Computer Security ch1 - ch3 Solutions
Computer Security ch1 - ch3 Solutions
1.2 What is the difference between passive and active security threats?
Passive attacks have to do with eavesdropping on, or monitoring,
transmissions. Electronic mail, file transfers, and client/server
exchanges are examples of transmissions that can be monitored.
Active attacks include the modification of transmitted data and
attempts to gain unauthorized access to computer systems
1.3 List and briefly define categories of passive and active network security attacks.
1.5 List and briefly define the fundamental security design principles
Authentication: The assurance that the communicating entity is the one that it
claims to be.
Access control: The prevention of unauthorized use of a resource (i.e., this service
controls who can have access to a resource, under what conditions access can
occur, and what those accessing the resource are allowed to do).
Data confidentiality: The protection of data from unauthorized disclosure.
Data integrity: The assurance that data received are exactly as sent by an
authorized entity (i.e., contain no modification, insertion, deletion, or replay).
Nonrepudiation: Provides protection against denial by one of the entities involved in
a communication of having participated in all or part of the communication.
Availability service: The property of a system or a system resource being accessible
and usable upon demand by an authorized system entity, according to
performance specifications for the system (i.e., a system is available if it provides
services according to the system design whenever users request them).
1.6 Explain the difference between an attack surface and an attack tree.
Attack Surface - Consists of the reachable and exploitable vulnerabilities in a system.
Attack Tree - is a branching, hierarchical data structure that represents a set of
potential techniques for exploiting security vulnerabilities
1
Chapter 3
3.1 In general terms, what are four means of authenticating a user’s identity?
Something the individual knows: Examples includes a password, a personal
identification number (PIN), or answers to a prearranged set of questions.
Something the individual possesses: Examples include electronic keycards, smart
cards, and physical keys. This type of authenticator is referred to as a token.
Something the individual is (static biometrics): Examples include recognition by
fingerprint, retina, and face.
Something the individual does (dynamic biometrics): Examples include recognition
by voice pattern, handwriting characteristics, and typing rhythm.
3.2 List and briefly describe the principal threats to the secrecy of passwords.
We can identify the following attack strategies and
countermeasures:
Offline dictionary attack: Typically, strong access controls are used to
protect the system's password file. However, experience shows that
determined hackers can frequently bypass such controls and gain
access
to the file. The attacker obtains the system password file and
compares
the password hashes against hashes of commonly used passwords.
If a
match is found, the attacker can gain access by that ID/password
combination.
Specific account attack: The attacker targets a specific account and
submits password guesses until the correct password is discovered.
Popular password attack: A variation of the preceding attack is to use
a popular password and try it against a wide range of user IDs. A
user's
tendency is to choose a password that is easily remembered; this
unfortunately makes the password easy to guess.
Password guessing against single user: The attacker attempts to
gain knowledge about the account holder and system password
policies
and uses that knowledge to guess the password.
Workstation hijacking: The attacker waits until a logged-in
workstation is unattended.
Exploiting user mistakes: If the system assigns a password, then the
user is more likely to write it down because it is difficult to
remember.
This situation creates the potential for an adversary to read the
written
password. A user may intentionally share a password, to enable a
colleague to share files, for example. Also, attackers are frequently
2
3.3What are two common techniques used to protect a password file
One technique is to restrict access to the password file using standard access
control measures.
Another technique is to force users to select passwords that are difficult to
guess.
3.4List and briefly describe four common techniques for selecting or assigning passwords.
User education: Users can be told the importance of using hard-to-guess passwords and
can be provided with guidelines for selecting strong passwords.
Reactive password checking: the system periodically runs its own password cracker to
find guessable passwords.
Proactive password checking: a user is allowed to select his or her own password.
However, at the time of selection, the system checks to see if the password is allowable
and, if not, rejects it.
3.5Explain the difference between a simple memory card and a smart card.
Memory cards can store but not process data.
Smart cards have a microprocessor.
3.6List and briefly describe the principal physical characteristics used for biometric
identification.
Facial characteristics: Facial characteristics are the most common
means of human- to-human identification; thus it is natural to consider
them for identification by computer. The most common approach is to
define characteristics based on relative location and shape of key facial
features, such as eyes, eyebrows, nose, lips, and chin shape. An
alternative approach is to use an infrared camera to produce a face
thermogram that correlates with the underlying vascular system in the
human face.
• Fingerprints: Fingerprints have been used as a means of identification
for centuries, and the process has been systematized and automated
particularly for law enforcement purposes. A fingerprint is the pattern of
ridges and furrows on the surface of the fingertip. Fingerprints are
believed to be unique across the entire human population. In practice,
automated fingerprint recognition and matching system extract a number
of features from the fingerprint for storage as a numerical surrogate for
the full fingerprint pattern.
• Hand geometry: Hand geometry systems identify features of the hand,
including shape, and lengths and widths of fingers.
3
• Retinal pattern: The pattern formed by veins beneath the retinal
surface is unique and therefore suitable for identification. A retinal
biometric system obtains a digital image of the retinal pattern by
projecting a low-intensity beam of visual or infrared light into the eye.
• Iris: Another unique physical characteristic is the detailed structure of
the iris.
• Signature: Each individual has a unique style of handwriting and this is
reflected especially in the signature, which is typically a frequently
written sequence. However, multiple signature samples from a single
individual will not be identical. This complicates the task of developing a
computer representation of the signature that can be matched to future
samples.
• Voice: Whereas the signature style of an individual reflects not only the
unique physical attributes of the writer but also the writing habit that has
developed, voice patterns are more closely tied to the physical and
anatomical character is tics of the speaker. Nevertheless, there is still a
variation from sample to sample over time from the same speaker,
complicating the biometric recognition task.
3.7In the context of biometric user authentication, explain the terms, enrollment,
verification, and identification.
Enrollment
For a biometric system, the user presents a name and, typically, some
type of password or PIN to the system. At the same time the system
senses some biometric characteristic of this user
Verification
Verification is analogous to a user logging on to a system by using a memory
card or smart card coupled with a password or PIN. For biometric verification,
the user enters a PIN and also uses a biometric sensor.
Identification
For an identification system, the individual uses the biometric sensor but
presents no additional information. The system then compares the presented
template with the set of stored templates. If there is a match, then this user is
identified. Otherwise, the user is rejected.
Figure 3.8 illustrates the operation of a biometric system
3.8Define the terms false match rate and false nonmatch rate, and explain the use
of a threshold in relationship to these two rates.
The false match rate is the frequency with which biometric samples from
different sources are erroneously assessed to be from the same source.
The false nonmatch rate is the frequency with which samples from the same
source are erroneously assessed to be from different sources.
4
3.9Describe the general concept of a challenge-response protocol
Problems
Explain the suitability or unsuitability of the following passwords:
a) YK 334 – too short of a password, might be a license plate number (easy to get)
c) Natalie1 – too easily guessed – shouldn’t use common names for passwords
5
Chapter 8
8.2.List and briefly describe the steps typically used by intruders when attacking a system.
a. Target Acquisition and Information Gathering : Where the attacker identifies and
characterizes the target systems using publicly available information, both technical
and non- technical, and the use network exploration tools to map target resources.
b. Initial Access : The initial access to a target system, typically by exploiting a remote
network vulnerability, by guessing weak authentication credentials used in a remote
service, or via the installation of malware on the system using some form of social
engineering or drive-by- download attack.
c. Privilege Escalation: Actions taken on the system, typically via local access
vulnerability, to increase the privileges available to the attacker to enable their desired
goals on the target system.
d. Information Gathering or System Exploit : Actions by the attacker to access or
modify information or resources on the system, or to navigate to another target system.
e. Maintaining Access: Actions such as the installation of backdoors or other malicious
software, or through the addition of covert authentication credentials or other
configuration changes to the system, to enable continued access by the attacker after
the initial attack.
f. Covering Tracks : Where the attacker disables or edits audit logs, to remove evidence
of attack activity, and uses rootkits and other measures to hide covertly installed files
or code.
6
8.4 Describe the three logical components of IDS (Intrusion Detection System).
Host-based IDS: Monitors the characteristics of a single host and the events
occurring within that host for suspicious activity.
Network-based IDS: Monitors network traffic for particular network segments
or devices and analyzes network, transport, and application protocols to identify
suspicious activity.
Distributed or hybrid IDS: Combines information from a number of sensors,
often both host and network-based, in a central analyzer that is able to better
identify and respond to intrusion activity.What are three benefits that can be
provided by an IDS.
7
8.7 What is the difference between a false positive and a false negative in the context of
an IDS?
A false positive, or false alarm, is where authorized users are identified as intruders
by an IDS.
A false negative is when intruders are not identified as intruders by an IDS, as a
result of a tighter interpretation of intruder behavior in an attempt to limit false
positives.
8.10 What is the difference between anomaly detection and signature or heuristic
intrusion detection?
Anomaly detection: Involves the collection of data relating to the behavior of
legitimate users over a period of time. Then statistical tests are applied to
observed behavior to determine with a high level of confidence whether that
behavior is not legitimate user behavior (Threshold detection, profile based).
Signature detection: Involves an attempt to define a set of rules or attack
patterns that can be used to decide that a given behavior is that of an intruder.
8.11 List and briefly define the three broad categories of classification approaches
used by anomaly detection systems.
1. Statistical: Analysis of the observed behavior using univariate, multivariate, or time-
series models of observed metrics.
2. Knowledge based: Approaches use an expert system that classifies observed behavior
according to a set of rules that model legitimate behavior.
3. Machine-learning: Approaches automatically determine a suitable classification model
from the training data using data mining techniques.