System Sec Reviewer

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

CHAPTER 1

Security It is protecting property or interests from intrusions or Where was the method of encrypting data for transmission patented?
stealing or wire trapping USA
System Administration The ability to restrict access or privilege to the This is known as RSA encryption. The method was patented in the US
system and a company was formed to license the technology.
Policy in Network and System Administration, what do you call a clear The purpose of a backup is to make a copy of data which is unlikely to
expression of goals and responses, prepares a site for future trouble, be lost or destroyed by the same act as the original.
and documents intent and procedure There are two kinds of backup
Data invulnerability (redundancy) the purpose of a backup copy 1. Full dump: copies every file on a source medium to a backup
Privacy in the issues of security, it is the ability to keep things medium.
private/confidential 2. Incremental or differential dump: copies files according to the
Mission-critical systems where human lives are at stake (reliability level of the dump.
and safety). Check sums or Message digests are non-forge able digital signatures
Real-time system must always be fast enough to cope with any which quickly summarize the contents of a file.
demand. The MD4 Message-Digest Algorithm is a cryptographic hash function
Physical threats - weather, natural disaster, bombs, power failures, developed by Ronald Rivest in 1990.
etc. The MD5 Message-Digest Algorithm is a widely used cryptographic
Human threats - stealing, trickery, bribery, spying, sabotage, hash function that produces a 128-bit (16- byte) hash value.
accidents. SHA-1 is a cryptographic hash function designed by the National
Software threats - viruses, Trojan horses, logic bombs, denial of Security Agency and published by the NIST as a U.S. Federal
service. Information Processing Standard.
Security the fundamental requirement for security is the ability to PGP: pretty good privacy Encrypting and decrypting texts, E-mails,
restrict access and privilege to data. files, directories and whole disk partitions to increase the security of
e-mail communications.
CHAPTER 2 Trust and signatures signing a message is like adding a cryptographic
Feedback Regulation part of prevention/correction of security message digest which verifies the state of the message when you sent
wherein it continuously acquires assessment from stakeholders. it.
Design Fault the system does not meet its specifications. Trusted third party one trusts the database of public keys
Emergent Fault The system does things which were never planned corresponding to private keys, trusted database, assure the
or intended. authenticity of the keys in their database.
Policy principle of society, or a set of rules and procedures
Catastrophes a final cause of failure unexpected, external failure. CHAPTER 4
Human Errors In 1970s was the Data encryption standard (DES) was adopted as a
• Forgetfulness standard for non-classified government encryption.
• Misunderstanding/miscommunication 1997 was the Advanced Encryption Standard (AES) was announced as
• Misidentify a replacement for DES and a competition held for algorithms.
• Confusion/stress CFEngine A policy-based configuration management system written
• Ignorance by Mark Burgess at Oslo University College. Its primary function is to
• Carelessness provide automated configuration and maintenance of computers,
• Slowness of response from a policy specification.
• Random procedural errors Kerberos Uses DES cryptography to protect sensitive information on
• Systematic procedural errors the network. When a user logs on to a host running Kerberos, the user
• Inability to deal with complexity is issued a ticket from a Ticket Granting Server.
• Inability to cooperate with other Integrity schemes this is a Flawless data transfer and storage. We
A single point of failure (SPOF) is a part of a system that, if it fails, need to understand the issues of error detection and correction. And
will stop the entire system from working. Data are not secure to corruption.
Fault Tree Analysis (FTA) it is a method which is used in critical Secure Shell has become a DE- facto modern UNIX standard
situations, such as the nuclear industry and the military. authentication scheme, using public/private key encryption to verify
Fault trees are made of the following: AND, OR, XOR, Incomplete the identity of both hosts to one another.
Cause, Ultimate Cause Distributed Computing Environment Digital Equipment Corporation
(DEC, Apollo computer now Compaq) working in collaboration with
CHAPTER 3 others developed their own distributed computing framework called.
In what year did the creation of method of encrypting data for This has a similar login authentication scheme to Kerberos.
transmission which has become a standard for the transmission of Active Directory Services Interfaces (ADSI) is a set of open interfaces
sensitive information started? 1977 that abstract the capabilities of directory services from different
network providers to present a single view for accessing and
How many MIT professors build on the work of Diffie and Hellmann managing network resources.
that created the method of encrypting data for transmission? 3

1
Pluggable Authentication Modules (PAM) a simple way to include The basic security theorem is a property of the finite state machine
multiple authentication mechanisms into OS software was introduced picture.
by Sun Microsystems. Sun's pluggable authentication modules for
Solaris have since been adopted by several vendors and newer
GNU/Linux distributions.
Smartcards have been around since the 1980's, particularly in Europe. CHAPTER 7
They have small, dedicated microprocessor chips embedded. They Remote Procedure Call (RPC) It is about the execution of functions on
typically consist of an 8-bit processor (8051/6805) and three classes a remote host. It began with Sun Microsystems' (ONC) infra-structure
of memory: ROM which holds a program, EPROM which holds for NFS, supported by Novell and AT&T. Apollo/Hewlett- Packard built
customer data, and RAM (perhaps 16K) for performing computations. a rival system (NCS) supported by IBM, DEC (Compaq) and Microsoft.
Recently this systems have come to include the Java RMI, Microsoft's
CHAPTER 5 DCOM and CORBA.
The access rights of each group or user are taken from the set: Scope controls or encapsulation Object data are hidden from general
• Read view.
• Write Memory Leak A problem which occurs in long running server
• Execute processes is that they gradually use more and more memory,
• Delete gradually choking the machine on which they are running. This occurs
• Change permission in programs which allocate memory but never free it again. What do
• Change ownership you call error?
UNIX introduced a simple model of file permissions in the 70's which Static Methods This methods are invoked from the root class rather
has proven to be quite effective and easy to understand. In recent than from a local instance of an object within the class. That means
times, UNIX has added a modern approach to file permissions using that they can break through internal class security barriers.
ACLs, but very few sites have adopted this because of the complexity. Authentication It is Security context establishment, Authorization
Process permissions are usually set by access control lists, or on the and access control with acls and role based access control, Message
basis of understood protocols, such as passwords, keys, or cookies. protection, Auditing, Non-repudiation.
Unix setuid programs are an example where the activities of a Methods which are declared constant do not change the state of the
program can be changed (by the super user) so as to grant a specific object on which they act. This is a security declaration which enables
program the right to operate with a different user-identity and thus to compiler to check the truth of our intention.
privileges (without authentication). The setgid is a corresponding A struct datatype is like a class in which all of the members are public.
mechanism for setting the group ownership of a process. Note that It is only a conceptual and practical container for related data objects
setuid programs often give more privilege than is necessary and such which makes some program syntax more transparent.
programs have been the major cause of security problems on Unix (The Common Object Request Broker Architecture) is a solution to
platforms. this problem. It provides an infra- structure which is standardized, and
Two basic modes of accessing objects: which conceals the differences between operating systems and
a. passive and active, programming languages. It is a generic library service for objects.
b. read-only and read-write.
Process permissions are usually set by access control lists, or on the CHAPTER 8
basis of understood protocols. Give at least three. Change Software changes either faster than we can keep up, or so
a. Passwords slowly that we do not notice it happening.
b. Keys Complacency what is a creeping laziness, we stop caring, and we get
c. cookies fed up with the hard struggle against the forces of evil?
Convenience a security mechanism that the opposite of convenience
CHAPTER 6 and they exact a discipline which some find hard to uphold.
Model a security model is an appraisal of what security means, what Spoofing How can we verify the authenticity and integrity of an
it should cover, what methods we should provide/use to achieve information exchange?
security. Buffer overflows Buffer handling of input streams is an extremely
Policy a security policy is an attitude to security. pernicious problem. If you don't get it right from the beginning, using
Complexity users will become impatient and work around security a secure standard, it will come back to haunt you again and again.
(ACL). Internet banks use a system of authentication which is based on one-
Star Property a subject at a given security level must not write to any time passwords or signatures, often called "digipass" or "calculator".
object at a lower security level. This property is also known as the Implicit dependencies: Anything which is hidden from view (obscure)
Confinement property. is something which we are not thinking carefully about. In order to
Discretionary Security Property Use of an access matrix to specify the write secure software, we need to fully understand the dependencies
discretionary access control. of the system.
The Simple Security Property - a subject at a given security level may Ambiguity is a term used in writing and mathematics, and under
not read an object at a higher security level (no read-up). conditions where information can be understood or interpreted in
Any change in a system from one state to another is called a more than one way and is distinct from vagueness, which is a
transition.

2
statement about the lack of precision contained or available in the 2. Statistical anomaly detection: looking for anything out of
information. the ordinary, by collecting data on what `ordinary' is.
Anomaly detection a very interesting idea which might be used both
CHAPTER 9 in fault- diagnosis and security intrusion detection is the idea of
Sandboxing a security mechanism for separating running programs, anomaly detection. In anomaly detection we are looking for anything
usually in an effort to mitigate system failures or software abnormal.
vulnerabilities from spreading. Port Scanning a common way for hackers to gather information about
Spoofing attack is when a malicious party impersonates another a network is to perform a port scan. A port scanner is simply a
device or users on a network in order to launch attacks against program which attempts to establish a network connection to every
network hosts, steal data, spread malware or bypass access controls single port number 1, 2,3,4,5....5000… on every host on the network.
Restricting Privileges Many system processes are started by the Computer Immune System It is a sobering thought that the most
administrator/super user account. System processes therefore often efficient intrusion blocking and detection system which exists is in the
run with unlimited privilege human body.
Protocol A sequence of operations that ensure protection of data.
Used with a communications protocol, it provides secure delivery of CHAPTER 12
data between two parties, the term generates that work in tandem Zones of security clearance the first thing to decide is the nature of
Kernel The central part of an operating system. It manages the the organization we are trying to protect. Many companies, like banks
operations of the computer and the hardware – most notably or large cooperate empires require many levels of security.
memory and CPU time. Information is provided on a need to know basis. There might be
physical security checkpoints and logical security checkpoints.
CHAPTER 10 The future of security
1. Diffie-Hellman key exchange Most secure ways of sending • The need for security has always existed
information is to use a one-time session key. An example, • The security problem will never be solved because it all has to do
a random encryption key which is unique to the session. with trust.
2. Secure Mail is point to point, encryption to prevent • Every security problem has its roots in trust
eavesdropping of mail it cannot handle non-ASCII data. • We can use technology to move trust from place to place, but we
3. Originally introduced by Netscape communications in order can never avoid the final judgment.
to allow secure web transactions is called Secured Socket
Layer (SSL). The future of security is you
4. Transport Layer Security (TLS) A protocol that provides • Go and spread good practices by setting a good example.
communication security between client/server applications • Are you your own worst enemy when it comes to security?
that communicates with each other over the internet. • What are your bad habits?
5. TCP/IP used to govern the connection of the computer • Where do you place your trust?
systems to the Internet.
6. A Virtual Private Network extends a private network across
a public network, and enables users to send and receive
data across shared or public networks as if their computing
devices were directly connected to the private network.
7. IP sec it offers encryption at the IP level. This means that
common TCP attacks, such as sequence guessing or
spoofing attacks cannot occur, since attackers could never
see the contents of traveling packets.
8. DNS sec stands for Domain Name System Security
Extensions, and it is a technology used to protect
information on the Domain Name System (DNS) which is
used on IP networks.

CHAPTER 11
Intrusion detection it is a device or software application that
monitors a network or systems for malicious activity or policy
violations.
The aim of an intrusion detection system is to detect break-ins in
progress so that something can be done about them.
Two types of intrusion detection
1. Rule based intrusion detection: testing for specific
occurrences, e.g. seeing whether a particular private port is
accessed.

You might also like