CS4203 Flashcards

1
Q

Asset Definition

A

Anything the computer system controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

How do buisnesses measure risk?

A

risk = expected cost x probability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why does risk = expected cost x probability not work?

A
  • cannot always estimate cost of something happening
  • cannot always estimate probability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a qualitative way of measuring risk?

A

Create categories for hazards e.g. negligible, minor, major, survivable, existential.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a threat actor?

A

Could be company, state, hacker, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a threat model?

A

Points of attack against a system. prioritised by risk, vulnerabilities and countermeasures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an attack?

A

The execution of a threat using an attack vector by a threat actor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a threat?

A

A way in which the system could be comprimised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Identity?

A

Who you are.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an attack vector?

A

A specific vulnerability in the system that can be used in an attack against the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is agency?

A

The things that you are allowed to do. (connected to identity)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is privacy?

A

The requirement that information only be seen by those who have permission to see it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is authentication?

A

Proving a claim to an identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Anonymity?

A

Prevent something from being associated with an identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Can scripts act as users?

A

Yes and in fact it is very hard to distinguish between a person and a bot (sciprt acting as a user)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is non-repudiation?

A

The inability to deny that you did something.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is trust?

A

A combination fo agency and identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is reputation?

A

Trust in an agent migrates from one system to another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a vulnerability?

A

Aspects of a system that provide a mechanism for a threat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a security model?

A

A precise statement of the rules that the system should implement and the properties it should maintain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Why do you need a security model?

A

Security is a whole system issue, therefore everyone needs awareness of the risks, policies and warning signs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

List some consequences of being attacked?

A
  • Locked out of systems
  • Damage, time take to re-build and check integrity
  • Reputation damage to the company
  • Fines
  • Lawsuits
  • GDPR violation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Why can new technology be a bad idea?

A
  • users will use it incorrectly unless they have training
  • users will have to change their behaviour which they will resist
  • extra security measures will not be liked and will be circumvented where possible
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are some criticisms of security models?

A
  • might describe policies you cannot enforce
  • cannot identify every threat this way
  • cannot list every system component
  • how do you introduce new components
  • how do policies map to files and permissions?
  • does the OD provide the needed service
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
What is the military model for information access?
Individuals and assets have a sensitivity level which describes their permissions.
24
What are some pros and cons of the military information model?
Cons: - Might be forced to fragment documents as people need access to parts but not other sections Pros: - Easy to move people/documents to different sections, so fewer mistakes when changing security levels
25
What are ACLs?
Access Control Lists - to each asset associate a list of users and their permissions.
26
Pros and cons of ACLs?
Pros: - Cons: - relies on identity - looks at assets independantly (how do you make sure everything is consistent?) - What is the difference between write and append?
27
What is RBAC?
Role-Based Access Control - A user is given a role, permissions are associated with roles and not users.
28
What are some pros and cons of RBAC?
Cons: - basic form is just like ACLs - Can build very general structures but these could get too complicated to maintain - need ways to move between roles - what if a role is revoked Pros:
29
What are NIST's five functions?
Identify Protect Detect Respond Recover
30
What are some critiques of NISTs five functions?
- Focus on the process rather than the mechanism - Lots of mechanisms could be used in each of the functions
31
What are some features of cryptography other than encryption and decryption?
- can be used to authenticate someone (public-private key) - therefore provides non-repudiation
32
What is the goal of encryption?
Make some data computationally infeasible to read in an appropriate interval
33
What are the cipher styles and what are they suited to?
Stream (data encrypted as it is generated) - suited to network transmissions Block (data encrypted all in one go) - suited to files
34
Why should you use open source ciphers?
- creating a cipher is very specialised - if you make your own you are almost guaranteed to program in weaknesses that will be exploited - best algorithms are open source anyway so there is no need
35
What are the pros and cons of symmetric key encryption?
Pros: - Use the same key to talk to different people - very fast Cons: - Don't know exactly who sent the message if lots of people use the same key - How do we get the keys in the first place? - Can we remove a key from someone?
36
What is a keyserver?
A repository for public keys
37
Pros and cons of asymmetric encryption?
Pros: - Message can't be read unless attacker gets access to receiver's private key - Key distribution is easy - can be used to authenticate users Cons: - Orders of magnitude more complex than symmetric-key encryption
38
What is signing in the context of encrypted messages?
Use a private key to encrypt a message or a seperate section of text, which can then be decrypted with your public key in order to check that you are who you say you are.
39
How could a keyserver be attacked?
Replace someone's key woth your own.
40
What makes passwords insecure?
- They need to be used by humans and therefore both memorable and unpredictable. - if you use words then lower entropy because of the english language and the likelyhood of two letters being next to each other
41
What is entropy?
The measure of disorder of a system.
42
What is Shannon entropy?
The number of bits needed to transmit a message X of lenght n. Used for error-correction codingg and compression.
43
What us a replay attack?
If you get the password once then you can use it against the service you want to attack.
44
What is reuse?
People use the same password on multiple services.
45
What is a key logger?
Records all of the keys a user enters.
46
Why do policies need to take into ccount human limitations?
People can only remember so much. Don't mandate that they cannot write down passwords and then force them to remember 5 passwords each with 25 random alphanumeric characters
47
Pros and cons of biometrics?
Pros: - cannot forget it (always with you, part of you) - Hard to fake Cons: - needs to be stable enough for authentication - needs to be unintrusive - lookalikes - fake fingerprints - hold the person to the camera/fingerprint reader - once compromised, very hard to regain security (valid person cannot change their biometrics)
48
Draw the OS structure.
Layers: - Processes (accessing library and standard library) (multiple) - Library (multiple) - Standard Library - Kernel - Drivers - Firmware - Hardware
49
What is kernel space?
Has unrestricted access to everything. Root/admin privilages.
50
What is user space (userland)?
Access resources through the kernel. User privilages, all privilaged operations through the kernel.
51
What are the points of vulnerability in an OS?
- Accessing other running processes - Accessing data inappropriately - Accessing hardware resources inappropriately - Where did that library come from? - What does that driver do? - What does that hardware do?
52
What is isolation?
Processes are kept seperate, with their own memory and list of open files.
53
What security does isolation provide?
A fault in one program can’t corrupt the memory of another.
54
How can processes interact even with isolation?
Explicity through pipes, sockets or shared blocks of memory. Implicitly by changing files they both have access to.
55
What are the responsibilities of thekernel and the user?
User: - All of the programs and the languages - trust the kernel to isolate from malicious code Kernel: - The data structures and functions that need to be standardised for all users and processes
56
What are traps?
Mechanism for crossing the trust boundary into kernel space.
57
What is a kernel-beneath-the-kernel?
A security microkernel: - Hold sensitive data securely, potentially even from the kernel - Sometimes provides checks as to what software can be loaded, including kernels - Isolate security features into as small as possible a code footprint – which can then be checked extensively
58
How does Unix describe permissions?
Create groups to describe permissions, each user can be in multiple groups.
59
What is Security-Enhances Linux?
An extension to ordinary Linux that adds better RBAC in place of/alongside groups and file permissions
60
What are common services?
Anything the OS provides is available to all processes “as standard”
61
What is full-disk encryption?
Use crypto as standard so that all files are encrypted at rest, with no user involvement.
62
Two virtual machines running on the same physical machine have some differences. What are they?
Each has its own kernel and therefore potentially a different operating system and a different sets of users, groups, permissions.
63
What manages the virtual machines running on a host?
The hypervisor.
64
What is a container?
An isolated userland, instead of a VM. Same kernel, but different libraries, etc.
65
What is the virtual upgrade problem?
Updating the host doesn’t upgrade the VMs or containers. May end up with outdated, security-compromised software running, and may not even know it.
66
What are the challenges of digital cash?
- No double spending - No duplication - No repudiation - Paying for the infrastructure
67
How does bitcoin keep transactions secure?
- cryptographic hash - nonce is found which makes it hash to a specific value (0) - now if transaction is altered the nonce and hash won't map to 0. - even if you can change one block, each block is connected to another block which will now not match up
68
Are you anonymous when using bitcoin?
Technically yes, your public identity is just your wallet. However might be able to identify you based on your transactions or if your identity is mapped to your walet then all of your transactions are visible. Also moving crypto into a bank means it will be linked to you.
69
How does accessing remote machines impact security?
- Fundamentally less information about users - More points of attack - Often more value in a given attack: attack the bank rather than just one customer - Greater anonymity, harder to track
70
What is DDoS?
A (Distributed) Denial of Service attack. Prevent anyone from accessing the server, attack a router nearby, or flood with fake traffic to prevent the real trafffic from being processed.
71
What are back doors?
A way to log-into or control a system other than through the normal secured channels.
72
When would you want a back door?
A vendor or provider needs to get in when there’s a problem for the usual route. For use in exceptional cases, so should come with exceptional requirements
73
What does ssh use for identification?
A keypair/certificates
74
How can you identify a machine?
MAC or IP address
75
What is a DNS?
Domain Name System - maps structured network and machine names to IP addresses, gives info to anyone who asks.
76
What is DNS poisoning?
Change a DNS entry and all lookups can be sent to a different machine
77
What is a Man-in-the-middle attack?
Machine sitting between a user and a legitimate server. Pass information on but only after stealing something. Relies on the (in)ability to identify a specific machine
78
What is a suplpy-chain attack?
Instead of attacking the target, attack a service that it uses or downloads software from.
79
What is a DMZ?
A Demilitarised Zone of untrusted services. Basically an area between two firewalls, allows some untrusted clients to connect to DMZ, but not through to the intranet.
80
What is confidentiality in terms of a message?
Traffic can only be read by the sender and the indended recipient.
81
What is anonymity in terms of a message?
Only the sender and intended receiver know of the existence of the message
82
What is authentication in terms of a message?
Both sender and receiver can demonstrate that they are who they say they are.
83
What is integrity in terms of a message?
The message arrives uncorrupted
84
What is non-repudiation in terms of a message?
The sender cannot deny that they were responsible for the message
85
What is relay protection in terms of a message?
The message cannot be copied and reused.
86
What is efficiency in terms of a message?
Scheme must be feasible for target devices
87
Whatv are the layers in teh 5-layer internet model?
Application, Transport, Network, Link and Physical
88
What is packet switching?
Packets are encapsulated as the descend the layers to be moved
89
Name an attack vector for the application layer.
The individual flaws in each individual program deployed (including the OS)
90
Name an attack vector for the transport layer.
Record and analyse an individual “flow” or exchange of data over TCP/IP and similar protocols
91
Name an attack vector for the network layer.
Capture each packet
92
Name an attack vector for the link layer.
Compromise the driver within the OS
93
Name an attack vector for the physical layer.
Cut wires, or otherwise access the hardware.
94
What do IP packets reveal?
Routing information, (source and destination addresses, who you're talking to) and the data being communicated.
95
What is tunnelling?
Create a secure passageway through an otherwise insecure network, Traffic through the tunnel is visible, but unreadable.
96
What is IPSec?
Secure version of IP - encrypt the payloads of the packets.
97
What is transport mode (IPSec)?
Encrypt the payload, leave the routing information intact and unchanged
98
What is tunnel mode (IPSec)?
Encrypt both the payload and the IP header as well
99
What are the consequencees of VPNs?
- From user perspective traffic is addressed and sent as normal - VPN takes packets and tunnels them elsewhere - masks a user's location
100
What is TLS?
Transport Layer Security - leave the network layer unchanged, instead encrypt an entire exchange end-to-end in the transport layer.
101
What does onion routing do?
- different packets take different routes through a network - Can’t track back from the destination to a source, only to the egress node of the onion
102
Give an example of a protocol or service which uses TLS
HTTPS, SSH
103
What are session keys?
After securing a single exchange then create a symmetric key shared by both sides, used it to secure an exchange. Thrown away when the connection is torn down.
104
What is Diffie-Hellman Key exchange?
- Take a shared basis, which can be public - Each side adds some secret element - Synthesise a common secret - Don’t disclose enough information for the common secret to be retrieved
105
Outline the steps of a Diffie-Hellman exchange.
- Alice and Bob agree two numbers which do not need to be secret (p and g, both should be prime numbers). - Alice chooses secret number a and computes A = g^a mod p (Bob does the same with B and b) - Alice computes B^a mod p, Bob computes A^b mod p - these calculations are equivalent and so they now have a shared secret!
106
What is a certificate?
A claim to an identity, possession of the certificate is the claim. They are also (preferably) tied to a specific machine
107
What are certificate authorities?
A CA signs certificates to assert the claims they make are genuine
108
What are certificate bundles?
Bundle a set of CA public keys and distribute them in a way that has “reasonable” trust
109
What problem does a certificate bundle solve?
The key bundle is then available for checking locally, without accessing a key server, which could be compromised at any time. Compromising keys now requires compromising teh update process
110
What are certificate chains?
Allow one CA to sign the keys of other CAs or entities that validate certificates
111
How can code be used as an attack vector?
- install malicious code - find an unexpected way to get code to run - find an expected way to get code to run - but make it malicious
112
What is a buffer overrun?
A program has a buffer to receive data and the attacker provides data that's actually machine code. The attack relies on returning “too much” data and having the extra data overwrite the call stack. Specifically it re-writes the return pointer, so when the function is called the malicious data is run instead.
113
Give one defensive programming reason for languages to have exceptions.
So programmers don't need to remember to check manually everywhere for errors (like buffer overrun, etc.)
114
Why should you sanitise input?
You cannot trust that user input will not be malicious and so you need to sanitise it to make sure it doesn't compromise your program
115
Why is type-safety good for security?
Type-safe languages like Java can avoid some subtle attacks: - run-time will stop you writing off the end of a buffer (array) of a given length - stop you treating an integer as a pointer etc - can't pass too many parameters to a function (compiler will complain)
116
What is a security API?
An API for controlling program's permissions
117
How do security APIs work?
Refer “sensitive” operations to a security monitor
118
What are some issues with Security APIs?
- Potentially very fine-grained - Can be hard to specify - Requires us to identify what is “sensitive” – and check every time
119
What are sandboxes?
An isolated “place” for code to run in. Only code and data in the sandbox can be accessed by code in the sandbox
120
Give an example of computing with limited knowledge using passwords.
Instead of storing a plaintext password that someone who could access the database could use, instead store a derivative of a password that you can still check against. (There are still issues with this but it's a bit better)
121
Describe secure distributed computation (secure multi-party computation).
Two or more participants with information that only they know and a computation that needs to be performed. With a trusted party (agent): every participant can send their private info to the agent, who performs the needed computation and returns the result to every participant. Real world: all participants communicate using some protocol which decides for each participant what they do next.
122
What is the threat model for secure distributed computation (secure multi-party computation)?
M gains control of P_i: - learns x_i and the result - cannot learn other secrets - could influence the computation M gains control of the agent: - learns all of the secrets- can send any value as the result including different values to different participants
123
What are secret shares?
A value s has to be kept secret. A (t, n)-secret sharing divides s into n pieces, such that AANY set of shares whose size is less than t does not reveal any info about s.
124
What are random oracles?
A random function which receives a value x, if it has seen x before it returns the same value as last time. Otherwise it computes, remembers and returns a random value. This can be shared between particpants since x alwasy gives the same answer. We don't know if x is newly generated or remembered.
125
What is oblivious transfer?
One party sends two secrets. Another party sends a bit and receives one of the secrets. The sender doesn't know which secret was received and the receiver doesn't know the other secret.
126
What is commitment (component)?
Sender sends a secret value, later opens the secret which is passed to the receiver. The sender cannot change the secret, only choose to reveal it.
127
What is a zero-knowledge proof?
One party (the prover) creates a value x and a public predicate C. Sends C and x to the component. If C(x) == true the component confirms this to the other party (teh verifier) without revealing x. The verifier knows that a solution exists and the prover knows it but not what it is.
128
What is the difference between malicious and semi-honest participants?
Malicious participants can do anything, including not follow protocol, whereas semi-honest participants always follow protocol but can pass unexpected or tailored attack values.
129
What are Garbled Circuits?
A party P1 wants to compute a value of F(x0, x1) without learning the secret from another participant P0 and without revealing its own secret.
130
Detail a case of Garbled Circuits with a small domain.
- Agree a symmetric key algorithm E - P0 creates a table T of F(x0, x1) for all pairs of values - for each possible x0 and x1, construct a random key - encrypt every element of T using the keys of both the row and the column, giving E(T) - scramble the rows and columns - send E(T) amd k(x0) to P1 - send all keys (that use the value of x0) created to Oblivious Transfer - P1 sends x1 to OT and gets appropriate key - use symmetric encryption algorithm to retrieve the value of F(x0, x1)
131
Can oblivious transfer actually be built?
- sender sends x0, x1 to OT - reciever generates a keypair (kp, ks) and a public key kp' - if b=0, send (kp, kp') to OT, else send (kp', kp) - OT encrypts x0 and x1 with respective keys and returns them - sender can only decrypt the one he selected - only works if reciever follows the protocol
132
What is intrusion?
An unwanted or unauthorised participant in some interaction.
133
What is reconnaissance?
Entering a network to scout-out what's there. Not an attack but is an intrusion.
134
Give some examples of intrusions
Take over a machine, observe a connection, take over a connection
135
Detail how to learn about a network topology without compromising a machine.
- Listen to network topology - Find the DNS server - Query it (always responds)
136
Give a threat of using only TLS to set up a connection.
TLS provides confidentiality but not authentication. Mallory can sit in the middle and pass on request, always giving the correct answer. Can fix this issue by using certificates to authenticate.
137
What are some issues with certificates?
- Need to trust the certificate signing process - Need to trust key management of the person you are questioning
138
How could traffic analysis indicate an intrusion?
- connections to weird machines - repeated failures to connect to one of the machines - open ports where there shouldn't be any
139
What are the differences between network-based and host-based intrusion detection systems?
Network-based looks at traffic while host-based keeps track of important files. However both typically have a rules engine looking for patterns. Network-based looks for patterns in traffic, host-based looks for patterns in log files.
140
What does an IP or TCP level firewall do?
- Examine the packet headers - Don't examine the payloads
141
What does a deep packet inspection firewall do?
- Looks into the payloads - only works for unencrypted traffic
142
What is pen testing?
A simulated attack against a system, using tools real attackers would use against real vulnerabilities.
143
What are some characteristics of cloud systems?
- usually physically secure - exposed to DDoS and remote access
144
What are some characteristics of edge devices?
- more exposed - less centeral admin oversight
145
What are some characteristics of endpoint devices?
- often user managed - physically vulnerable
146
Why provide edge services?
- closer to endpoints, so often faster - fewer network points to attack
147
What gets put on the endpoints?
- Often significant client-side programming - Avoid loading servers and incurring delays by performing validity-checking, UI, etc, locally - Potentially remain available even if the network is lost
148
What are the security impacts of placement of edge and endpoint devices?
- Often outwith the control of central admin - May adopt different (weaker?) policies
149
How does user interaction with phones change their security needs?
- Phones are expected to allow rapid, short-length interactions which prioritise convenience and speed - No hover feature (phishing links) - users find 2FA frustrating - data opens alongside the phone (biometrics may make it easy to force open) - device tracking and partial wipe if data lost are objectionable on personal phones, maybe give out work phones - users don't want to carry around 2 phones
150
What are the features of the cloud?
- Elastic, essentially unlimited computing - Physically secure in a data centre - Protected by IDS, firewalls, ... - Has to be accessed over the internet
151
List some attack vectors against the cloud.
- Management needs to happen via the internet so all of the usual issues with remote logins and the hypervisor may expose info to other tenants - Provider itself who by definition has root access to all the machines and can probably read all the file systems - lots of cooperating services, any one of which could contain an exploit
152
What changes in regards to admin when using cloud computing?
Can be automated in the cloud (when they'd usually require a sysadmin) - spinning up new servers, storage - deploying new services - Entirely new services (e.g. automated load balancers)
153
What effect does cloud have on security?
- Hard to get the initial security set-up right (how to get at certificates, suthenticate new instance, etc) - disc encryption is only of limited use if the keys are stored online - Essentially constructed a man in the middle
154
What is perimeter security architecture?
Add defence zones with firewalls between them, assumption being that any traffic within each network zone is there appropriately. No checks on traffic except with the firewalls.
155
Whaat is zero-knowledge storage?
Server holds data encrypted without the keys.
156
What is a zero trust architecture?
Treat all machines as suspect, evne if deployed by us. Everything authenticates at every exchange.
157
How do you make sure that certificates are only available to the proper machines?
Put the management software elsewhere, provide the keys only at run-time when a service spins up
158
Pros and Cons of automating complete re-building on spin-up?
- Easier to ensure consistency: users, keys, roles, etc. Code it once and reuse - Can be automated as part of a CI/CD pipeline so that changes to the system automatically deploy it - Not all services are easy to use this way
159
What is CI/CD?
Continuous integration/Continuous deployment - runs all tests at every major commit, then deploys the newly-coded services automatically when they're updated
160
What is a virus?
Self-propagating software, moves from machine to machine. A deployment mechanism for a payload (exploit vulnerability to get the payload onto the target machine)
161
What are some attack vectors that a virus could exploit?
- email attachment - email link - social side (get user to interact)
162
How does access control affect viruses?
A virus is executed by a process which is associated with some user, therefore only has the privileges of this user. So the better the access control then the less damage a virus can do (could still be very bad)
163
What are zero-day exploits?
Exploits that have never been used before
164
What is a rootkit?
A piece of software that lets an ordinary user become an administrator (privilege elevation)
165
What is ransomware?
- Installs rootkit - encypts entire disk - offers to decrypt disk for ransom
166
What is a botnet?
A virus that doesn’t actually attack the target it’s installed on, instead taking control of it and giving it orders.
167
What is a signature in relation to viruses?
Identify a pattern within the code of a virus which distinguishes its code from everything else. Look for this signature in files
168
What are polymorphic viruses?
Change their code at each spreading event to evade detection: break up code signature, re-write basic blocks, re-arrange them, change jumps, etc.
169
What are some network features that are of interest to sefcurity?
- How are nodes connected to other nodes? - How do I “get from” one node to another? - Can I always “get” between nodes?
170
What is degree (network)?
Degree is the number of immediate neighbours a node has. Maximum degree is N – 1 (cannot have multiple connections to the same node)
171
What is density?
Density is the fraction of edges a node has compared to how many it could have
172
What is the degree distribution?
pdistribution of degree across network. k is the probability that a node chosen at random will have degree k
173
Give some properties of ER networks.
Degree distribution is a bell curve. Not very tolerant of failure. Resilient to attacks.
174
Give some properties of Powerlaw Networks.
Degree distribution decreases exponentially quickly. When routing go for the hubs. Tolerant of failure. Not resilient to attacks.
175
What network distribution is the internet?
Powerlaw.
176
What is degree centrality?
Highest value(s) of k such that pk > 0. (Hubs)
177
What is betweenness?
Compute the shortest path between nodes, compute what fraction of those paths goes through each node. High betweenness is being on a lot of short, efficient routes
178
What effect does network have on viruses?
Viruses will naturally find their ways to hub and spread a lot easier there (powerlaw is vulnerable)
179
What is operational security?
Maintain security as a basic part of operations, integrate into normal activities
180
Why is it hard for people apply security practuises to computers?
- Establishing a habit is hard - Computer is mostly less tangible - Don’t realise how much valuable data they leave online - Still think the attackers are people, rather than bots - Some attacks are too complicated to imagine
181
What are side channels?
A way to extract or infer information without performing a direct attack or exploiting a technical weakness or bug
182
Give some example of side channel attacks?
- Who is talking to whom? – even if we can’t read it - Has their pattern of communication changed? - Has a machine suddenly started using a lot more power? - Is an operation suddenly a lot slower?
183
What is a social engineering attack?
Get some information changed by persuading someone it’s needed/appropriate/allowed
184
What is social media linkage?
People re-use social media handles
185
What is linkage analysis?
Know someone and infer their links, identifying one may allow you to identify others based on who they talk to.
186
Whaat are some countermeasures for protecting patterns of sending information in a network?
- mask patterns in movement, make everything look the same. - add random traffic - add traffic to make other participants look more important than they are
187
What are leaky content types?
Some content types in web pages leak information.
188
List some purposes of policies.
- Specify people’s responsibilities - Specify guarantees of work standard - Specify technologies, or the properties of technologies, or the use of standards
189
What are the buisness/legal goals of policies?
- minimise service downtime - avoid user data loss - devise a set of behaviours that deliver the business while complying with necessary restrictions
190
What are the technology goals of policies?
- specify the properties of solutions - mandate specific technology
191
Why do you need to be able to enforce policy?
- forces a sense of reality - cost/benefit analysis - forces prioritisation - stops policy demanding the impossible
192
What is operationalisation?
The act of taking a policy and turning it into a technological solution
193
What are the different classes of backups?
Snapshots: possibly taken every few minutes and probably held locally Epoch: a complete dump of the data Dailies: taken every day and diff’ed against the epoch to save space
194
What are some security issues with file synchronisation?
Propagates changes in both directions and therefore may propagate attacks like viruses.
195
What is dead storage?
- reduced access from the main systems - need a policy for access - could conflict with other goals, like allowing people to get old versions of files
196
How can you tell if a file has been corrupted?
Store a hash at every legitimate change and periodically check these. Check if it has been encrypted is harder.
197
What is replication (files)?
Keep all data in several independent locations, send all database queries to main and backup servers
198
Describe different replica styles.
Hot: if the main server fails the backup takes over transparently Warm: sysadmins can spin up the backup quickly
199
What are the issues of replicas being located across a DMZ?
- Need to be able to operate with un-timely data (so not completely up to date)
200
How do you deal with re-synchronisation for backups/replica?
- resolve consistancy issues - ensure the data is self-consistent
201
What are the different security concerns for session vs stateless APIs?
Sessions: - Alice has an extended identity - Probably need to keep the connection secured and open - open connection may be easier for programmers to use Stateless: - Server services a request and then forgets all about Alice - Lots of re-authentication - may be harder to express some operations
202
What are IoT devices?
Systems with sensors attached to the internet
203
Why are they migrating to the internet? IoT
- The massive convenience of using IP - Available chipsets, libraries, infrastructure, … - Leverage other IP-based things, like HTTP
204
What are the characteristics of IoT devices?
Typically: - wireless - low-power - physically exposed
205
What are some attacks on IoT devices?
- might use clear communication if encruyption is too power hungry - how does it get crypto keys - can the hardware be tampered with? - replace components - contain keys to other services - distort recorded data
206
What are some sources of entropy on a desktop/laptop?
Keystrokes, network packet arrival times, disc accesses, process context switches
207
How is entropy effected with IoT devices?
- Typically have less going on than laptop/computer - fewer entropy sources to draw on - less variation in random numbers - weaker crypto
208
Why are specialised keys helpful?
Carve-up access space, allocate one key per role. Limit impact of a stolen key, escpecially important if on a vulnerable device.
209
What are PUFs?
Physical Uncloneable Functions - flaws in hardware unique to each instance of a device. Take the flaws and use them to get entropy, this creates a random but repeatable function.
210
Can PUFs be used for challenge/response?
Yes - challenge with stimuli and the response is tthe value. Need to be careful of spoofing and replays. This is authentication, not confidentiality.
211
Do consumer devices have good security (IoT)?
No. Easily copied, low-security protocols (often not even HTTPS), non-unique keys, standard admin passwords,...