Final Exam
Unit 1
  - information sec CIA triangle
    
      - confidentiality
        
          - more confidentiality, more control
 
          - more confidentiality, less access
 
        
       
      - integrity
        
          - data degradation types:
            
              - invalid
 
              - redundant
 
              - inconsistent
 
              - anomalous
 
              - read inconsistency
 
              - nonconcurrency
 
            
           
        
       
      - availability
 
    
   
  - risk: threat, vulnerability, impact
 
  - lifecycle:
    
      - design
 
      - implement
 
      - check
 
      - maintain
 
    
   
  - default security: full mediation
 
  - design principles
    
      - simplicity > complexity
 
      - default = block
 
      - all access must be filtered
 
      - transparent sec against dark sec
 
      - segregation of duties
 
      - minimum priviledge
 
      - minimum common mechanisms
 
      - user acceptability
 
      - working factor
 
      - event log
 
    
   
Unit 2: Malware
  - types
    
      - worm
        
          - autonomous
 
          - replicates & spreads
 
        
       
      - virus
        
          - programs contained in others
 
          - phases:
            
              - propagation
 
              - latency
 
              - activation
 
              - damage
 
            
           
          - types:
            
              - metamorphic: change every iteration
 
              - polymorphic: change only parts to prevent detection
 
            
           
        
       
      - trojan horse
 
      - logic bomb
        
      
 
      - backdoor
        
      
 
    
   
  - taxonomy
    
      - only worms are autonomous
 
      - only worms and viruses are self reproducing
 
    
   
  - APT: advanced persistent threat
    
      - malware designed to stay undetected
 
      - detection:
        
          - large # of reqs from same IP
 
          - transmission of large amounts of data
 
          - 3rd party warnings
 
        
       
      - ex:
        
      
 
    
   
Unit 3: Access Control Systems
  - representation
    
      - ACL / matrix
        
          - regular: object -> users
 
          - habilitation: user -> objects
 
          - auth relations: tuples of (S, O, rights)
 
        
       
    
   
  - DAC
    
  
 
  - multilevel security:
    
      - BLP (bell lapadula)
        
          - data confidentiality
 
          - rules
            
              - read all under
 
              - if can read 1 and write 2, l(1) <= l(2) (* property)
                
              
 
              - no change in levels
 
            
           
        
       
      - BIBA
        
          - data integrity
 
          - rules
            
              - cannot read from a lower level
 
              - if can read 1 and write 2, l(1) >= l(2) (* property)
                
              
 
              - no change
 
            
           
        
       
      - Clark Wilson
        
      
 
      - problems:
        
          - expensive
 
          - complex administration & conversion of current system
 
          - prevents unauth’d but also auth’d
 
        
       
    
   
  - multilateral:
    
      - chinese wall
        
          - grants if:
            
              - p in set of company already with access
 
              - p does not belong to conflict of interest
 
            
           
          - s can write o if never read o’ (CoI) (* property)
 
        
       
    
   
  - multilevel & multilateral
    
      - classification level
        
          - o: (compartment, confidentiality)
 
          - s: (compartment, habilitation)
 
        
       
      - o_i <= s_i
 
    
   
Unit 4: Distributed Systems Protocol
  - threats
    
      - passive
        
          - interception
 
          - war driving
 
          - port scan
 
        
       
      - active
        
          - interruption
            
          
 
          - modification
            
              - ip spoof
 
              - pharming
 
              - dns identity theft
 
            
           
          - generation
            
          
 
        
       
    
   
Unit 4: SSL/TLS
  - SSL protocols
    
      - handshake
 
      - change cipher spec
 
      - alert / warning
 
      - record
 
    
   
  - security services
    
      - confidentiality
        
      
 
      - integrity
        
      
 
      - auth
        
          - one way funcs
 
          - question answer
 
          - e-sign
 
        
       
      - access control
 
      - non-repudiation
 
    
   
Unit 4: Kerberos
  - centralized auth server
 
  - symmetric encryption (DES)
 
  - uses propogating cipher block chain

 
Unit 4: IPSec
  - security issues in IP
    
      - networks are not secure since all users were originally known
 
    
   
  - IPSec: standard for network layer security
    
      - auth protocol (AH auth header)
 
      - encryp / auth protocol (ESP encapsulated security protocol)
 
    
   
  - mandatory for IPv6