DaNS - Final Summary
DaNS - Final Summary
DaNS - Final Summary
Final Summary
1- Client & Server =>
Client Server
an entity that consists of an operating a passive machine (only responds to
system and a collection of programs to inquiries or requests from clients)
perform a set of function which provides one or more services
that may range from minimal server-
based computing.
3- Token Cards => user is given a token card that shares a secret key with the
system. This key is called the shared secret key. card displays a number that
changes over time and uses the shared secret key.
The user authentication is achieved as follows:
1- user provides the system with the ID and with number displayed by token card.
2- system computes a number using the received ID & share secret key.
3- If the number calculated by the system matches that entered by the user, then
the user is accepted as the legitimate user and the authentication process is
completed.
4- Characteristics of user authentication =>
physiological characteristics behavioral characteristics
include fingerprints, handprints and such as vocal patterns, signature, and
retinal patterns. keystroke typing patterns
CH3
1- Audit Trail => There are keeps a record of several significant events that
should be recorded for potential review at a later time
Audit Requirements :
1. Automatically collects information on all the security – sensitive activities.
2. Stores the information using a standard record format.
3. Creates and saves the audit records automatically without requiring any
action by the administrator.
4. Protects the audit records log under some security scheme.
5. Minimally affects the normal computer system operation and performance.
2- Intrusion Detection => The process of detecting and identifying
unauthorized or unusual activity on the system. By using the audit records, the
intrusion detection system should identify any undesirable activity.
3- Profiles =>
Profiles characterize the behavior of a subject (or a group of subjects) on an
object (or a group of objects).
Profiles include the description of normal behavior of subjects with respect
to the objects. So profiles can be detect any abnormal activity as recorded
in the audit records.
4- Anomaly Records => An anomaly record is created when the audit records
show some abnormal behavior compared to that in the profiles.
5- Viruses => The scientifically definition for viruses is self-reproducing
automation which have the ability gain control of the computer. When it is
executed, a virus makes one or more copies of itself, Virus is not an independent
program but it executed when its home program executed.
Bacteria => Bacteria are programs that duplicate themselves. While these
programs don’t directly attack any software, they consume resources simply by
replicating themselves.
Worms => is an independent program that can replicate itself and often spreads
to different sites over a network. Since it is an independent program, it does not
need another program to spread itself.
Trapdoors => is an undocumented entry point into software that surrounds the
normal system protection. Trapdoors have been used legitimately by
programmers to test, debug, and sometimes even fix programs. trapdoors are
used during software development.
Logic Bombs => is a fragment of software that is set to inflict damage when a
certain set of conditions exist. A logic bomb needs a host software program to
carry the bomb.
Trojan Horses => is a piece of code that hides inside a program and performs a
disguised function. This piece of code does not exist independently and needs to
be planted in another program for disguise
CH4
1- Encryption => is the process of transforming data into an indistinct from in
such a way that the original data can be obtained only by using the decryption
process and the encryption key.
Original data is called clear-text or plaintext,
Encrypted data is called cipher-text, code-text, or cipher
1. Transposition => A given text can be transposed in several ways.
Consider the word PRIVATE. This word can be transposed to VRIPTEA ,
In order to decrypt this word, the recipient will attempt different positions of
the letters until an unclear word is found.
2. Substitution => A given text can also be encrypted by substituting each
letter with another letter. A common approach for substitution is to replace
letters by other letters in the alphabet.
2- Data Integrity => allows detection of unauthorized modification of data.
A network security scheme must provide the services to protect information
against the threat of unauthorized modifications.
3- Data Integrity VS Data confidentiality =>
Data integrity Data confidentiality
Requires that no unauthorized user Implies that confidential data is not
can modify the data viewed by an unauthorized user.
CH7
1- Firewall => protect private networks from intrusion, and other attacks from
the Internet, a firewall is required and it should intercept all the traffic between a
given private network and the Internet.
Depending on the configuration, the firewall determines whether the request should be
pass through the firewall or be denied.
2- Area of risks for the network =>
1. Information: Someone can steal or destroy the information that is stored on the
private network.
2. Resources: Someone can damage or misuse the computer systems on the
private network.
3. Reputation: Someone can damage the reputation of a business by
demonstrating Vulnerabilities in its network security.
3- Component of Firewall =>
1. Secure operating system : can protect the firewall code and files from attacks
by hackers.
2. Filters : executes a set of rules that have been defined by administrator at
configuration time.
3. Gateways : intercepts the traffic and authenticates users at the TCP/IP
application level. The application gateway function is often provided by
implementing a proxy server.
4. Proxy : authenticates each user, both from inside the private network and from
the Internet.
5. SOCKS : provide gateway support through the firewall, require modifications to
the client software, but no change is required to the user procedures.
6. Domain name service: isolates the name service of the private network from
that of the Internet.
7. Mail handling : capability ensures that any E-mail exchange between the private
network and the Internet is processed through the firewall.
.1أول مسألة عن ال one way hash functionوال requirementsبتاعتها (هيقولك ايه تعريفها
لو قالك 4x5يعين 4صفوف و 5عمود عشان لو عملت عكس كدا هتاخد 0
.3تالت مسألة عن ال ( access controlتعريفه وباقي الحاجات المرتبطة بيه) وبعدها المسألة