Foundations of Security - What Every Programmer Needs to Know (1)

Created by Sam

p.9

What is a false positive in biometric authentication?

Click to see answer

p.9

When an authentic user is rejected by the biometric authentication device.

Click to see question

1 / 137
p.9
Authentication Methods

What is a false positive in biometric authentication?

When an authentic user is rejected by the biometric authentication device.

p.6
Authentication Methods

Why are passwords considered easy for users to understand?

They are straightforward and familiar to most users.

p.9
Authentication Methods

Why are biometric authentication techniques less socially accepted?

They are less socially accepted than entering a password.

p.10
Authentication Methods

What are the three types of authentication protocols mentioned?

Client authentication, server authentication, and mutual authentication.

p.2
Physical Security Measures

What are some mechanisms used in data centers for security?

Cameras, card readers, biometric locks, and vaults.

p.3
Confidentiality and Data Protection

What risk arises if a web server is configured to make all file types available for download?

Sensitive files, like spreadsheets, could be unintentionally exposed.

p.16
Message/Data Integrity

What is the primary concern for Alice and Bob when exchanging messages?

They want to prevent a third party, like Mallory, from modifying the contents of their messages.

p.5
Authentication Methods

What is authentication?

The act of verifying someone’s identity.

p.1
Technological Security Components

What does technological security encompass?

Application security, operating system (OS) security, and network security.

p.14
Authorization and Access Control

When is a file considered not tranquil in the context of the tranquility property?

When it is being edited or written.

p.3
Core Principles of Secure Systems Design

Why is it important to configure a web server correctly?

To minimize possible methods of attack.

p.4
Technological Security Components

What is a patch in software?

An updated version of the software that fixes security-related bugs.

p.12
Authorization and Access Control

How does the Mandatory Access Control (MAC) model function?

The system decides who has access to resources, and users cannot grant access to others.

p.9
Authentication Methods

What is a key management issue in biometric authentication?

If an attacker obtains a user's biological measurements, they can impersonate the user.

p.9
Authentication Methods

Why can't a user's fingerprint be revoked if stolen?

Because a user cannot get a new fingerprint.

p.3
Confidentiality and Data Protection

How can search engines pose a risk to sensitive documents on a web server?

They can inadvertently crawl and index sensitive documents.

p.15
Confidentiality and Data Protection

What role does a key play in encryption?

It is a secret sequence of bits used to encrypt and decrypt messages between parties.

p.5
Authentication Methods

What are the three types of methods Bob can use to authenticate Alice?

Something you know, something you have, and something you are.

p.13
Authorization and Access Control

What types of access models can the Bell-LaPadula model implement?

Mandatory or discretionary access model.

p.9
Authentication Methods

What advantage does keeping a cell phone and ATM card in different places provide?

It helps prevent fraudulent withdrawal requests if one is stolen.

p.10
Authorization and Access Control

How does authorization differ from authentication?

Authentication verifies identity, while authorization verifies a user's authority.

p.8
Authentication Methods

What does voice identification involve?

A computer asks a user to say a phrase and compares the voice signals to a databank.

p.2
Core Principles of Secure Systems Design

What is ISO 17799?

A standard for information security management.

p.11
Authorization and Access Control

What privileges are associated with Alice and Bob in their home directories?

Read, write, and execute.

p.6
Authentication Methods

What is a significant disadvantage of password security systems?

Most users do not choose strong passwords, making them easy to guess.

p.11
Authorization and Access Control

What roles does Alice have according to the user-role mapping?

Administrator and Programmer.

p.1
Holistic Security Approach

What does holistic security require?

Physical security, technological security, and good policies and procedures.

p.7
Authentication Methods

What is required for a user to authenticate with a smart card?

The user must enter a PIN into a smart card reader after inserting the card.

p.4
Technological Security Components

What tools can help manage malicious network traffic?

Firewalls and intrusion detection systems (IDSs).

p.8
Authentication Methods

How does an iris scan work?

A camera takes a picture of a person's iris and stores certain features about it.

p.12
Authorization and Access Control

How does RBAC determine access privileges?

By considering the user's position or role, such as administrative assistant or CEO.

p.16
Message/Data Integrity

How can redundancy be used to ensure message integrity?

By repeating critical information in the message, such as the dollar amount, to detect tampering.

p.6
Authentication Methods

What is a major advantage of using passwords for authentication?

Password schemes are simple to implement compared to other mechanisms like biometrics.

p.2
Physical Security Measures

Why is physical security important?

It is crucial for protecting systems and data, alongside technological security mechanisms.

p.15
Confidentiality and Data Protection

What is the primary goal of confidentiality?

To keep the contents of communication or data secret from unauthorized users.

p.3
Technological Security Components

What is one example of an attack that can exploit web server vulnerabilities?

SQL injection attack.

p.7
Core Principles of Secure Systems Design

How does a smart card protect its information?

It self-destructs if tampered with, and its components are epoxied together.

p.10
Authentication Methods

What does client authentication involve?

The server verifying the client's identity.

p.12
Authorization and Access Control

What distinguishes the Discretionary Access Control (DAC) model from MAC?

Users can determine which other users can access the resources they create.

p.6
Authentication Methods

What is a one-time password (OTP) system?

A system that requires a new password each time a user logs in.

p.13
Authorization and Access Control

What are the classifications used in the Bell-LaPadula model?

Unclassified, confidential, secret, and top secret.

p.10
Authentication Methods

Why do e-commerce websites provide server authentication?

To prevent clients from submitting sensitive information to spoofed or impostor websites.

p.15
Confidentiality and Data Protection

What happens if Alice and Bob use good encryption technology and keep their key secret?

Eve will not be able to understand their communication.

p.2
Core Principles of Secure Systems Design

What is the focus of the book mentioned in the text?

Security goals and mechanisms for protecting systems.

p.8
Authentication Methods

Why is fingerprinting less socially accepted than other biometric techniques?

People generally associate taking fingerprints with criminal activity.

p.4
Technological Security Components

What can a malicious website exploit in a web browser?

A vulnerability in the web browser code that can give the attacker control of the machine.

p.11
Authorization and Access Control

What additional information can be included in more sophisticated ACL schemes?

Roles that enable a user to access particular resources.

p.13
Authorization and Access Control

How do users with multiple roles declare their role?

Just prior to conducting an action, such as doing a backup or modifying a file.

p.14
Authorization and Access Control

What does the star property (confinement property) prohibit?

A user from writing files or creating resources with a lower level of access than their own.

p.15
Confidentiality and Data Protection

What is a common method used to achieve confidentiality in communication?

Encryption technology.

p.8
Authentication Methods

What is the third general method of authenticating a user?

Something You Are, which is based on biometric techniques.

p.2
Technological Security Components

What are the three components of technological security?

Application security, OS security, and network security.

p.7
Authorization and Access Control

What is a potential vulnerability of smart card authentication?

The smart card reader must be trusted; a rogue reader can capture the user's PIN.

p.4
Holistic Security Approach

Why are policies and procedures important for security?

They ensure that employees follow security practices, such as not sharing passwords.

p.13
Authorization and Access Control

Who commonly uses the Bell-LaPadula model?

Many government and military organizations.

p.8
Authentication Methods

What is a retinal scan?

A technique that uses infrared light to read the pattern of retinal blood vessels.

p.16
Message/Data Integrity

What technique can be used in networking protocols to achieve message integrity?

Cyclic Redundancy Checks (CRCs).

p.1
Key Goals of Computer Security

What are the two main objectives in the first three chapters of the book?

To establish the key goals of computer security and to provide an overview of the core principles of secure systems design.

p.14
Authorization and Access Control

What is the key innovation in the Bell-LaPadula model?

The use of various rules to guide decisions about resource access.

p.14
Authorization and Access Control

What does the simple property in the Bell-LaPadula model state?

A user cannot access information resources with a higher classification than their own.

p.7
Authentication Methods

What is a smart card?

A tamper-resistant card that authenticates users based on something they have.

p.5
Core Principles of Secure Systems Design

What is the saying that emphasizes the nature of security?

Security is a process, not a product.

p.12
Authorization and Access Control

In the MAC model, can Alice share her document with Bob?

No, only the system can determine access; Alice cannot grant access to her document.

p.5
Core Principles of Secure Systems Design

Who are the fictitious characters used to illustrate security goals?

Alice, Bob, Eve, Mallory, and Trent.

p.10
Authentication Methods

What does server authentication involve?

The client verifying the server's identity.

p.16
Message/Data Integrity

How does Mallory differ from Eve in terms of eavesdropping?

Mallory is an active eavesdropper who can modify messages, while Eve is a passive eavesdropper who cannot.

p.6
Authentication Methods

What is a challenge of using an OTP system?

Users may struggle to remember all the different passwords.

p.9
Authentication Methods

How can location be used as a factor in authentication?

A bank can verify a user's location via their cell phone's GPS when processing a transaction.

p.8
Authentication Methods

Which biometric technique is considered less intrusive: palm scan or iris scan?

Iris scan, as it requires the user to just look in a particular direction.

p.12
Authorization and Access Control

What access might a CEO have in an RBAC system?

Access to salary information about any employee in the company.

p.10
Authorization and Access Control

What mechanism do operating systems use to determine user authorization?

Access control lists (ACLs).

p.3
Authentication Methods

What is a potential vulnerability in a web server scenario?

A bug in how it ascertains the identity of the user.

p.13
Authorization and Access Control

What privilege does a backup operator have in the role-based ACL?

Read data from all user home directories (/home/*).

p.10
Authentication Methods

What is the purpose of computer-to-computer authentication in distributed systems?

To ensure that computers can verify each other's identities since not all computers can be trusted equally.

p.14
Authorization and Access Control

What is the intuitive rule often referred to as 'no read up'?

The simple property of the Bell-LaPadula model.

p.7
Technological Security Components

What is the role of the microprocessor in a smart card?

It runs software that authenticates a user and guards secret information.

p.4
Technological Security Components

What is the role of network layer security?

To ensure only valid data packets are delivered to the web server and to block malicious traffic.

p.12
Authorization and Access Control

How can Alice grant Bob access to her file in a DAC system?

By issuing a command to the system, such as 'chmod a+r /home/Alice/product_specs.txt'.

p.15
Confidentiality and Data Protection

How does an encryption algorithm work?

It takes a key and a message as input and scrambles the message in a way that is mathematically dependent on the key.

p.6
Authentication Methods

What is the function of an OTP card like the SecurID?

It generates a new password periodically for user authentication.

p.1
Holistic Security Approach

What happens if an organization has advanced technological security but neglects employee training?

It will not be secure overall.

p.6
Authentication Methods

What is a modern adaptation of OTP systems?

Integration into personal digital assistants (PDAs) and cell phones.

p.8
Authentication Methods

What is signature dynamics?

A technique that records a user's signature along with the pressure and timing of writing.

p.3
Authentication Methods

What can happen if a user's identity is not properly ascertained?

An attacker may gain access to valuable documents.

p.15
Confidentiality and Data Protection

What is the tranquility property in the Bell-LaPadula model?

A synchronization constraint that requires all users currently using a file to stop before it can be modified, ensuring no confidential information is written while it may be declassified.

p.5
Holistic Security Approach

Why is it important to have policies and procedures in place for security?

To guard sensitive corporate information and educate employees against social engineering attacks.

p.4
Technological Security Components

Why is OS security important?

Operating systems can contain vulnerabilities that attackers may exploit.

p.6
Authentication Methods

What do attackers use to crack passwords?

Password-cracking programs that try common login names and simple concatenations.

p.4
Technological Security Components

What feature in Windows helps keep the operating system secure?

The Windows Update feature, which installs critical system patches.

p.11
Authorization and Access Control

What is the privilege associated with the Backup Operator role in the role-based ACL?

Read access to all resources (/home/*).

p.9
Authentication Methods

What is two-factor authentication?

Authentication based on two methods, such as something the user has and something the user knows.

p.8
Authentication Methods

What is a palm scan?

A biometric technique that measures the size and curves of a person's hand and fingers.

p.12
Authorization and Access Control

What is the Role-Based Access Control (RBAC) model?

A model where access decisions are based on the user's role within an organization.

p.16
Message/Data Integrity

What method can Alice and Bob use to detect if their messages have been tampered with?

They can use an integrity check.

p.5
Core Principles of Secure Systems Design

What role does Trent play in the context of Alice and Bob?

Trent is a trusted third party who helps Alice and Bob accomplish their work.

p.12
Authorization and Access Control

What access might a manager have in an RBAC system?

Access to salary information about their subordinates only.

p.8
Authentication Methods

What are some key disadvantages of biometric authentication techniques?

False positives and negatives, varying social acceptance, and key management issues.

p.11
Authorization and Access Control

What does an asterisk (*) represent in an ACL?

It indicates all files and subdirectories within a particular home directory.

p.12
Authorization and Access Control

What are the three access control models?

Mandatory Access Control (MAC), Discretionary Access Control (DAC), and Role-Based Access Control (RBAC).

p.2
Physical Security Measures

What should be done to secure servers physically?

They should be kept behind locked doors with access limited to privileged employees.

p.13
Authorization and Access Control

What is the purpose of roles in access control?

To ensure users do not inadvertently modify files while performing specific actions.

p.14
Authorization and Access Control

What is the strategy behind the star property?

To prevent information leakage from a higher classification to a lower one.

p.11
Authorization and Access Control

What is the privilege associated with the Administrator role in the role-based ACL?

Read, write, and execute access to all resources (/*).

p.9
Authentication Methods

How does an ATM card exemplify two-factor authentication?

It requires both the card and a PIN for authentication.

p.1
Core Principles of Secure Systems Design

What is the role of technological security in a secure system?

It is one component of ensuring overall, holistic security.

p.10
Authorization and Access Control

What is the role of authorization in security?

To check whether a user has permission to conduct a specific action.

p.15
Confidentiality and Data Protection

What can happen if a user has root or administrator privileges on a computer?

They can use software tools to access all network traffic, potentially eavesdropping on communications.

p.16
Message/Data Integrity

What is a potential limitation of using redundancy for message integrity?

An active eavesdropper like Mallory may still conduct a denial-of-service attack by forcing message discards.

p.11
Authorization and Access Control

What is an Access Control List (ACL)?

A set of users and a corresponding set of resources they are allowed to access.

p.5
Holistic Security Approach

What is a social engineering attack?

An attack where an attacker impersonates another employee to extract sensitive information like usernames or passwords.

p.3
Technological Security Components

What can happen if a web server is configured to serve content from a database?

An attacker may exploit vulnerabilities to take control of the database.

p.1
Core Principles of Secure Systems Design

What are the seven key concepts in the field of security?

Authentication, Authorization, Confidentiality, Data/message integrity, Accountability, Availability, Non-repudiation.

p.8
Authentication Methods

Why are smart cards considered stronger than magnetic stripe cards?

Smart cards are harder to copy due to their tamper-resistance features.

p.2
Confidentiality and Data Protection

What is dumpster diving?

An attack method where hackers sift through garbage to gather sensitive information.

p.13
Authorization and Access Control

How can a file be made available to all users with a specific role in UNIX?

By using the command 'chgrp' to change the group of the file.

p.10
Authentication Methods

What is mutual authentication?

Both the client and server verifying each other's identities.

p.2
Technological Security Components

What is an example of an application that can suffer from security problems?

A web server.

p.7
Holistic Security Approach

How can attackers exploit smart card systems?

By setting up rogue readers in public places to capture PINs.

p.6
Authentication Methods

How does the server verify the password entered from an OTP card?

The server knows the algorithm used by the OTP card to generate passwords.

p.16
Message/Data Integrity

What example is given to illustrate the use of redundancy in messages?

Alice sends the message 'I, Alice, owe you, Bob, 1.00.Confirm,1.00. Confirm, 1.00.'

p.4
Technological Security Components

What is a common security vulnerability in web browsers?

Web browsers may not interpret data robustly, allowing downloads from malicious websites.

p.9
Authentication Methods

What is a false negative in biometric authentication?

When an impersonator successfully impersonates a user.

p.13
Authorization and Access Control

What can an administrator role, such as Alice, do in the file system?

Read, write, and execute files anywhere on the file system.

p.8
Authentication Methods

What is the relationship between the difficulty of copying an artifact and the strength of authentication?

The harder it is for an attacker to copy the artifact, the stronger the authentication.

p.15
Confidentiality and Data Protection

Who is Eve in the context of Alice and Bob's communication?

An eavesdropper who attempts to intercept and understand the information exchanged between Alice and Bob.

p.6
Authentication Methods

What is the risk associated with reusing passwords?

It gives attackers multiple opportunities to intercept the password.

p.1
Holistic Security Approach

Why is having only one or two types of security usually insufficient?

Because all three types (physical, technological, and policies) are typically required for overall security.

p.14
Authorization and Access Control

What does the tranquility property state?

The classification of a file cannot be changed while it is in use by any user.

p.16
Message/Data Integrity

What is a potential attack method used by Mallory?

Mallory can modify, inject, or delete parts of the conversation, which is a more significant threat.

p.5
Authentication Methods

What is an example of 'something you know' for authentication?

A password that only Alice should know.

p.4
Holistic Security Approach

What should employees be educated about regarding passwords?

They should never give out their passwords, even to security administrators.

p.7
Core Principles of Secure Systems Design

How do ATM cards differ from smart cards in terms of security?

ATM cards are not tamper-resistant and can be easily copied.

p.16
Message/Data Integrity

Why are CRCs not sufficient against adversaries like Mallory?

Mallory can modify both the message and the CRC to match, thus bypassing detection.

p.2
Physical Security Measures

How can technology be used for physical security?

By using electronic badges and badge readers for access control.

p.7
Authentication Methods

What is an ATM card?

A card with a magnetic stripe that stores the user's account number for authentication.

p.10
Authorization and Access Control

What is an example of an authorization check?

When Alice attempts to withdraw 500butisonlyauthorizedtowithdraw500 but is only authorized to withdraw 300.

p.7
Technological Security Components

What security features do credit card companies use to protect ATM cards?

They incorporate holograms or other hard-to-copy elements.

Study Smarter, Not Harder
Study Smarter, Not Harder