What is a false positive in biometric authentication?
Click to see answer
When an authentic user is rejected by the biometric authentication device.
Click to see question
What is a false positive in biometric authentication?
When an authentic user is rejected by the biometric authentication device.
Why are passwords considered easy for users to understand?
They are straightforward and familiar to most users.
Why are biometric authentication techniques less socially accepted?
They are less socially accepted than entering a password.
What are the three types of authentication protocols mentioned?
Client authentication, server authentication, and mutual authentication.
What are some mechanisms used in data centers for security?
Cameras, card readers, biometric locks, and vaults.
What risk arises if a web server is configured to make all file types available for download?
Sensitive files, like spreadsheets, could be unintentionally exposed.
What is the primary concern for Alice and Bob when exchanging messages?
They want to prevent a third party, like Mallory, from modifying the contents of their messages.
What is authentication?
The act of verifying someone’s identity.
What does technological security encompass?
Application security, operating system (OS) security, and network security.
When is a file considered not tranquil in the context of the tranquility property?
When it is being edited or written.
Why is it important to configure a web server correctly?
To minimize possible methods of attack.
What is a patch in software?
An updated version of the software that fixes security-related bugs.
How does the Mandatory Access Control (MAC) model function?
The system decides who has access to resources, and users cannot grant access to others.
What is a key management issue in biometric authentication?
If an attacker obtains a user's biological measurements, they can impersonate the user.
Why can't a user's fingerprint be revoked if stolen?
Because a user cannot get a new fingerprint.
How can search engines pose a risk to sensitive documents on a web server?
They can inadvertently crawl and index sensitive documents.
What role does a key play in encryption?
It is a secret sequence of bits used to encrypt and decrypt messages between parties.
What are the three types of methods Bob can use to authenticate Alice?
Something you know, something you have, and something you are.
What types of access models can the Bell-LaPadula model implement?
Mandatory or discretionary access model.
What advantage does keeping a cell phone and ATM card in different places provide?
It helps prevent fraudulent withdrawal requests if one is stolen.
How does authorization differ from authentication?
Authentication verifies identity, while authorization verifies a user's authority.
What does voice identification involve?
A computer asks a user to say a phrase and compares the voice signals to a databank.
What is ISO 17799?
A standard for information security management.
What privileges are associated with Alice and Bob in their home directories?
Read, write, and execute.
What is a significant disadvantage of password security systems?
Most users do not choose strong passwords, making them easy to guess.
What roles does Alice have according to the user-role mapping?
Administrator and Programmer.
What does holistic security require?
Physical security, technological security, and good policies and procedures.
What is required for a user to authenticate with a smart card?
The user must enter a PIN into a smart card reader after inserting the card.
What tools can help manage malicious network traffic?
Firewalls and intrusion detection systems (IDSs).
How does an iris scan work?
A camera takes a picture of a person's iris and stores certain features about it.
How does RBAC determine access privileges?
By considering the user's position or role, such as administrative assistant or CEO.
How can redundancy be used to ensure message integrity?
By repeating critical information in the message, such as the dollar amount, to detect tampering.
What is a major advantage of using passwords for authentication?
Password schemes are simple to implement compared to other mechanisms like biometrics.
Why is physical security important?
It is crucial for protecting systems and data, alongside technological security mechanisms.
What is the primary goal of confidentiality?
To keep the contents of communication or data secret from unauthorized users.
What is one example of an attack that can exploit web server vulnerabilities?
SQL injection attack.
How does a smart card protect its information?
It self-destructs if tampered with, and its components are epoxied together.
What does client authentication involve?
The server verifying the client's identity.
What distinguishes the Discretionary Access Control (DAC) model from MAC?
Users can determine which other users can access the resources they create.
What is a one-time password (OTP) system?
A system that requires a new password each time a user logs in.
What are the classifications used in the Bell-LaPadula model?
Unclassified, confidential, secret, and top secret.
Why do e-commerce websites provide server authentication?
To prevent clients from submitting sensitive information to spoofed or impostor websites.
What happens if Alice and Bob use good encryption technology and keep their key secret?
Eve will not be able to understand their communication.
What is the focus of the book mentioned in the text?
Security goals and mechanisms for protecting systems.
Why is fingerprinting less socially accepted than other biometric techniques?
People generally associate taking fingerprints with criminal activity.
What can a malicious website exploit in a web browser?
A vulnerability in the web browser code that can give the attacker control of the machine.
What additional information can be included in more sophisticated ACL schemes?
Roles that enable a user to access particular resources.
How do users with multiple roles declare their role?
Just prior to conducting an action, such as doing a backup or modifying a file.
What does the star property (confinement property) prohibit?
A user from writing files or creating resources with a lower level of access than their own.
What is a common method used to achieve confidentiality in communication?
Encryption technology.
What is the third general method of authenticating a user?
Something You Are, which is based on biometric techniques.
What are the three components of technological security?
Application security, OS security, and network security.
What is a potential vulnerability of smart card authentication?
The smart card reader must be trusted; a rogue reader can capture the user's PIN.
Why are policies and procedures important for security?
They ensure that employees follow security practices, such as not sharing passwords.
Who commonly uses the Bell-LaPadula model?
Many government and military organizations.
What is a retinal scan?
A technique that uses infrared light to read the pattern of retinal blood vessels.
What technique can be used in networking protocols to achieve message integrity?
Cyclic Redundancy Checks (CRCs).
What are the two main objectives in the first three chapters of the book?
To establish the key goals of computer security and to provide an overview of the core principles of secure systems design.
What is the key innovation in the Bell-LaPadula model?
The use of various rules to guide decisions about resource access.
What does the simple property in the Bell-LaPadula model state?
A user cannot access information resources with a higher classification than their own.
What is a smart card?
A tamper-resistant card that authenticates users based on something they have.
What is the saying that emphasizes the nature of security?
Security is a process, not a product.
In the MAC model, can Alice share her document with Bob?
No, only the system can determine access; Alice cannot grant access to her document.
Who are the fictitious characters used to illustrate security goals?
Alice, Bob, Eve, Mallory, and Trent.
What does server authentication involve?
The client verifying the server's identity.
How does Mallory differ from Eve in terms of eavesdropping?
Mallory is an active eavesdropper who can modify messages, while Eve is a passive eavesdropper who cannot.
What is a challenge of using an OTP system?
Users may struggle to remember all the different passwords.
How can location be used as a factor in authentication?
A bank can verify a user's location via their cell phone's GPS when processing a transaction.
Which biometric technique is considered less intrusive: palm scan or iris scan?
Iris scan, as it requires the user to just look in a particular direction.
What access might a CEO have in an RBAC system?
Access to salary information about any employee in the company.
What mechanism do operating systems use to determine user authorization?
Access control lists (ACLs).
What is a potential vulnerability in a web server scenario?
A bug in how it ascertains the identity of the user.
What privilege does a backup operator have in the role-based ACL?
Read data from all user home directories (/home/*).
What is the purpose of computer-to-computer authentication in distributed systems?
To ensure that computers can verify each other's identities since not all computers can be trusted equally.
What is the intuitive rule often referred to as 'no read up'?
The simple property of the Bell-LaPadula model.
What is the role of the microprocessor in a smart card?
It runs software that authenticates a user and guards secret information.
What is the role of network layer security?
To ensure only valid data packets are delivered to the web server and to block malicious traffic.
How can Alice grant Bob access to her file in a DAC system?
By issuing a command to the system, such as 'chmod a+r /home/Alice/product_specs.txt'.
How does an encryption algorithm work?
It takes a key and a message as input and scrambles the message in a way that is mathematically dependent on the key.
What is the function of an OTP card like the SecurID?
It generates a new password periodically for user authentication.
What happens if an organization has advanced technological security but neglects employee training?
It will not be secure overall.
What is a modern adaptation of OTP systems?
Integration into personal digital assistants (PDAs) and cell phones.
What is signature dynamics?
A technique that records a user's signature along with the pressure and timing of writing.
What can happen if a user's identity is not properly ascertained?
An attacker may gain access to valuable documents.
What is the tranquility property in the Bell-LaPadula model?
A synchronization constraint that requires all users currently using a file to stop before it can be modified, ensuring no confidential information is written while it may be declassified.
Why is it important to have policies and procedures in place for security?
To guard sensitive corporate information and educate employees against social engineering attacks.
Why is OS security important?
Operating systems can contain vulnerabilities that attackers may exploit.
What do attackers use to crack passwords?
Password-cracking programs that try common login names and simple concatenations.
What feature in Windows helps keep the operating system secure?
The Windows Update feature, which installs critical system patches.
What is the privilege associated with the Backup Operator role in the role-based ACL?
Read access to all resources (/home/*).
What is two-factor authentication?
Authentication based on two methods, such as something the user has and something the user knows.
What is a palm scan?
A biometric technique that measures the size and curves of a person's hand and fingers.
What is the Role-Based Access Control (RBAC) model?
A model where access decisions are based on the user's role within an organization.
What method can Alice and Bob use to detect if their messages have been tampered with?
They can use an integrity check.
What role does Trent play in the context of Alice and Bob?
Trent is a trusted third party who helps Alice and Bob accomplish their work.
What access might a manager have in an RBAC system?
Access to salary information about their subordinates only.
What are some key disadvantages of biometric authentication techniques?
False positives and negatives, varying social acceptance, and key management issues.
What does an asterisk (*) represent in an ACL?
It indicates all files and subdirectories within a particular home directory.
What are the three access control models?
Mandatory Access Control (MAC), Discretionary Access Control (DAC), and Role-Based Access Control (RBAC).
What should be done to secure servers physically?
They should be kept behind locked doors with access limited to privileged employees.
What is the purpose of roles in access control?
To ensure users do not inadvertently modify files while performing specific actions.
What is the strategy behind the star property?
To prevent information leakage from a higher classification to a lower one.
What is the privilege associated with the Administrator role in the role-based ACL?
Read, write, and execute access to all resources (/*).
How does an ATM card exemplify two-factor authentication?
It requires both the card and a PIN for authentication.
What is the role of technological security in a secure system?
It is one component of ensuring overall, holistic security.
What is the role of authorization in security?
To check whether a user has permission to conduct a specific action.
What can happen if a user has root or administrator privileges on a computer?
They can use software tools to access all network traffic, potentially eavesdropping on communications.
What is a potential limitation of using redundancy for message integrity?
An active eavesdropper like Mallory may still conduct a denial-of-service attack by forcing message discards.
What is an Access Control List (ACL)?
A set of users and a corresponding set of resources they are allowed to access.
What is a social engineering attack?
An attack where an attacker impersonates another employee to extract sensitive information like usernames or passwords.
What can happen if a web server is configured to serve content from a database?
An attacker may exploit vulnerabilities to take control of the database.
What are the seven key concepts in the field of security?
Authentication, Authorization, Confidentiality, Data/message integrity, Accountability, Availability, Non-repudiation.
Why are smart cards considered stronger than magnetic stripe cards?
Smart cards are harder to copy due to their tamper-resistance features.
What is dumpster diving?
An attack method where hackers sift through garbage to gather sensitive information.
How can a file be made available to all users with a specific role in UNIX?
By using the command 'chgrp' to change the group of the file.
What is mutual authentication?
Both the client and server verifying each other's identities.
What is an example of an application that can suffer from security problems?
A web server.
How can attackers exploit smart card systems?
By setting up rogue readers in public places to capture PINs.
How does the server verify the password entered from an OTP card?
The server knows the algorithm used by the OTP card to generate passwords.
What example is given to illustrate the use of redundancy in messages?
Alice sends the message 'I, Alice, owe you, Bob, 1.00.'
What is a common security vulnerability in web browsers?
Web browsers may not interpret data robustly, allowing downloads from malicious websites.
What is a false negative in biometric authentication?
When an impersonator successfully impersonates a user.
What can an administrator role, such as Alice, do in the file system?
Read, write, and execute files anywhere on the file system.
What is the relationship between the difficulty of copying an artifact and the strength of authentication?
The harder it is for an attacker to copy the artifact, the stronger the authentication.
Who is Eve in the context of Alice and Bob's communication?
An eavesdropper who attempts to intercept and understand the information exchanged between Alice and Bob.
What is the risk associated with reusing passwords?
It gives attackers multiple opportunities to intercept the password.
Why is having only one or two types of security usually insufficient?
Because all three types (physical, technological, and policies) are typically required for overall security.
What does the tranquility property state?
The classification of a file cannot be changed while it is in use by any user.
What is a potential attack method used by Mallory?
Mallory can modify, inject, or delete parts of the conversation, which is a more significant threat.
What is an example of 'something you know' for authentication?
A password that only Alice should know.
What should employees be educated about regarding passwords?
They should never give out their passwords, even to security administrators.
How do ATM cards differ from smart cards in terms of security?
ATM cards are not tamper-resistant and can be easily copied.
Why are CRCs not sufficient against adversaries like Mallory?
Mallory can modify both the message and the CRC to match, thus bypassing detection.
How can technology be used for physical security?
By using electronic badges and badge readers for access control.
What is an ATM card?
A card with a magnetic stripe that stores the user's account number for authentication.
What is an example of an authorization check?
When Alice attempts to withdraw 300.
What security features do credit card companies use to protect ATM cards?
They incorporate holograms or other hard-to-copy elements.