• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/77

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

77 Cards in this Set

  • Front
  • Back
  • 3rd side (hint)

Confidentiality (formal)

X = set of entities I = information


I has the property of confidentiality with respect to X if no member of X can obtain information about I.

Integrity (formal)

X= set of entities I = info or resource


I has integrity property with respect to X if all members of X trust I.

Availability (formal)

X = set of entities. I = resource


I has availability property with respect to X if all members of X can access I.


What is the commonality (relation) between privacy and security?

Confidentiality

Privacy

Connected to user preference, customizable, user defined. What is privacy to one individual may not be to another (FB). Personal issue only.


If your personal privacy preferences are fulfilled than confidentiality is maintained at the level you choose.

Integrity

-Accuracy of information


-Trust for source


-policy protects data/source from modification


What platform is Availability important to?

Cloud computing

Non-Repudiation

Non-denial. Trust. Sender cannot deny that they sent something if it includes their digital signature or private key (identity)

Security Policy

Defines X and I


States set of rules--what/who is allowed/not allowed in a system



-to create, identify threats and define requirements to ensure a secure system

Security Mechanisms

Method, tool, or procedure that implement/enforces security policy



Ex. Firewall, blacklist, biometrics, passwords

Threat / Threat Vector

Probable risk of attack, probable path of attack (system vulnerability)


Attack / Attack Vector

Active exploitation of system vulnerability or weakness

System States-what are they used for in security?

Used to formulate security policy


Identify secure/insecure states to design policy

3 solutions for Security policy Mechanisms

Security Mechanism Development

Uses software development model:


1 Threat analysis


2 Specifications (security policy)


3 Design (development)


4 Implementation (execute design)


5 Operation (use of mechanism-important part of security-must be used to be effective)

Software development model

What is a major security consideration?

Human issues-


- customs, cultures, etc (privacy)


- Employee behavior


- Social engineering


- organization

Cost-benefit analysis

Is it more expensive to:


-prevent an attack


-recover from an attack


Determines how you approach security policy

Risk Analysis

Risk=chance


-Identify assets


-Determine chance assets could be compromised/attacked


-"should we protect? How strongly?"

Chinese Wall Model

A model of a security policy that refers equally to confidentiality and integrity.


-Used in situations that involve conflict of interest-- stock exchange, investment houses


-users can only have access to one dataset in a COI (conflict of interest) class


-uses notion of "past access" to reduce coi

Confidentiality

- the concealment of information or resources from unauthorized entities


- Security provides confidentiality preferences for privacy.


-Information that has had no unauthorized access (secure) is confidential.


-core of privacy

PII

Personally Identifiable Information


-data that provides identity to an entity.


-must be removed to provide privacy if data is to be shared

Attacks on Integrity

-IP spoofing (source integrity)


-

Access Control Models

DAC - discretionary access control


MAC - mandatory access control


RBAC - role-based access control

Discretionary Access Control

Discretion of user which resources should be accessed and by whom (ex . FB)

Mandatory Access Control

Not user dictated (even admin has no control)


ex. Operating System Access Control

Role-based Access Control

Identify all subjects and objects and group by roles to build a control matrix.


Each role has rights, individuals have roles (no individual rights)


Ex. FB "friends", "friends of friends"

Multi Level Security Model

Uses security levels to enforce access to information.


Top Secret


Secret


Confidential


Unclassified


Ex. Bell-Lapadula

Crux of Integrity

Trust

Crux of confidentiality

Access (disclosure)

Bell-Lapadula

Multi level security mechanism developed by DoD and used by gov't agencies.

Security Levels

Top Secret


Secret


Confidential


Unclassified

Security Clearance

Security levels relative to subjects


ex. An employee has secret clearance

Security Label

Security level relative to objects


ex. The document is top secret

Why is Integrity Policy hard to enforce?

Deals with trust, trust is not easy to assess or understand.


No way to prove 100% of the time that integrity has been maintained

Quasi Identifier

Not a direct identifier (PII), but info that can be linked together to identify someone.

Authentication

The mechanism of binding an identity to an entity/subject



A matching process--your claim to be someone is matched against a saved profile to gain access.

Encryption

Plaintext + key = ciphertext


-can be an authenticator-ownership of a key can prove identity

What are the 3 Authentication Mechanisms?

-what an entity knows (pswd-most widely used)


-what an entity has (key/token)


-what an entity is (biometric-fingerprint)

Knows

Authorization

The process of granting access.


Interchangeable with access control


ex. Guard at door is doing access control, person cleared by guard is authorized.

Availability

The ability to use the info or resource desired.

Attacks on Availability

Denial of service

4 classes of threats

Disclosure--passive threat (ex. snooping)


Deception--active (data modification/alteration, masquerading)


Disruption--


Usurpation--unauthorized control of part of a system

Bell-Lapadula rule

No read up, No write down



Formally:

BIBA Integrity Model

Consists of a set of subjects, set of objects and set of integrity levels.


Data at a higher level is more accurate/reliable than data at lower levels. Determines "trustworthiness".

Subject (access control)

Representation of an entity within a system


Active entity. Can do stuff with/to objects


Processes (admin, user,etc people are processes)


Object (access control)

Passive entity


Receives instructions


Files, docs, DBs

What implements access control?

Operating system

Rights (access control)

Allows you to perform certain actions


Read, write, execute, own, append



Subject has rights on objects


Object has NO rights on subject

Access control matrix

S = {s1, s2, s3,....sn} set of subjects


O = {o1,o2, o3,....on} set of objects


R={r1,r2,r3,....rn} set of rights



Set up in a matrix (grid)

Protection State

Index of an access control matrix. If state changes, this is a state transition.

An example of the Confidentiality Property

Class cheating policy

How is an Authentication System Defined?

Using the ACFLS quintuple

Elements of Authentication system (ACFLS quintuple)

A- type password at interface


C- pswd hash or clear text


F- function decides how to save info in system (hash, salt, clear text)


L- set of functions that establish or prove identity


S- registration, change/ del pswd, create new subject

Password Verification (L and C from ACFLS)

L (functions) checks for match against C (password hash or clear text)



L: if A == C (clear)


If F(A) == C (hash)



Verifies identity

3 goals of Security

1 prevention


2 detection


3 recovery

Operational issues of security

Cost-benefit analysis


Risk analysis

Assurance

Measure of how well the system meets security requirements



Done by following software development model

States: 2 things to determine when formulating policy?

What states are secure in the system?


What states are reachable in the system?



If Reachable > secure = insecure system

Vulnerability

A weakness in: software, system, whatever you are protecting.

2 types of Password Attacks

Online- entering guesses in real time


Offline- brute force using hash tables

K- anonymity

K anonymity will make one person indistinguishable from k-1 other people.


Hides the individual within a collection


Remove any info that makes an individual uniquely identifiable.

Digital certificate

used for machine authentication. (Since they don't have passwords!)


Used by browser to verify identity claim of a server.

Certificate Authority

Issues digital certificates.


Verisign

What does a digital certificate include?

Certificate authority signature


Expiration date


Public key

How do we authenticate identity of a system?

With digital certificates, authenticated by the client-agent (browser)

What is Identity?

A collection of claims (different attributes of you)


Strongly connected to representation

What is Anonymity?

Hiding claims to ensure privacy. Hiding identity.

What is a Capabilities list?

Conceptually like a row of an access control matrix. Each subject has set of pairs, each pair contains object and a set of rights for that object.

Access control list (acl)


Each column is stored with the object it represents. Each object has a set of pairs, each pair contains a suject and a set of rights.

Pillars of Security

Confidentiality


Integrity


Availability


Non-repudiation

What Is the distinction between a military (govt) security policy and a commercial security policy?

Military policy designed primarily to provide confidentiality


Commercial policy designed primarily to provide integrity.

What are some rights?


Read, write, execute, Append, own

What are cookies?

Key value pairs saved on your machine to make communication over the internet faster. Ex. Amazon shopping cart


Security hole

Describe the crypto system as a quintuple

M = set of plain text


C = set of cipher text


K = set of keys


E = set of encryption functions


E = M + K -> C


D = set of decryption functions


D = C + K -> M

Name security components that can be achieved using asymmetric cryptography

*Confidentiality--private key decryption means only authorized subject can access info


*Integrity--key encrypted data cannot be modified even if intercepted


*Non Repudiation--Private key can be used for identity. Owner of key used for encryption cannot deny message.

What is security?

The guarding of information; access control. Has many factors, requires fine balance

Difference between privacy and security

Preference. Privacy is based on preference of the user and what privacy means to them. Security has no focus on preference but only on guarding information based in requirements.