0619215666_237659

advertisement
Errors
1. Page 41 "With the first 23 people you meet, you have a 50% chance and not a 6.3%
chance (23 in 365) that someone has the same birthday as you."
You actually do have a 6% chance of having the same birthday as someone else if you
meet 23 people. The birthday paradox says that if 23 people are put "in a room together"
there is a 50% chance that any 2 of those people will have the same birthday. This is
what gives you the increased probability of combinations. For 10 individuals in a room
together, the probability is 11.7% that at least two of them have the same birthday; for 22
individuals it's 47.6%, while for 23 individuals it's 50.7%. The text should say, "With the
first 23 people you meet IN A GROUP, you have a 50% chance . . ."
2. Page 119 "DNS Zone transfers use TCP port 23."
TCP Port 23 is used by Telnet servers, DNS Servers use TCP port 53 for zone transfers.
3. Page 286 "Asymmetric encryption uses two keys ..... One of the keys known as the
private is used to encrypt, the second key, called the public key decrypts"
This is completely reversed: the public key is known to everyone and the private key is
known only to the recipient of the message. When Bob wants to send a secure message to
Alice, he uses Alice's public key to encrypt the message. Alice then uses her private key
to decrypt it.
4. Page 332 Review Question 3 : A _____ is a shorter version of the message itself that is
created by the contents of the message and the sender’s private key.
The answer in the instructor’s manual is incorrect; it should be "D (digital signature)".
Clarifications
1. Page 37-39 discuss Password guessing. Page 37 states "Password-guessing attacks fall
into 3 categories. Page 39 states "the third type of attack is software exploitation". How
does buffer overflows deal with password attacks?
ANSWER: Software exploitations, particularly buffer overflows, can be used to
generate attacks that are password-related. For example, consider a login program in
which we utilize user-typed passwords and hashes from a password file in two adjacent
arrays. The intent is to authenticate by obtaining the username and then loading the
corresponding hash into the array. We will read the user password into the array, hash it,
and compare it to the contents of hash array. An attacker could generate any 8 character
password and the corresponding hash. When asked for the password, enter the 8character password, then enter 72 characters (filling up the buffer for the cleartext
password) and then type in the corresponding hash, which overwrites the hash stored
from /etc/passwd.
2. Page 310, “Three asymmetric algorithms are commonly used: Rivest Shamir Adleman
(RSA), Diffie-Hellman, and Pretty Good Privacy (PGP).“ While Diffie-Hellman are
known for their key-exchange algorithm, I can not see where they have an asymmetric
algorithm commonly used for actual encryption.
ANSWER: In strict terms, Diffie-Hellman is a key exchange. Yet it’s so closely linked
with SSL, PKI, and SSH it’s usually considered in that same arena as asymmetric
encryption. Some argue that it’s an example of the derivation of the shared secret key
from one party’s public key and another party’s private key. The CompTIA Security+
objectives don’t even mention Diffie-Hellman or key exchange, so without creating an
entire new section for a chapter I included it here.
3. Page 361, "This makes RAID 1 the most efficient of any RAID technology." I thought
RAID 5 was the most efficient.
ANSWER: I should have defined what I meant by "efficient". RAID 1 has a transfer
rate per block that is equal to that of a single disk, and even under some circumstances it
can sustain multiple simultaneous hard drive failures. Plus, it is the simpliest RAID
design. These are "efficiencies" that can be important. However, it does have a high disk
overhead compared to other types of RAID, so in that sense it is not "efficient".
Download