Domain 3 Flashcards

1
Q

Code

A

Cryptographic systems of symbols that
operate on words or phrases and are
sometimes secret but don’t always
provide confidentiality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cipher

A

Ciphers, are always meant to hide

the true meaning of a message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Stream Cipher

A

is a symmetric key cipher where plaintext digits are combined with a pseudorandom cipher digit stream (keystream). In a stream cipher, each plaintext digit is encrypted one at a time with the corresponding digit of the keystream, to give a digit of the ciphertext stream

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Block Cipher

A

is a method of encrypting text (to produce ciphertext) in which a cryptographic key and algorithm are applied to a block of data (for example, 64 contiguous bits) at once as a group rather than to one bit at a time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Substitution Cipher

A

uses the encryption algorithm to replace each character or bit of the plaintext message with a different character. The Caesar cipher is a good example.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Transposition Cipher

A

uses an encryption algorithm to rearrange the letters of a plaintext message, forming the ciphertext message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Initialization Vector (IV)

A

is a random bit string (a nonce) that is the same length as the block size that is XORed with the message. IVs are used to create a unique cipher text every time the same message is encrypted with the same key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Caesar Cipher

A

substitution cipher that shifts characters, uses a key of length one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Vigenère Cipher

A

cipher uses a longer key (usually a word or sentence),

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

One time Pad Cipher

A
  • For a one time pad to be successful, the key must be
  • Generated randomly without any known pattern.
  • Key at least as long as the message to be encrypted.
  • The pads must be protected against physical disclosure
  • Each pad must be used only one time and then discarded
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Zero-knowledge proof

A

is a communication concept.
A specific type of information is exchanged, but no real data is transferred, as with digital signatures and digital
certificates.

More simply: It enables one to prove knowledge of a fact to another
individual without revealing the fact itself .

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Split knowledge

A

means that the information or privilege
required to perform an operation is divided among multiple users.

This ensures that no single person has sufficient privileges to compromise the security of the environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Work function or work factor

A

a way to measure the strength of a cryptography system by measuring the effort in terms of cost and/or time to decrypt messages.

The time and effort required to break a protective measure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Symmetric Key

A

Relies on the use of a shared secret key. Lacks support for scalability, easy key distribution, and nonrepudiation

Faster and for bulk encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Asymmetric

A

Public private key pairs for communication
between parties. Supports scalability, easy
key distribution, and nonrepudiation.

Stronger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

3DES Modes

A
  • Electronic Codebook Mode (ECB).
  • Cipher Block Chaining (CBC).
  • Cipher Feedback (CFB).
  • Output Feedback (OFB).
  • Counter (CTR).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

3DES Mode - Electronic Codebook Mode (ECB).

A

Simplest & least secure mode. Processes 64 bit blocks, encrypts block with the chosen key. If same block encountered
multiple times, same encrypted block is produced, making it easy to break.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

3DES Mode - Cipher Block Chaining (CBC).

A

Each block of unencrypted text is XORed with the block of ciphertext immediately preceding. Decryption process simply decrypts ciphertext and reverses the XOR operation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

3DES Mode - Cipher Feedback (CFB).

A

Is the streaming version of CBC. Works on data in real time, using memory buffers of same block size. When buffer is full, data is encrypted and transmitted. Uses chaining, so errors propagate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

3DES Mode - Output Feedback (OFB).

A

Operates similar to CFB, but XORs the plain text with a seed value. No chaining function, so errors do not propagate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

3DES Mode - Counter (CTR).

A

Uses an incrementing counter instead of a seed. Errors do not propagate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Key Clustering

A

A Weakness in cryptography where a plain text message generates identical ciphertext messages using the same algorithm but using different keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Public Keys/Private Keys (asymmetric)

A
  • Public keys are shared among communicating parties
  • Private keys are kept secret.

DATA

  • To encrypt a message: use the recipient’s public key.
  • To decrypt a message: use your own private key.

DIGITAL SIGNATURE

  • To sign a message: use your own private key.
  • To validate a signature: use the sender’s public key.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

HASH FUNCTION REQUIREMENTS

A

Good hash functions have five requirements:

  1. They must allow input of any length.
  2. Provide fixed length output
  3. Make it relatively easy to compute the hash function for any input
  4. Provide one way functionality.
  5. Must be collision free.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Cryptographic Salts
A salt is random data that is used as an additional input to a one way function that hashes data, a password or passphrase Adding salts to the passwords before hashing them reduces the effectiveness of rainbow table attacks.
26
DSS
Digital Signature Standard The Digital Signature Standard uses the SHA-1, SHA-2, and SHA-3 message digest functions… ``` Works in conjunction with one of three encryption algorithms: -Digital Signature Algorithm (DSA) -Rivest, Shamir, Adleman (RSA) algorithm -Elliptic Curve DSA (ECDSA) algorithm. ```
27
Certificate Authorities (CA)
generate digital certificates containing the public keys of system users. Users then distribute certificates to people with whom they want to communicate. Certificate recipients verify a certificate using the CA’s public key.
28
Email Traffic Encryption
- S/MIME | - Pretty Good Privacy (PGP).
29
Web Traffic Encryption
Transport Layer Security (TLS) | largely replacing the older SSL
30
Network Traffic Encryption
IPsec protocol standard provides a common framework for encrypting network traffic and is built into many common operating systems.
31
IPsec
A security architecture framework that supports secure communication over IP. Establishes a secure channel in 2 modes transport mode or tunnel mode. Can be used to establish direct communication between computers or over a VPN connection Uses two protocols: Authentication Header (AH) Encapsulating Security Payload (ESP)
32
Meet in the middle attack
exploits protocols that use two rounds of encryption.
33
Birthday attack
an attempt to find collisions in hash functions.
34
Replay attack
an attempt to reuse authentication requests.
35
DRM
Digital Rights Management Commonly protect entertainment content, such as music, movies, and e-books
36
Symmetric Algorithms
``` AES Blowfish Twofish 3DES RC5 ```
37
AES
Advanced Encryption Standard Symmetric Block Size: 128 bits Key Size: 128, 192, 256
38
Blowfish
Symmetric Block Size: 64 bits Key Size: 32 - 448 bit
39
3DES
Symmetric Block Size: 64 bits Key Size: 112 - 168 bit
40
Twofish
Symmetric Block Size: 128 bits Key Size: 1 - 256 bit
41
RC5
Symmetric Block Size: 32, 64, 128 bits Key Size: 0-2,040 bit
42
Hash Algorithms
-HAVAL -MD4, 5 - no longer in use due to collisions SHA-224 SHA-256 SHA-384 SHA-512
43
HAVAL
Hash algorithm Value length: 128, 160, 192, 224, 256
44
SHA-2 (variants)
Secure Hash Algorithm Hash algorithm Used with digital signature standard (DSS) Value length: 160, 224, 256, 384, 512
45
MD4, 5
Message Digest Hash algorithm No longer in use Value length: 128
46
Public Key Cryptosystems (asymmetric)
RSA is the most famous public key cryptosystem; it was developed by Rivest, Shamir, and Adleman in 1977. It depends on the difficulty of factoring the product of prime numbers. El Gamal is an extension of the Diffie Hellman key exchange algorithm that depends on modular arithmetic. (ECC) Elliptic curve Algorithm depends on the elliptic curve discrete logarithm problem and provides more security than other algorithms when both are used with keys of the same length.
47
Digital Signatures
Rely on public key cryptography and hashing functions DS algorithms suitable for use in FIPS 186 4 (the Digital Signature Standard) must use SHA 2 hashing functions. Three currently approved encryption algorithms: Digital Signature Algorithm (DSA), as specified in FIPS 186 4 Rivest, Shamir, Adleman (RSA), specified in ANSI X9.31 Elliptic Curve DSA (ECDSA), specified in ANSI X9.62
48
RSA
Asymmetric Key Most common Size: 512
49
El Gamal
Asymmetric Key Replaced Diffie-Hellman
50
ECC
Asymmetric Key Elliptic Curve Size: Variable (smaller key size due to EC, 160 bit EC key = 1025 RSA)
51
Integrity Security Models
- Biba: State machine model (SMM) - Clark-Wilson: Access control triple - Goguen-Meseguer: THE noninterference model - Sutherland: preventing interference (information flow and SMM)
52
Confidentiality Security Models
- Bell-LaPadula: no read up, no write down - Brewer and Nash: Chinese Wall - Take Grant: employs a "directed graph"
53
Bell-LaPadula model
State machine model enforces confidentiality Uses mandatory access control (mac) to enforce the DoD multilevel security policy Simple security property subject cannot read data at a higher level of classification. “no read up” Star * security property subject cannot write info to lower level of classification “no write
54
Biba model
A lattice based model developed to address concerns of integrity. Simple integrity property subject at one level of integrity is not permitted to read an object of lower integrity. “no read down” Star * integrity property object at one level of integrity is not allowed to write to object of higher integrity. Invocation property prohibits a subject at one level of integrity from invoking a subject at a higher level of integrity. “no write up”
55
Clark-Wilson model
A lattice based model developed to address concerns of integrity. Simple integrity property subject at one level of integrity is not permitted to read an object of lower integrity. “no read down” Star * integrity property object at one level of integrity is not allowed to write to object of higher integrity. “no write up” Invocation property prohibits a subject at one level of integrity from invoking a subject at a higher level of integrity. Features the “ACCESS CONTROL" Triple
56
Take Grant model
another confidentiality based model that supports four basic operations: take, grant, create, and revoke.
57
Brewer and Nash model
also called the ”Chinese Wall model”. It was developed to prevent conflict of interest (COI) problems. (confidentiality based)
58
Graham-Denning model
This model uses a formal set of protection rules for which each object has an owner and a controller. ``` Eight primary protection rules: Securely create an object Securely create a subject Securely delete an object Securely delete a subject Securely provide the read access right. Securely provide the grant access right. Securely provide the delete access right. Securely provide the transfer access right ```
59
Security Modes
Dedicated Mode Multilevel Mode System High Mode Compartmented Mode
60
Dedicated Mode
Security clearance that permits access to ALL info processed by system, approval for ALL info processed by system, valid need to know for ALL info processed by system.
61
Multilevel Mode
Can process information at different levels even when all system users do not have the required security clearance to access all information processed by the system.
62
System High Mode
Each user must have valid security clearance, access approval for ALL info processed by system, and valid need to know for at least SOME info on the system. Offers most granular control over resources and users of these models.
63
Compartmented Mode
Goes one step further than System High. Each user must have valid security clearance, access approval for ALL INFO processed by system, but requires valid need to know for ALL INFO they will have access to on the system.
64
State Machine Model (SMM)
Describes a system that is always secure no matter what state it is in. Based on the computer science definition of a finite state machine (FSM). A state is a snapshot of a system at a specific moment in time. All state transitions must be evaluated. If each possible state transition results in another secure state, the system can be called a secure state machine.
65
Information Flow Model
Focuses on the flow of information Information flow models are based on a state machine model Biba and Bell LaPadula are both information flow models Bell LaPadula preventing information flow from a high security level to a low security level Biba focuses on flow from low to high security level
66
TCB (Trusted Computing Base)
is a combination of hardware, software and controls that work together to form a “trusted base” to enforce your security policy Includes reference monitor and security kernel
67
Reference monitor
is the logical part of the TCB that confirms whether a subject has the right to use a resource prior to granting access. enforces access control
68
Security Kernel
is the collection of the TCB components that implement the functionality of the reference monitor. implements access control
69
Common Criteria (ISO IEC 15048)
The Common Criteria enable an objective evaluation to validate that a particular product or system satisfies a defined set of security requirements. TWO FLAVORS community Protection Profile (cPP) black box Evaluation Assurance Level (EAL)white box CC Has replaced TCSEC and ITSEC!
70
TCSEC (Trusted Computer System Evaluation)
A structured set of criteria for evaluating computer security within products and systems.
71
ITSEC (Information Technology Security Evaluation Criteria)
The ITSEC represents an initial attempt to create security evaluation criteria in Europe. TSEC uses two scales to rate functionality and assurance.
72
Common Criteria (CC) EAL valuation Standards
EAL0, EAL1 - Functionally Tested EAL2 - Structurally Tested EAL3 - Methodically Tested & Checked EAL4 - Methodically Designed, Tested, and Reviewed (labels) EAL5 - Semi Formally Designed and Tested EAL6 - Semi Formally Verified Design and Tested EAL7 - Formally Verified Design and Tested
73
TCSEC and ITSEC Evaluation Standards
TCSEC ITSEC D F-D+E0 Minimal/no protection C1 F-C1+E1 C2 F-C2+E2 B1 F-B1+E3 Labeled security protection B2 F-B2+E4 B3 F-B3+E5 A1 F-B3+E6 Verified security design
74
Covert Channels
Two types: covert timing channel covert storage channel A method that is used to pass information over a path that is not normally used for communication. Because it’s not normally used, it may not be protected by the system’s normal security controls.
75
TPM
Trusted Platform Module A chip that resides on the motherboard of the device. Multi purpose, like storage and management of keys used for full disk encryption (FDE) solutions. Provides the operating system with access to keys, but prevents drive removal and data access
76
Mandatory Access Control
Enforces an access policy that is determined by the system, not the object owner. Relies on classification labels that are representative of security domains and realms.
77
Discretionary Access Control
Permits the owner or creator of an object to control and define its accessibility, because the owner has full control by default.
78
Non-discretionary Access Control
Enables the enforcement of system | wide restrictions that override object specific access control.
79
Rule-based Access Control
Defines specific functions for access to requested objects. Commonly found in firewall systems.
80
Role-based Access Control
Uses a well defined collection of named job roles to endow each one with specific permissions, thereby seeking to ensure that users who occupy such roles can access what they need to get their jobs done.
81
Certification
The technical evaluation of each part of a | computer system to assess its concordance with security standards
82
Accreditation
The process of formal acceptance of a certified configuration from a designated authority.
83
Open System
are designed using industry standards and are usually easy to integrate with other open systems
84
Closed System
are generally proprietary hardware and/or software. Their specifications are not normally published, and they are usually harder to integrate with other systems.
85
Confinement
restricts a process to reading from and | writing to certain memory locations.
86
Bounds
are the limits of memory a process cannot | exceed when reading or writing.
87
Isolation
is the mode a process runs in when it is | confined through the use of memory bounds.
88
Factors of Authentication
Something you know (pin or password) Something you have (trusted device) Something you are (biometric)
89
AuthN
Authentication (AuthN) is the process of proving that you are who you say you are. Identity Authentication can be achieved with both symmetric and asymmetric cryptosystems.
90
AuthZ
Authorization (AuthZ) is the act of granting an authenticated party permission to do something. Access Permissions, rights , and privileges are then granted to users based on their proven identity. If user has rights to a resource, they are granted authorization.
91
Multitasking
simultaneous execution of more than one | application on a computer and is managed by the operating system.
92
Multithreading
Permits multiple concurrent tasks to be | performed within a single process.
93
Multiprocessing
The use of more than one processor to | increase computing power.
94
Multiprogramming
Similar to multitasking but takes place on mainframe systems and requires specific programming.
95
Single state and Multistate processors
Single state processors are capable of operating at only one security level at a time, whereas multistate can simultaneously operate at multiple security levels.
96
Privileged Mode
Controlled operations are performed in privileged mode, also known as system mode, kernel mode, and supervisory mode.
97
User Mode
Applications operate in a limited instruction set environment known as user mode
98
Memory Types
- ROM. Read only. Contents burned in at factory. - RAM. Static RAM (SRAM) uses flip flops, dynamic RAM (DRAM) uses capacitors - PROM. Programmable chip similar to - EPROM. Erasing, Clearing (overwriting w/ unclassified data) . - EEPROM. Have a small window that, when illuminated with special ultraviolet light, erases content of chip - Flash Memory. Derivative concept from EEPROM. nonvolatile, can be electronically erased and rewritten.
99
Storage types
-Primary storage is the same as memory. -Secondary storage consists of magnetic, flash, and optical media that must be first read into primary memory before the CPU can use the data. -Random access storage devices can be read at any point -Sequential access storage -devices require scanning through all the data physically stored before the desired
100
Firmware
Software stored on a ROM chip, containing basic instructions needed to start a computer. Also used to provide operating instructions in peripheral devices such as printers
101
Process isolation
ensures that individual processes can access only their own data.
102
Layering
creates different realms of security within a process and limits communication between them.
103
Abstraction
creates “black box” interfaces for programmers to use without requiring knowledge of an algorithms or device’s inner workings.
104
Data hiding
prevents information from being read from a different security level. Hardware segmentation enforces process isolation with physical controls.
105
Hypervisor
The hypervisor, also known as a virtual machine monitor (VMM), is the component of virtualization that creates, manages, and operates the virtual machines (VMs).
106
Type I Hypervisor
A native or bare metal hypervisor. In this configuration, there is no host OS; instead, the hypervisor installs directly onto the hardware where the host OS would normally reside.
107
Type II Hypervisor
A hosted hypervisor. In this configuration, a standard regular OS is present on the hardware, and the hypervisor is then installed as another software application.
108
CASB
A cloud access security broker (CASB) is a security policy enforcement solution that may be installed on premises or in the cloud. Shadow IT
109
Buffer overflow
occurs when the programmer fails to check the size of input data prior to writing the data into a specific memory location.
110
Functional Order of Security Controls
Deterrence Denial Detection Delay
111
Physical Security Controls
Administrative also known as management controls and include policies and procedures, like site management, personnel controls, awareness training, and emergency response and procedures Logical also known as technical controls and are implemented through technology like access controls, intrusion detection, alarms, CCTV, monitoring, HVAC, power supplies, and fire detection and suppression. Physical use physical means to protect objects and includes fencing, lighting, locks, construction materials, mantraps, dogs and guards
112
Technical/Logical controls for physical security
- access controls - intrusion detection - alarms - CCTV and monitoring - HVAC - power supplies - fire detection and suppression
113
Administrative controls for physical security
- facility construction - facility selection - site management - personnel controls - awareness training - emergency response - emergency procedure
114
Physical controls for physical security
- fencing - lighting - locks - construction materials - mantraps - dogs - guards
115
Fences
``` 3-4 feet deters casual trespasser 6-7 feet too hard to climb easily 8 feet (w/ barbed wire) will deter intruders ```
116
Temperatures and humidity
Humidity: 40% 60% ideal Temps: for computers 60-75F (15 23C), damage at 175F. Manage storage devices damaged at 100F Too much humidity can cause corrosion. Too little humidity causes static electricity. Even on nonstatic carpet, low humidity can generate 20,000 volt static discharg!
117
Electrical Impacts
``` Blackout: prolonged loss of power Brownout: prolonged low voltage Fault: short loss of power Surge: prolonged high voltage Spike: temporary high voltage Sag: temporary low voltage ```
118
Lights
8 feet high with 2 feet candle power
119
3 Categories of Fire Detection Systems
smoke sensing flame sensing heat sensing
120
Fire Classes
``` A - common combustibles - water, soda acid B - liquids - CO2, halon, soda acid C - electrical - CO2, halon D - metals - Dry powder K - kitchen - wet chemicals ```
121
Electromagnetic interference types
-Common mode noise. Generated by the difference in power between the hot and ground wires of a power source operating electrical equipment -Traverse mode noise. Generated by a difference in power in the hot and neutral wires of a power source operating electrical
122
Radio frequency interference (RFI)
is the source of interference that is generated by electrical appliances, light sources, electrical cables and circuits, and so on.
123
Damage from fire and fire suppression
- Smoke is damaging to most storage devices. - Heat can damage any electronic or computer component. - Suppression mediums can cause short circuits, initiate corrosion, or otherwise render equipment useless.
124
Water Suppression Systems
-Preaction systems. use closed sprinkler heads, and the pipe is charged with compressed air instead of water. The water is held in check by an electrically operated sprinkler valve and the compressed air. -Wet pipe systems. are filled with water. Dry pipe systems contain compressed air until fire suppression systems are triggered, and then the pipe is filled with water; and flame activated sprinklers trigger when a predefined temperature is reached. -Dry pipe systems. also have closed sprinkler heads: the difference is the pipes are filled with compressed air. The water is held back by a valve that remains closed as long as sufficient air pressure remains in the pipes. Often used in areas where water may freeze, such as parking garages. -Deluge systems. are similar to dry pipes, except the sprinkler heads are open and larger than dry pipe heads. The pipes are empty at normal air pressure; the water is held back by a deluge valve.
125
Halon
is effective, but bad for environment (ozone depleting), turns to toxic gas at 900F. ``` Suitable replacements •FM 200 (HFC 227ea) •CEA 410 or CEA 308 •NAF S III (HCFC Blend A) •FE 13 (HCFC 23) •Argon (IG55) or Argonite (IG01) •Inergen (IG541) •Aero K ```
126
Lock Types
Electronic Combination Locks (aka Cipher lock) Something you know Key Card Systems Something you have Biometric Systems Something you are Conventional Locks Easily picked / bumped & keys easily duplicated Pick-and-Bump Resistant Locks Expensive, harder to pick & keys not easily duplicated.
127
Threats to physical access controls
- Abuses of physical access control include propping open secured doors and bypassing locks or access controls. - Masquerading is using someone else’s security ID to gain entry to a facility. -Piggybacking is following someone through a secured gate or doorway without being identified or authorized personally.
128
Media storage facility protections
- locked cabinets or safes - using a librarian/custodian - implementing a check-in/check-out process - using media sanitization
129
Protections for evidence storage
- locked cabinets or safes - dedicated/isolated storage facilities - offline storage - access restrictions and activity tracking - hash management and encryption