Study Guide for Midterm
This is a guide of topics that may be covered in the midterm exam. Note that questions
pertaining to any of these topics may appear on the midterm exam.
- Introduction
- Three basic components
- confidentiality: Concealment of information or resources
- Integrity: Trustworthiness of data or resources. Data integrity and
origin integrity.
- Availability: the ability to use information desired.
- Threats and how to counter them.
- Unauthorized change of information
- snooping
- spoofing
- denial of service
- denial of receipt
- repudiation of origin
- Policy and mechanism
- Policy: What is, and is not allowed defines security
- Mechanisms: enforce policies. can be a method, tool, procedure
- Composition of policies: no conflict
- Goals of security: prevention, detection, recovery
- Assumptions and trust
- Assurance
- Specification: requirements analysis, statement of desired functionality
- Design: How system will meet specification
- Implementation: Systems that carry out design. Formal proof and testing
-
Access Control Matrix
- Protection state
- What is a protection state?
- Access control matrix model
- Object: A protected entity
- Subject: An active entity that carries out operations
- Right: An operation that ....
- What is an access control matrix?
- Implementation: capability, time condition
- Protection state transitions
- Notation
- Primitive commands
- System commands
- conditional commands
-
Foundational Results
-
How to determine if a computer system is secure?
-
Basic results
- Security Policies
- Definitions of security polices
- A security policy is a statement that ...
- A secure system starts in a secure state and can not enter a nonsecure
state
- When does a breach of security occur?
- Three basic properties
- Types of security policies
- Identity-based access control
- Rule-based access control
- Originator controlled access control
- The role of trust
- Three types of access control
- Confidentiality policies
- Goals
- Information flow policy
- Prevent unauthorized disclosure of information
- Transfer of rights, information without transfer right
- Temporal context
- The Bell-LaPadula Model
- It models military requirements
- Description
- Subjects have clearances
- Mandatory access control
- Simple security condition
- Star property
- Define a secure system
- Categories
- Access rules
- Integrity Policies
- Goals
- Separation of duty
- Separation of function
- Auditing
- The Biba Integrity Model
- The Clark-Wilson Integrity Model
- Transactions, data, consistency
- Description
- Integrity constraints
- Procedure
- Certification rules and enforcement rules
- Comparison with other models
- Basic Cryptography
- Definition of cryptosystems
- Plaintexts, keys, ciphertexts, enciphering functions, deciphering
functions
- Classic cryptosystems
- Transposition ciphers
- substitution ciphers
- One-time pad
- Data Encryption Standard (DES)
- Several modes of DES
- Public key cryptography
- Private and public keys
- Three conditions a public key cryptosystem must meet.
-
Key Management
-
Session and interchange keys
-
Key exchange
-
Classical cryptographic key exchange and authentication
-
A trusted third party
-
Authentication
-
Kerberos: ticket granting server,
authentication server
-
Public key cryptographic key exchange and
authentication
-
Cryptographic key infrastructure
-
Certificates signature chains: Bind an
identity to a key
-
X.509: certificate format, certification
validation
-
Storing and revoking keys
-
Key storage: ROM, smart cards etc.
-
Key revocation: when a key is compromised,
binding between a subject and a key has changed