Is Exam
Is Exam
User authentication is the process of verifying the identity of a user, typically through a combination
of credentials, such as a username and password.
Password Authentication
1. Definition: A secret word or phrase used to authenticate a user.
3. Password Managers: Use a secure password manager to generate and store unique passwords.
1. Definition: A hashed password is a password that has been transformed into a fixed-length string
of characters using a one-way mathematical algorithm.
2. Advantages: Hashed passwords are more secure than plaintext passwords because they are more
resistant to unauthorized access.
3. How it Works: When a user creates a password, the password is hashed and stored in a database.
When the user attempts to log in, the entered password is hashed and compared to the stored hash.
If the two hashes match, the user is authenticated.
3. Argon2
Chapter 4:
Access Control
Access control is a security mechanism that regulates and manages access to resources, such as
computer systems, networks, and data.
Principle
The principle of access control is to grant access to resources based on user identity, group
membership, and permissions.
Policy
The policy of access control outlines the rules and guidelines for granting access to resources. It
defines who can access what resources, under what conditions.
Requirement
2. Access control lists: Maintaining a list of who can access what resources.
Element
Discretionary
Discretionary access control means that the resource owner has the authority to decide who can
access their resources.
Structure
Model
The model of access control is a framework that outlines how access control decisions are made.
Command
Function
The function of access control is to regulate and manage access to resources based on user identity,
group membership, and permissions.
Chapter 5
Database System
A database system is a software system that allows you to store, manage, and retrieve data in a
structured and controlled manner.
Database
A database is a collection of organized data that is stored in a way that allows for efficient retrieval
and manipulation.
Database Security
Database security refers to the practices and measures taken to protect a database from
unauthorized access, use, disclosure, disruption, modification, or destruction.
Relational Database
A relational database is a type of database that organizes data into tables with well-defined
relationships between them.
SQL Injection
SQL Attacks
Types of attacks that target databases, including SQL injection, cross-site scripting (XSS), and cross-
site request forgery (CSRF).
An attacker injects malicious SQL code into a login form to bypass authentication.
In-Band Attacks
Attacks that use the same communication channel as the legitimate traffic.
Controlling access to the database based on user identity, group membership, and permissions.
Inferential Attack
Out-of-Band Attack
Attacks that use a different communication channel than the legitimate traffic.
SQLi Countermeasure
1. Input validation
2. Parameterized queries
Cascading Authorizations
Inference Example
Countermeasure
1. Data anonymization
2. Data aggregation