0% found this document useful (0 votes)
8 views17 pages

Review Q

The document discusses several key concepts related to information security including confidentiality, integrity, and availability as fundamental aspects of security. It also covers common authentication methods like something you know, something you have, and something you are. Various password attacks and how to prevent them are explained as well.

Uploaded by

85vn7gr2b7
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views17 pages

Review Q

The document discusses several key concepts related to information security including confidentiality, integrity, and availability as fundamental aspects of security. It also covers common authentication methods like something you know, something you have, and something you are. Various password attacks and how to prevent them are explained as well.

Uploaded by

85vn7gr2b7
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

- Confidentiality: Information about system or its users cannot be learned by an

attacker
- Integrity: The system continues to operate properly, only reaching states that would
occur if there were no attacker
- Availability: Actions by an attacker do not prevent users from having access to use of
the system

- Security policy: A set of rules and practices that specify how a system or org provides security services
to protect sensitive and critical system resources.
- Implementation actions:
♣ Prevention ♣ Response
♣ Detection ♣ Recovery
Something the Something the Something the
Something the
individual individual individual does
individual is
knows: possesses: (dynamic
(static
password, PIN, smartcard, biometrics):
biometrics):
answers to electronic voice pattern,
fingerprint,
prearranged keycard, handwriting,
questions. retina, face.
physical key. typing rhythm.
1- Offline dictionary attack:
- hacker gain access to the system
password file.
2- Specific account attack:
- Compares the password hashes
- The attacker targets a specific account
against hashes of commonly used
and submits password guesses until
passwords.
the correct password is discovered.
- If a match is found, the attacker can
gain access by that ID/password
combination
3- Popular password attack: 4- Password guessing against
- A variation of the preceding
attack is to use a popular
single user:
The attacker attempts to gain
password and try it against a
wide range of user IDs. knowledge about the account holder
and system password policies and uses
- because users choose a password
that knowledge to guess the password.
that is easily remembered.
6. Exploiting user mistakes:
- If the system assigns a password, then the
user write it down because it is difficult to
5- Workstation hijacking: remember. This will creates the potential for
The attacker waits until a an adversary to read the written password.
logged-in workstation is - user may share a password.
unattended. - social engineering.
- When preconfigured passwords are
unchanged, they are easily guessed.
7. Exploiting multiple 8. Electronic monitoring :
password use: - If a password is communicated across
• Attack happens when different a network to log on to a remote
network devices share the same or system, it is vulnerable to
a similar password for a given user. eavesdropping.
- Rule enforcement:
specific rules that passwords must adhere to
- Password cracker:
compile a large dictionary of passwords not to use
- Bloom filter:
- used to build a table based on dictionary using hashes
- check desired password against this table

❖ In a Trojan horse attack, an application or physical device


masquerades as an authentic application or device for the
purpose of capturing a user password, passcode, or
biometric.
❖ Classified into three categories:
• Static
• Dynamic password generator
• Challenge-response

o Facial characteristics
o Fingerprints
o Hand geometry
o Retinal pattern
o Iris
o Signature
o Voice
❖ Enrollment: creates an association between a user and the
user’s biometric characteristics.
❖ Verification: Depending on the application, user
authentication involves verifying that a claimed user is the
actual user. (true\false)
❖ Identification: Depending on the application, user
authentication involves identifying an unknown user. (User’s
identity or “user unidentified)
Remote User Authentication
• Authentication over a network, the
local Authentication Internet, or communications link, is
a user attempts to access a more complex.
system that is locally present, • Additional security threats:
such as a stand-alone office 1. Eavesdropping.
PC or an ATM machine. 2. Capturing a password.
3. Replaying an authentication
sequence that has been observed.
❖ Owner: This may be the creator of a resource, such as a file.
❖ Group: In addition to the privileges assigned to an owner, a named group of users
may also be granted access rights, such that membership in the group is sufficient to
exercise these access rights.
❖ World: The least amount of access is granted to users who are able to access the
system but are not included in the categories owner and group for this resource.

❖ Subject: entity that can ❖ Object: access controlled ❖ Access right: way
access objects. resource. in which subject
❖ process representing ❖ e.g. files, directories, records, accesses an object.
user/application. programs etc. ❖ e.g. read, write,
❖ often have 3 classes: ❖ number/type depend on execute, delete,
owner, group, world. environment. create, search.
❖ Attribute-based access control(ABAC): based on the
attributes of the user, the resources and the current
environment

❖ Discretionary access control (DAC)


❖ Mandatory access control (MAC)
❖ Role-based access control (RBAC)
❖ Attribute-based access control(ABAC)

You might also like