System Security Prep

System Security Prep

Zakary Teo (lvl 5)
Unsectioned

Preview this deck

Two distinct methods of identifying a trojan horse

Front

Star 0%
Star 0%
Star 0%
Star 0%
Star 0%

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Active users

1

All-time users

1

Favorites

0

Last updated

8 months ago

Date created

Dec 20, 2023

Cards (74)

Unsectioned

(74 cards)

Two distinct methods of identifying a trojan horse

Front

Monitoring - Make use of virus monitors to see if any virus activities are going on. With detecting these abnormal behaviour, The detection of the trojan can be complete before complete infection, However, a lot of false alarms may be generated.

 

Signature scanning - most common and simplest approach. The infection is disassembled and the key portions are identified. Next, the key portions are combined to form a signature. The signature is then checked against a large library of programs to reduce the chance of false positives

Back

How does BLP and Biba become restrictive if applied together?

Front

As BLP is used for confidentiality and Biba is used for integrity, some properties are denied by each other. 

To resolve it, usage of labels for both clearance and classification 

Back

How does syncookies provide protection against connection based DOS? 

Front

They do it by not dropping connection when the SYN queue fills up until the server receives a “correct” ACK from the client. At this time, the server can reconstruct the SYN queue entry and then connection proceeds as usual

Back

Why is tailored or spear phishing attacks more effective than general phishing attacks. 

Front

Tailored/ spear phishing are more effective as the attack involves using what we know about the victim to increase the chances of the attack being successful while general phishing is brute force (inefficient)

Back

BLP ds-property provides

Front

permission that may be passed from an authorized subject to another, level authorized subject.

Back

What is a “sandbox environment”?

Front

Sandbox environment is a virtual environment which restricts sharing by controlling the domain boundaries. It is important as if a software is suspected to be a malware, only the virtual environment is affected.

Back

The channels uses two channel authentication are

Front

One is between client and server and the other is between server to client which is independent

Back

Major role of a honeypot

Front

Divert attackers from a critical system or collect information about the attackers activities

Back

What does Biba attempt to control? And its policy

Front

Biba attempts to control the integrity of data. Its policy is no read down and no write up.

Back

Pharming is more technical and less social engineering than deceptive phishing because

Front

it involves technology to perform the phishing act. It is carried out by modifying the hosts file thorough virus or "poison" DNS servers

Back

How does stack randomization protect against buffer overflow?

Front

It randomizes the new buffer location, new instance of the program run is probably in a different memory location and hence make the overflow attack difficult

Back

Describe the difference between direct action and memory residence

Front

Viruses install themselves into the memory of the host computer. Direct action viruses is only active when an infected object is active.

Memory residence does not require the original program to be running

Back

Explain the ideas of threshold models and statistical models in the context of an intrusion detection system

Front

Statistical model for anomaly detection is where statistic of past data is used to detect the anomaly and threshold model which is the simplest statistical model is where an alarm is triggered if more than the certain number of something happened or less than the certain number of something is happened

Back

One resource that can be targeted in a DOS attack is

Front

Network bandwidth(network)

Memory Storage and processor capacity(Computer)

Back

What are the 2 classes of intruder in an intrusion detection system?

Front

Clandestine: Tries to avoid the intrusion detection 

Masquerader: Pretends to be a legitimate user

Back

What is logging?

Front

Logging is recording of events or statistics to provide information fo the system use, misuse and performance.

Back
Describe the diagram
Front

Context: This is a client puzzle

What is sent and how is it generated?

X[j](k+1,L) is sent to the client. This is generated by taking a sub-puzzle and taking k bit as the solution of the puzzle 

What should the client respond with?

The client should respond with x[j](1,k) to be joined with x[j](k+1,L) to get y[j]. 

What is the role of k?

𝑘 is the number of bits that are missing from the puzzle

How much work would we expected the client to do? 

The client is expected to do minimal work so that the authentication can be fast.

Is this process stateless?

Yes, the puzzle stores no information. The solution itself contains all the information the server needs other than their own server secret

Back

What is sanitization?

Front

It is the context of logs involving removal of information from the log that the user should not be able to see to provide confidentiality of the log.

Back

What are the three distinct types of attacks against password systems.

Front
  1. dictionary attack - uses dictionary of all known words to try to find the password
  2. brute-force attack is trying all possible combinations of the password until it is correct
  3. hybrid attack is both brute force and dictionary attack.
Back

Why is the use of external variables in languages such as PHP or Bash is dangerous?

Front

They register all kinds of external variables in the global namespace, hence the is no way to ensure that those external variables contain authentic data.

Back

Name and describe two methods of providing protection against inferential attacks.

Front

Design a database in such a way that inferences is reduced

Attempt to reject specific queries which may lead to inference attack

Back

What is considered to be a honeytoken?

Front

A honey token is a non-computer honeypot. Fake data in database, where is it similar to the real data to encourage the attacker to be in the system long enough to respond to the attack

Back

Aggregate functions

Front

provide aggregate data which is likely to be less sensitive than individual values

Back

What does anomaly modelling look for and how do we measure this?

Front

Anomaly modelling looks for an abnormal event that has exceeded the predefined threshold. In an IDS, there is a counter which is twice the sum of the weight of all the event for a day

Back

Why is a master password typically used?

Front

To protect sensitive information such as other passwords and certificates

Back

Two types of disclosure

Front

Disclosure of exact data. Person A is 25 years old

Disclosure of bound. Person A is younger than 30 years old

Back

Name and describe two of the ACIDity properties

Front

ACIDity properties refers to the atomicity, consistency, isolation and durability of database transaction properties. Two ACID properties are consistency and durability. A consistent database transaction can be thought of as not violating any integrity constraints during its execution. Durability is the property guaranteeing that transactions that have been committed will survive permanently

Back

How does SQL rand protect database against SQL injection?

Front

By adding a random key to SQL keywords. However, before it is sent to the database, the random keys are removed.

Back

How does Trojan horses have overt and covert behaviours? 

Front

overt behaviours are documented effects (DOS)
covert behaviours are non-documented effects (backdoor)

Back

Two primary properties used in malware classification are

Front

Based first on how it spreads to reach their desired targets.

Then on the actions or payloads it performs once a target is reached.

Back

What is DNS-based phishing? 

Front

It is poisoning of hosts file or polluting the user's DNS cache with wrong information resulting in corrupted DNS

Back

Why is random seeding a password generator with time alone a bad idea?

Front

If an attacker knows the time, the attacker can use the same time as the seed to the random generator to regenerate the same sequence of password

Back

3 Factors of Authentication

Front

Something you know (password)
Something you have (Keycard)
Something you are (Fingerprint)

Back

What differs between Oligomorphic, polymorphic and metamorphic viruses?

Front

Oligomorphic changes the decryption of the algorithm between generations

Polymorphic viruses change form each time they are inserted in another program

Metamorphic viruses change form AND complete rewrites itself

Back

What are two things that packet filtering firewalls filter?

Front

Collection of rules and default security policy

Back

Why is a minimum time between password specified?

Front

So users are able to change the passwords and to make sure that the passwords are secured from attacker who may be trying to hack their passwords 

Back

How do you provide protection against inference attack?

Front

Data perturbation which can be used in statistical database to change values in the database such that the statistical information is accurate, but inferential data is inaccurate.

Back

An advantage of stateless puzzles over stateful puzzle is

Front

The answer to stateless puzzle is nothing

Back

Describe how virus and worm propagation differs

Front

Virus propagates on the manual transfer of virus infected files while worm propagates using network connection

Back

How does one-time password system of lamport work?

Front

Consist of two parts: 
Set up - A user selects a password that is secret.

            - The system will use this password together with some value and generate a sequence of passwords

Process - User request for a connection to server

               - User will enter with one-time password

               - If password matches, server will update the password with the next one-time password until it n reaches 0 in which a new set up will begin

Back

What is the relevance of the principle of least privilege in the context of buffer overflows?

Front

To limit the access an attacker can have so even if he finds a way through. 

Back

What is auditing?

Front

It is the analysis of the log events provided by logging and to provide the information of the system in a more readable and understandable manner. 

Back

What the two primary bases for intrusion detection agents?

Front

Host based and Network base

Back

3 types of malware

Front

Viruses 
Trojan horses
Worms

Back

What does PAT (Port address translation) hide?

Front

It hides internal network addresses (TCP/IP) from outside world by mapping the external addresses to multiple internal addresses.

Back

How does CAPTCHA can be used as protection against DOS attacks?

Front

bot (zombies) or automated system cannot read distorted image and hence this can be used to differentiate between a human (person) accessing system and a zombie accessing a system

Back

What are race conditions?

Front

It is a situation in which two or more threads or processes are reading or writing some shared data, and the final result depends on the timing of how the threads are scheduled.

Back

Why is treating programs as data until verified considered as providing protection against malware attack?

Front

If a program is treated as data, it would not be executed and the virus will not take effect

Back

What cant a firewall protect against?
 

 

Front

Internal attackers or services that by-pass the firewall 

Back

What is inference?

Front

Sensitive information from non-sensitive, typically aggregate data

Back

What is XSS?

Front

It stands for cross site scripting. A type of injection attack where an attacker can use to send a malicious script to an unsuspecting user.
It exploits vulnerabilities of web pages as it involves the use of those vulnerabilities to gather data from a user that should not be gathered

Back

What does it mean to be stateless?

Front

A server has not committed any resources and is relevant in context of client puzzle connection protocol

Back

What does pseudonumising santizer remove?

Front

it removes information from the log such that the originator of the log can reconstruct the deleted information but preserves information and the relationship relevant for the analysis

Back

How does stateful inspection firewall differ from the traditional packet filters?

Front

Stateful inspection allows more dynamic structure such as authentication before an "allow" entry for a particular connection while traditional packet only deal with individual packets

Back

A master password is typically used to

Front

protect sensitive information such as other passwords and certificates

Back

Why is C library functionstrcpy() considered unsafe?

Front

It does not check for array boundary which may result in buffer overflow

 

Back

What is a true positive?

Front

It refers to a situation when we make a match but which is actually not

Back

What does BLP attempt to control? And its policy

Front

BLP attempts to control the confidentiality of the data. It is no read up, no write down. Permission can be passed from an authorized person to another.

Back

What is the difference between persistent and non-persistent XSS? 

Front

Persistent XSS data provided by Web Client is stored on the server whereas non-persistent the data is used immediately without proper sanitisation

Back

The purpose of sanitization

Front

remove any information for which there is a user who is not allowed to see that information

Back

Name and describe the two type of error rates that occur in authentication systems, and in intrusion detection systems.

Front

False positive and false negative

false negative is rejecting a valid person and false positive is accepting a illegitimate person

In IDS, False negative is false rejecting that the attack has not taken place when in fact an attack has taken place and false positive is falsely informing that there is an attack when no attack has taken place.

Back

What is the purpose of IDIP?

Front

IDIP an abbreviation for Intrusion detection and isolation protocol. Its purpose is to stop an attack by blocking the connection between the source of an attack and the target of the attack. It works by detecting an attack and blocking the connection to the target from the source and inform the previous node about the attack which then blocks the connection and inform its previous node until which the connection is blocked from the source to the target

Back

The two primary aims of digital forensics

Front

Gather evidence from computer devices to investigate a crime
Recover lost data

Back

What is the purpose of a role in a database system?

Front

The purpose is to organize the granting of privileges base on least (minimal) required privileges by job scope or functional activities

Back

Two applications of reverse engineering

Front

Malware and digital rights management

Back

What are the three basic components in an access control triplet?

Front

The three basic components are S, O, A

S: Set of subjects

O: set of Objects

A: an access control matrix with entries of S, O

Back

What is the difference between logging and auditing? 

Front

Logging is the recording of events or statistics to provide information about the system use, misuse and performance. Auditing is analysis of log records obtained by logging and present information about the system in a clear and understandable manner

Back

What is false acceptance rate?

Front

It is the proportion of authentication attempts resulting in false acceptance/

Back

The two primary bases for intrusion detection agents

Front

Host based Network base 

Back

What is the chinese wall model designed to handle?

Front

Conflict of interest, a concept that is used to control access to objects that might conflict the interest of the subject. 

Back

How does online and offline differ?

Front

Online requires the connection to be active while offline does not which gives unlimited chances to break the password. Online might have restrictions before the account is locked.

Back

One advantage of using roles in database 

Front

To organize the granting of privileges base on least required privileges by job scope or functional activities

Back

What typical phishing?

Front

It deceives the user into believing that there are issues with his account and enter his account details to fix the issue but it is actually stored by the attacker

Back

An example of role-base access control

Front

Protection rings

Back