Ch.15 Flashcards
(9 cards)
Security violation categories (5):
Breach of confidentiality
Breach of integrity
Theft of service
Denial of service
Security violation methods(4):
Masquerading
Replay attack
Man in the middle.
Session hijacking
Security must be enforced at four levels:
Physical
Human
Operating system
Network
Program threats(6):
Trojan horse
Trap door
Logic bomb
Stack and buffer overflow
Viruses
Virus dropper
Virus categories
File/ parasitic
Boot/memory
Macro
Source code
Polymorphic( to avoid having a virus signature)
Encrypted
Stealth
Tunneling
Multipartite
Armored
Network threats are harder to detect because:
- weaker protection systems
- no shared secret
- no physical limits
- can’t determine the location of connecting system
Worms attack strategy:
- exploited UNIX networking features
- exploited trust relationships
- used a grappling hook program
What does cryptography enable
Confirmation of source
Receipts only by certain destination
Trust relationships between sender and receiver
Cryptography can be done ate various layers of ISO reference model. What are those layers:
Transport layer: SSL
Network layer: IPSec, IKE protocol, basis of VPNS