Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

CHAPTER 1

Security It is protecting property or interests from intrusions or Where was the method of encrypting data for transmission
stealing or wire trapping patented? USA
System Administration The ability to restrict access or privilege to This is known as RSA encryption. The method was patented in the
the system US and a company was formed to license the technology.
Policy in Network and System Administration, what do you call a The purpose of a backup is to make a copy of data which is unlikely
clear expression of goals and responses, prepares a site for future to be lost or destroyed by the same act as the original.
trouble, and documents intent and procedure There are two kinds of backup
Data invulnerability (redundancy) the purpose of a backup copy 1. Full dump: copies every file on a source medium to a backup
Privacy in the issues of security, it is the ability to keep things medium.
private/confidential 2. Incremental or differential dump: copies files according to the
Mission-critical systems where human lives are at stake (reliability level of the dump.
and safety). Check sums or Message digests are non-forge able digital signatures
Real-time system must always be fast enough to cope with any which quickly summarize the contents of a file.
demand. The MD4 Message-Digest Algorithm is a cryptographic hash
Physical threats - weather, natural disaster, bombs, power failures, function developed by Ronald Rivest in 1990.
etc. The MD5 Message-Digest Algorithm is a widely used cryptographic
Human threats - stealing, trickery, bribery, spying, sabotage, hash function that produces a 128-bit (16- byte) hash value.
accidents. SHA-1 is a cryptographic hash function designed by the National
Software threats - viruses, Trojan horses, logic bombs, denial of Security Agency and published by the NIST as a U.S. Federal
service. Information Processing Standard.
Security the fundamental requirement for security is the ability to PGP: pretty good privacy Encrypting and decrypting texts, E-mails,
restrict access and privilege to data. files, directories and whole disk partitions to increase the security of
e-mail communications.
CHAPTER 2 Trust and signatures signing a message is like adding a cryptographic
Feedback Regulation part of prevention/correction of security message digest which verifies the state of the message when you
wherein it continuously acquires assessment from stakeholders. sent it.
Design Fault the system does not meet its specifications. Trusted third party one trusts the database of public keys
Emergent Fault The system does things which were never planned corresponding to private keys, trusted database, assure the
or intended. authenticity of the keys in their database.
Policy principle of society, or a set of rules and procedures
Catastrophes a final cause of failure unexpected, external failure. CHAPTER 4
Human Errors In 1970s was the Data encryption standard (DES) was adopted as a
• Forgetfulness standard for non-classified government encryption.
• Misunderstanding/miscommunication 1997 was the Advanced Encryption Standard (AES) was announced
• Misidentify as a replacement for DES and a competition held for algorithms.
• Confusion/stress CFEngine A policy-based configuration management system written
• Ignorance by Mark Burgess at Oslo University College. Its primary function is to
• Carelessness provide automated configuration and maintenance of computers,
• Slowness of response from a policy specification.
• Random procedural errors Kerberos Uses DES cryptography to protect sensitive information on
• Systematic procedural errors the network. When a user logs on to a host running Kerberos, the
• Inability to deal with complexity user is issued a ticket from a Ticket Granting Server.
• Inability to cooperate with other Integrity schemes this is a Flawless data transfer and storage. We
A single point of failure (SPOF) is a part of a system that, if it fails, need to understand the issues of error detection and correction.
will stop the entire system from working. And Data are not secure to corruption.
Fault Tree Analysis (FTA) it is a method which is used in critical Secure Shell has become a DE- facto modern UNIX standard
situations, such as the nuclear industry and the military. authentication scheme, using public/private key encryption to verify
Fault trees are made of the following: AND, OR, XOR, Incomplete the identity of both hosts to one another.
Cause, Ultimate Cause Distributed Computing Environment Digital Equipment Corporation
(DEC, Apollo computer now Compaq) working in collaboration with
CHAPTER 3 others developed their own distributed computing framework
In what year did the creation of method of encrypting data for called. This has a similar login authentication scheme to Kerberos.
transmission which has become a standard for the transmission of Active Directory Services Interfaces (ADSI) is a set of open
sensitive information started? 1977 interfaces that abstract the capabilities of directory services from
different network providers to present a single view for accessing
How many MIT professors build on the work of Diffie and Hellmann and managing network resources.
that created the method of encrypting data for transmission? 3

1
Pluggable Authentication Modules (PAM) a simple way to include Any change in a system from one state to another is called a
multiple authentication mechanisms into OS software was transition.
introduced by Sun Microsystems. Sun's pluggable authentication The basic security theorem is a property of the finite state machine
modules for Solaris have since been adopted by several vendors and picture.
newer GNU/Linux distributions.
Smartcards have been around since the 1980's, particularly in
Europe. They have small, dedicated microprocessor chips
embedded. They typically consist of an 8-bit processor (8051/6805) CHAPTER 7
and three classes of memory: ROM which holds a program, EPROM Remote Procedure Call (RPC) It is about the execution of functions
which holds customer data, and RAM (perhaps 16K) for performing on a remote host. It began with Sun Microsystems' (ONC) infra-
computations. structure for NFS, supported by Novell and AT&T. Apollo/Hewlett-
Packard built a rival system (NCS) supported by IBM, DEC (Compaq)
CHAPTER 5 and Microsoft. Recently this systems have come to include the Java
The access rights of each group or user are taken from the set: RMI, Microsoft's DCOM and CORBA.
• Read Scope controls or encapsulation Object data are hidden from
• Write general view.
• Execute Memory Leak A problem which occurs in long running server
• Delete processes is that they gradually use more and more memory,
• Change permission gradually choking the machine on which they are running. This
• Change ownership occurs in programs which allocate memory but never free it again.
UNIX introduced a simple model of file permissions in the 70's which What do you call error?
has proven to be quite effective and easy to understand. In recent Static Methods This methods are invoked from the root class rather
times, UNIX has added a modern approach to file permissions using than from a local instance of an object within the class. That means
ACLs, but very few sites have adopted this because of the that they can break through internal class security barriers.
complexity. Authentication It is Security context establishment, Authorization
Process permissions are usually set by access control lists, or on the and access control with acls and role based access control, Message
basis of understood protocols, such as passwords, keys, or cookies. protection, Auditing, Non-repudiation.
Unix setuid programs are an example where the activities of a Methods which are declared constant do not change the state of the
program can be changed (by the super user) so as to grant a specific object on which they act. This is a security declaration which enables
program the right to operate with a different user-identity and thus to compiler to check the truth of our intention.
privileges (without authentication). The setgid is a corresponding A struct datatype is like a class in which all of the members are
mechanism for setting the group ownership of a process. Note that public. It is only a conceptual and practical container for related data
setuid programs often give more privilege than is necessary and objects which makes some program syntax more transparent.
such programs have been the major cause of security problems on (The Common Object Request Broker Architecture) is a solution to
Unix platforms. this problem. It provides an infra- structure which is standardized,
Two basic modes of accessing objects: and which conceals the differences between operating systems and
a. passive and active, programming languages. It is a generic library service for objects.
b. read-only and read-write.
Process permissions are usually set by access control lists, or on the CHAPTER 8
basis of understood protocols. Give at least three. Change Software changes either faster than we can keep up, or so
a. Passwords slowly that we do not notice it happening.
b. Keys Complacency what is a creeping laziness, we stop caring, and we get
c. cookies fed up with the hard struggle against the forces of evil?
Convenience a security mechanism that the opposite of
CHAPTER 6 convenience and they exact a discipline which some find hard to
Model a security model is an appraisal of what security means, what uphold.
it should cover, what methods we should provide/use to achieve Spoofing How can we verify the authenticity and integrity of an
security. information exchange?
Policy a security policy is an attitude to security. Buffer overflows Buffer handling of input streams is an extremely
Complexity users will become impatient and work around security pernicious problem. If you don't get it right from the beginning,
(ACL). using a secure standard, it will come back to haunt you again and
Star Property a subject at a given security level must not write to again.
any object at a lower security level. This property is also known as Internet banks use a system of authentication which is based on
the Confinement property. one-time passwords or signatures, often called "digipass" or
Discretionary Security Property Use of an access matrix to specify "calculator".
the discretionary access control. Implicit dependencies: Anything which is hidden from view
The Simple Security Property - a subject at a given security level (obscure) is something which we are not thinking carefully about. In
may not read an object at a higher security level (no read-up).

2
order to write secure software, we need to fully understand the The aim of an intrusion detection system is to detect break-ins in
dependencies of the system. progress so that something can be done about them.
Ambiguity is a term used in writing and mathematics, and under Two types of intrusion detection
conditions where information can be understood or interpreted in 1. Rule based intrusion detection: testing for specific
more than one way and is distinct from vagueness, which is a occurrences, e.g. seeing whether a particular private port
statement about the lack of precision contained or available in the is accessed.
information. 2. Statistical anomaly detection: looking for anything out of
the ordinary, by collecting data on what `ordinary' is.
CHAPTER 9 Anomaly detection a very interesting idea which might be used both
Sandboxing a security mechanism for separating running programs, in fault- diagnosis and security intrusion detection is the idea of
usually in an effort to mitigate system failures or software anomaly detection. In anomaly detection we are looking for
vulnerabilities from spreading. anything abnormal.
Spoofing attack is when a malicious party impersonates another Port Scanning a common way for hackers to gather information
device or users on a network in order to launch attacks against about a network is to perform a port scan. A port scanner is simply a
network hosts, steal data, spread malware or bypass access controls program which attempts to establish a network connection to every
Restricting Privileges Many system processes are started by the single port number 1, 2,3,4,5....5000… on every host on the network.
administrator/super user account. System processes therefore often Computer Immune System It is a sobering thought that the most
run with unlimited privilege efficient intrusion blocking and detection system which exists is in
Protocol A sequence of operations that ensure protection of data. the human body.
Used with a communications protocol, it provides secure delivery of
data between two parties, the term generates that work in tandem CHAPTER 12
Kernel The central part of an operating system. It manages the Zones of security clearance the first thing to decide is the nature of
operations of the computer and the hardware – most notably the organization we are trying to protect. Many companies, like
memory and CPU time. banks or large cooperate empires require many levels of security.
Information is provided on a need to know basis. There might be
CHAPTER 10 physical security checkpoints and logical security checkpoints.
1. Diffie-Hellman key exchange Most secure ways of sending The future of security
information is to use a one-time session key. An example, • The need for security has always existed
a random encryption key which is unique to the session. • The security problem will never be solved because it all has to do
2. Secure Mail is point to point, encryption to prevent with trust.
eavesdropping of mail it cannot handle non-ASCII data. • Every security problem has its roots in trust
3. Originally introduced by Netscape communications in • We can use technology to move trust from place to place, but we
order to allow secure web transactions is called Secured can never avoid the final judgment.
Socket Layer (SSL).
4. Transport Layer Security (TLS) A protocol that provides The future of security is you
communication security between client/server • Go and spread good practices by setting a good example.
applications that communicates with each other over the • Are you your own worst enemy when it comes to security?
internet. • What are your bad habits?
5. TCP/IP used to govern the connection of the computer • Where do you place your trust?
systems to the Internet.
6. A Virtual Private Network extends a private network
across a public network, and enables users to send and
receive data across shared or public networks as if their
computing devices were directly connected to the private
network.
7. IP sec it offers encryption at the IP level. This means that
common TCP attacks, such as sequence guessing or
spoofing attacks cannot occur, since attackers could never
see the contents of traveling packets.
8. DNS sec stands for Domain Name System Security
Extensions, and it is a technology used to protect
information on the Domain Name System (DNS) which is
used on IP networks.

CHAPTER 11
Intrusion detection it is a device or software application that
monitors a network or systems for malicious activity or policy
violations.

You might also like