• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/16

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

16 Cards in this Set

  • Front
  • Back
Give an example of an Identity
A passport is an identity
Linux command: whoami what does it return?
username
Linux command: groups what does it return?
users video vboxusers
Linux command: what does id return?
uid=1000(cliffe) gid=100(users)
groups=100(users),33(video),112(vboxusers)
root has a UID of
0
Authentication verifies an?
Identity
Security Terminology: What is a subject?
An active entity within the system that
can attempt to access objects
Security Terminology: What is a Object
A resource, such as a file

● When a process accesses a file, the program is the
subject, and the file is the object
In general authentication consists of the following:
● Obtaining information from an external entity
● Analysing the information
● Determining if the presented information confirms the entity's identity
Cryptographic one way hash functions work by:
● A deterministic procedure
● Input an arbitrary block of data
● Produces a fixed-size string
In computing, authentication binds what?
an identity with a subject, so that security decisions can be made based on its identity
Give an example of a One way hashing tool in linux
shasum
Common functions MD5,
who was it made by
what is the hash value
has it been broken
Designed by Ronald Rivest
128-bit hash value
yes collisions
Common functions SHA-1
who was it made by
what is the hash value
has it been broken
Designed by the USA NSA
160-bit hash value
No successful attacks, but theoretical hints that it may be broken soon
Common functions SHA-2
who was it made by
what is the hash value
has it been broken
Designed by the USA NSA
A set of hash functions: SHA-224, SHA-256,
SHA-384, SHA-512, with various output
lengths
Currently thought of as very strong
Common functions SHA-3
who was it made by
what is the hash value
has it been broken
NIST hash function competition currently
running