryption such as Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA), where the method is called WPA-PSK or WPA2-PSK, and also in the Extensible Authentication Protocol (EAP), where it is known as EAP-PSK. In all these cases, both the wireless access points (AP) and all clients share the same key.