Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
16 Cards in this Set
- Front
- Back
Give an example of an Identity
|
A passport is an identity
|
|
Linux command: whoami what does it return?
|
username
|
|
Linux command: groups what does it return?
|
users video vboxusers
|
|
Linux command: what does id return?
|
uid=1000(cliffe) gid=100(users)
groups=100(users),33(video),112(vboxusers) |
|
root has a UID of
|
0
|
|
Authentication verifies an?
|
Identity
|
|
Security Terminology: What is a subject?
|
An active entity within the system that
can attempt to access objects |
|
Security Terminology: What is a Object
|
A resource, such as a file
● When a process accesses a file, the program is the subject, and the file is the object |
|
In general authentication consists of the following:
|
● Obtaining information from an external entity
● Analysing the information ● Determining if the presented information confirms the entity's identity |
|
Cryptographic one way hash functions work by:
|
● A deterministic procedure
● Input an arbitrary block of data ● Produces a fixed-size string |
|
In computing, authentication binds what?
|
an identity with a subject, so that security decisions can be made based on its identity
|
|
Give an example of a One way hashing tool in linux
|
shasum
|
|
Common functions MD5,
who was it made by what is the hash value has it been broken |
Designed by Ronald Rivest
128-bit hash value yes collisions |
|
Common functions SHA-1
who was it made by what is the hash value has it been broken |
Designed by the USA NSA
160-bit hash value No successful attacks, but theoretical hints that it may be broken soon |
|
Common functions SHA-2
who was it made by what is the hash value has it been broken |
Designed by the USA NSA
A set of hash functions: SHA-224, SHA-256, SHA-384, SHA-512, with various output lengths Currently thought of as very strong |
|
Common functions SHA-3
who was it made by what is the hash value has it been broken |
NIST hash function competition currently
running |