Final Vocabs NEW

Stateless

Does not keep information between connection like http

Dot dot URL traversal

Exit out of current directory and access other files

nmap

Scanning tool to find open ports

Web defacement

Destroying the look of a website

Page-in-the-middle

User is redirected to a fake page (phishing)

User-in-the-middle

Attacker hides behind the user to avoid detection like tricking into solving CAPTCHA

Server side request forgery (SSRF)

Make the server send request to other server (unwanted)

Cross-site request forgery (CSRF, XSRF)

Make the user send request to other server (unwanted)

Smurf attack

Broadcast ping to all IP in the network (spoofed source IP) to make all IP reply to the victim

SYN flood

Send SYN packet to the victim and never send ACK to complete the handshake (spoofed source IP)

Land attack

Send SYN packet with the same source and destination IP

Teardrop attack

Send fragmented packets with overlapped offset cause server to crash when it tries to reassemble

Reflection attack

Send request to a server and make it reply to the victim

Echo Chargen loop (Reflection attack)

HDP Port 7: When received packaet, then send back to the source
UDP Port 19: When received packet, then send random string of characters
Result in infinite loop

DNS Amplification Attack

Query DNS request with spoofed source IP address being the target (Ask for xxx.com please reply to the victim)

Misfeasor

Insider who misuses authorized access

IDS Analysis Approaches

- Anomaly detection: Compare with normal behavior
- Signature or Heuristic detection: Compare with known attack patterns

Distributed Intrusion Detection System

- Host agent module: Monitor the host and report to central manager
- LAN monitor agent module: Monitor the LAN traffic and report to central manager
- Central manager: Collect and analyze the data from host agent and LAN monitor agent

Host Audit Record (HAR)

An event reported by a host monitoring agent

Network-Based IDS

Monitor traffic at selected points on a network

Intrusion Detecion Exchange Format

Key elements of any IDS
- Data source: Raw data
- Sensor: Collect data from the data source & forwards to the analyzer
- Analyzer: Analyze the data for unauthorized/unwanted activities
- Administrator: Human who setting security policy
- Manager: Human who manage the components of IDS
- Operator: Human who operate the system

SNORT

A popular open-source light weight IDS, including 4 components
- Packet decoder: Decode the packet
- Detection engine: Compare the packet with the rule
- Logger: Log the packet if it matches the rule
- Alert: Alert to a file, a UNIX socket, or a database

Firewall outcomes

- Accepted: Allow the packet to pass
- Dropped: Drop the packet with no indication of failure
- Rejected: Drop the packet and let the sender know the packet was rejected

Firewall general techniques

- Service control: Filter traffic based on the service
- Direction control: Filter traffic based on the direction
- User control: Filter traffic based on the user who attempt to access it
- Behavior control: Filter traffic based on the behavior of the traffic

Types of firewall rules

- A Positive filter: Allow only packets that pass the rules
- A Negative filter: Block packets that pass the rules

Circuit-Level Gateway

Filter traffic based on the TCP connection

Bastion Hosts

- Host application/circuit-level gateway
- Critical strongpoint in network

Demilitarized Zone (DMZ)

A area between the internal network and the external network like Web server, Mail server, Proxy server

Screened Host Architecture (Firewall Architecture)

A screening router with a bastion host

Firewall Architecture

Multi Layer Architecture (Firewall Architecture)

- Perimeter network
- Bastion host
- Interior router: Protect from internet and from bastion host
- Exterior router: Connect to the internet

Firewall Architecture

Honeypots

A decoy systems included with monitoring and logging tools

IPSec encryption mode

- Transport mode: Only encrypt the payload
- Tunnel mode: Encrypt the entire packet

Unified Threat Management Products (UTM)

A single security product that contains multiple security features

IOT Architecture

- Perception layer: Collect data (Sensor, Transmitter)
- Network layer: Transfer data
- Application layer: Allows user interaction

Z-Wave

Create a mesh network based on low power RF

Zigbee

Create a mesh network based on 2.4 GHz

Message Queuing Telemetry Transport (MQTT)

A lightweight publish-subscribe messaging protocol

Node Capture (Tampering)

Attacker takes control of sensor node

Active Attack IOT Security

Collision Attack

Attacker sends a lot of packets to the network to make the network busy

Active Attack IOT Security

Sybil Attack

A single node pretends to be multiple nodes

Active Attack IOT Security

De-Synchronization Attack

Disrupt connection between two nodes

Active Attack IOT Security

Deployment Models

- Public cloud: Cloud service provider has full ownership
- Private cloud: Internal usage
- Community cloud: Shared by several organizations
- Hybrid cloud: Combines two or more deployment models
- Multi-cloud: Use multiple cloud providers

Service Models

- Software as a Service (SaaS): On-demand software
- Platform as a Service (PaaS): Application development environment including OS, Compiler, Database, Web server
- Infrastructure as a Service (IaaS): Assigned with virtual machines (VMs)

Multi-tenancy

A single instance of software serves multiple customers

Access Control in Cloud

- Role-based multi-tenancy access control: Assign role to user
- Access policies based on data attributes
- Physical measures: Hardware token

Security Plan

A document that describes how an organization will address its security needs
- Policy, Current state, Requirements, Recommended controls, Accountability, Timetable, Continuing attention

Business Continuity Plan (BCP)

Document how a business will continue to function during a computer security incident: Assess business impact -> Develop a strategy to control impact -> Develop and implement a plan
- Catastrophic situation: All or major part is destroyed
- Long duration

Incident Response Plan

How to deal with a security incident

Delphi Approach

Assumes that experts make informed guesses based on their experience

Vulnerability Assessment (VA)

Systematic method to find the security weaknesses
- Defining, Identifying, Classifying, Prioritizing

Penetration Testing (PT)

Attempts to actively exploit weaknesses in a system
- White box: Full knowledge of the system
- Gray box: Partial knowledge of the system
- Black box: No knowledge of the system

Off-site & Hot-site

Off-site: A location that is far away from the primary site
Hot-site: A location that is ready to use

Midterm Vocabs

Confidentiality

- Preserving authorized restrictions on information access and disclosure
- Including means for protecting personal privacy and proprietary information (คุมครองข้อมูลส่วนบุคคล)

Lecture 1: Overview CIA Triad Key Security Concepts

Authenticity

- The property of being genuine and being able to be verified and trusted
- ของแท้มั้ย?

Lecture 1: Overview Key Security Concepts

Accountability

- Actions of an entity to be traced uniquely to that entity
- ชี้แจงรายการได้ว่าใครทำอะไร

Lecture 1: Overview Key Security Concepts

Adversary

- An entity that attacks a system.
- คนร้าย

Lecture 1: Overview Security Terminology (RFC 2828)

Passive attack

- Attempts to learn or make use of information from the system but does not affect system resources.
- Eavesdropping: ดักฟัง

Lecture 1: Overview Security Attack

Active attack

- Attempts to alter system resources or affect their operation.
- เช่น การ Masquerade: ปลอมตัวเป็นผู้ใช้ระบบ, Denial of Service

Lecture 1: Overview Security Attack

Replay

- Capture message from one to another and resend it to the receiver later.

Lecture 1: Overview Security Attack Active Attack

Modification of Messages

- Altering the content of messages. before they are delivered to the recipient.

Lecture 1: Overview Security Attack Active Attack

Interruption

- Stop the service. “denial of services”
- Attack on availability

Lecture 1: Overview 4 General Types of Threats

Modification

- Altering the data.
- Attack on integrity

Lecture 1: Overview 4 General Types of Threats

Interception

- Capture the data. “un-authorized access”
- แอบดักฟัง
- Attack on confidentiality

Lecture 1: Overview 4 General Types of Threats

Fabrication

- Create the data.
- ปลอมข้อมูล
- Attack on authenticity

Lecture 1: Overview 4 General Types of Threats

Inference

- An unauthorized entity indirectly accesses sensitive data by reasoning from characteristics or byproducts of communications.
- คาดเดาข้อมูลจากข้อมูลที่มีอยู่

Lecture 1: Overview Threat Consequences

Deception

A threat to either system or data integrity. (การหลอกลวง) เช่น
- Masquerade: ปลอมตัวเป็นผู้ใช้ระบบ
- Falsification: ปลอมข้อมูล
- Repudiation: ปฏิเสธการกระทำ

Lecture 1: Overview Threat Consequences

Disruption

A threat to system availability or system integrity. (การขัดขวาง) เช่น
- Incapacitation: ทำให้ระบบไม่สามารถทำงานได้
- Corruption: ทำให้ข้อมูลเสียหาย (แก้ไข)
- Obstruction: ทำให้ระบบทำงานช้าลง

Lecture 1: Overview Threat Consequences

Usurpation

A threat to system integrity. (การยึดครอง) เช่น
- Misappropriation: เข้าถึงข้อมูลที่ไม่ได้รับอนุญาต
- Misuse: ใช้ข้อมูลที่ไม่ได้รับอนุญาต

Lecture 1: Overview Threat Consequences

Peer Entity Authentication

Provide confidence in the identity of the entities connected

Data-origin Authentication

Provide assurance that the source of received data is as claimed

Access Control

Prevent unauthorized use

Encipherment

Encrypt

Crytology

Study of encryption and decryption

Crytogophy

Hidden writing

Crytanalysis

Break cipher to get plain text

Crytogist

Person to break cipher to plain text

Crypgraher

Work with good guy �

Crytanalyst

Work with bad guy 👎

Subtiution

Map bit, text to another element (confusion)

Traportation

Rerrange (difussion)

Block cipher

Process one block at a time

Stream cipher

Process continuosly

Standard Eletronic Codebook mode (ECB)

Divide and encrypt each indently with same block

Cipher block chaining (CBC)

Encrypt with result of ECB with next block and so on...

Caesar Cipher

Shift alphabet

Monoalphabetic Cipher

Shuffle alphabet

Columnar transportations

Input horizon, reads vertical

Product Cipher

...

Secret key (Symmetric)

1 Key

Public key (Asymmetric)

2 Keys

Digital authentication

Encrypt with private, decrypt with public => can be sure sender is legit

Public-key encryption

Encrypt with public, decrypt with private => other cannot read

Secure authtication message

Encrypt with reader's public => encrypt with sender's private => decrypt with sender's public => decrypt with reader's private

Message authentication

Message with hash (can encrypt), can verifies received message is authentic

Man-in-the-middle (MITM)

Steal key during Key exchange/distribute

Key management

Problems:
- Key generation
- Key storing
- Key distribution
- Require trusted intermediary (คนไว้วางใจได้) เช่น Key distribution center (KDC) (Symmetric key), Certification Authority (CA) (Confirm public key is really belong to the owner)

Digital Signature

Message =Hash=> Encryption hash with private key and store the signature with file, so reader can decrypt with public key and compare the hash

Program fragment

A malware that require host program (ไปเกาะไฟล์/โปรแกรม)

Independent self-contained programs

Can be scheduled and run by the OS

Worm

Copies of itself

Trojan horse

Program that contain unexpexted addiotional functionality

Mobile code

Script or macro ex. Spreadsheet, Docx, PDF, ไฟล์ที่รัน Macro ได้

Auto-rooter

Tools used to break into new machines remotely

Kit (Virus genrator)

Generate new viruses automatrically

Zero day attack

Active malware **no countermeasure avalible**

Mutipartie virus

Ability of infecting multiple types of files

Blended attack

It uses multipls methods of infection

Virus phases

1. Dormant: waiting on trigger event
2. Propagation: การแพร่กระจาย
3. Triggering: by event to execute payload (ไวรัส)
3. Executeion: the function is performed

Virus components

- Infection mechanism กลไกการติดเชื่อ
- Trigger: event that makes payload activate
- Payload: the actual virus

Polymorphic virus

A virus that mutates with every infection, checking signature is impossible

Metamorphic virus

Virus that change their behavior as well as their appearance

Heuristic Scanning techniques

Search for bit patterns of code fragments, check for unsual actions

Integrity checking

Checksums or hash values (message digests)

Bahavior-blocking software

A sandbox layer that run a suspicous code and flags its before proceeding to users

Worms

Propagates over net
Phases: Dormant, Propagation, Triggering, execution

Proactive worm containment

Detect for surges in the rate of outgoing connection attempets, and block immediataely

Defensive Programming

A form of defensive design to ensure continued function of software despite unforeseen usage

Fuzzing

an automated software teasing by providing invalid, unexpected, or random data as inputs

Shellcode

A small piece of code used as the payload in the exploitation of software vulnerability

Fence

Memory protection, so users cannot cross a specified address

Rainbow table attacks

Precompute tables of hash values for all salts

OpenID Connect

Verify the identity of users based on the authentication performed by an Authorization Server

Relying party (RP)

A website that wants to verify the end-user's identifier

OpenID Provider (OP)

A service that specializes in registering OpenID URLS Ex. Github, Google, Microsoft, ...

Access Control Policies

Embodied in an authorization database, dictates what types of access are permitted, under what circumstances, and by whom.

Discretionary access control (DAC)

Based on identity of the requestor and on access rules (authorizations) stating what requestors are (or are not) allowd to do.

Mandatory access control (MAC)

Based on comparing security labels (which indicate how sentitive or crtical system resources are) with security clearances

Role-based access control (RBAC)

based on the roles that users have within the system and on rules stating what accesses are allowed to users in given roles

Reference Monitor

Access control concept that is referred to as an abstract machine that mediates all accesses to objects

Element Integrity

The value of specific data element is written or changed only by authorized users

Element Accuracy

Checks on the values of elements can help to prevent insetion of improper values

Shadow Fields

Entire attributes or entire records can be duplicated in a DB

Centralized administration

A small number of privileged users may grant and revoke access right

Ownership-based administration

The owner of a table may grant and revoke access rights to the table

Decentralized adminstration

In addition to granting and revoking access rights to a table, the owner of the table may grant and reboke authorization to uther users, allowing them to grant and revoke access rights to the table

Inference

Arises when authorized information enables a user to infer something about information that is not authorized for disclosure

Aggregation

An attacker retrieves many data items of the same type can learn sensitive data by viewing all the responses

Perturbation

Provides answers to all queries, but the answers are approximate

made with ❤️ by @tonkaew131 Cookie policy