Karlstads universitet HT-08 Datavetenskap Exam for Computer Security DVG C04, 7,5hp, 2009-01-12 kl 8:15 - 13:15 Responsible teachers: Hans Hedbom, Leonardo Martucci and Simone Fischer-Hübner Aids allowed: none. Maximum number of points: 60. For grade 3 30-39 p are required, for grade 4 40-49 p are required and for grade 5 at least 50 p are required. The results are published within 3 weeks after the exam. 1) Introduction (2 pts) a) Name 3 basic security services (0.3 pt) and explain their meaning (0.6 pt). b) Where do threats come from (0.3 pt)? Threats are usually classified in 3 groups; name those groups (0.3 pt). c) What are vulnerabilities? (0.5 pt) 2) Evaluation Criteria (2 pt) Provide 4 different reasons for the need of security evaluation criteria (2.0pt) 3) Message Authentication Code(2 pt) a) MAC is the acronym for Message Authentication Code. What is the purpose of a MAC? (0.5 pt) b) Assuming the following scenario: a message M needs to be sent from A to B. Public keys PA and PB are known by all communicating parties. The message M is to be encrypted with secret key K that is chosen by A. A hash function H is known by both parties. Draw a diagram that illustrates how is the message sent from A to B in a secure way, i.e., that prevents an attacker E to read or modify M. (1.5 pts) 4) Buffer Overflow Attacks (6 pt) a) What is a buffer overflow attack? (0.5 pt) b) What are the 3 main requirements to deploy a buffer overflow attack? (1.5 pts) c) There are 3 possible strategies to deal with buffer overflows: fixing the code, conceding the overflow or using runtime techniques. What type of protection is used when the overflow is conceded? Explain the technique. (1.0 pt) d) What is a “return-to-libc” attack? (1.0 pt) This attack is used to bypass which type of buffer overflow protection? (0.5 pt) e) What type of protection is used against a “return-to-libc attack”? (0.5 pt) Explain how does it work (1.0)? DVGC01 -1- Karlstads universitet HT-08 Datavetenskap Exam for Computer Security DVG C04, 7,5hp, 2009-01-12 kl 8:15 - 13:15 5) Race Condition (2 pt) Explain what a race condition is and why does race conditions happen? (2.0 pts) 6) Pseudo Random Number Generators (2 pt) a) Draw a diagram representing a general PRNG, illustrating the inputs and outputs (i.e. assume that the PRNG algorithm is a block – the internals of this block are not of particular interest for answering this question). (0.5 pt) b) Explain why seeds have to be carefully selected. (0.5 pt). Name 2 possible practical sources for obtaining a good seed? (0.5 pt) c) What type of tests is used to verify if the output of a PRNG is apparently random? (note that you don’t need to name any test suite, but just answer what type of test is used in those suites). (0.5 pt) 7) IEEE 802.11 Network Security (4.5 pt) a) What are the risks in IEEE 802.11 networks? Name 3 sources of those risks. (1 pt) b) The IEEE 802.11 standard defines security mechanisms that are applied which layer (according to the TCP/IP network model)? (0.5 pt) c) The WPA (Wi-Fi Protected Access) specifies 2 authentication modes, the SoHo (small office, home office) mode and the enterprise mode. Explain how does the SoHo mode work? (0.5pt). What are the main the main components used in the enterprise mode (0.5 pt) Explain how does the enterprise mode work (1.0 pt). d) What does the RSNA (Robust Secure Network Association) of the IEEE 802.11 standard define? Name 4 items (1.0 pt) 8) GPG Keys (2 pt* bonus) Have you send an encrypted email to your teacher and published your public key into a repository? Answer yes or no. 9) Operating system security (5pt) a) In Linux PAM might be used in the authentication process. What is PAM? Describe how PAM is structured and explain broadly how it works. (3p) b) Windows uses ACL to handle access control to files while standard Linux uses another mechanism. Describe and compare the two mechanisms.(2p) DVGC01 -2- Karlstads universitet HT-08 Datavetenskap Exam for Computer Security DVG C04, 7,5hp, 2009-01-12 kl 8:15 - 13:15 10) Authentication (5pt). a) Describe and explain the relation between access control and authentication. b) In connection with Authentication the terms Claim and Credential is used explain these terms and give examples. c) In the course we have discussed Biometrics. What is a biometric? Biometrics can be divided into two broad categories. Which are these and what characterize biometrics belonging to the different categories. What are the pros and cons of using biometrics? 11) Firewalls (4.5pt) a) Describe the firewall architecture known as screened subnet and explain how it works. (1.5p) b) One of the transport protocols are a bit tricky to handle in Firewall rules. Which transport protocol is it and why is it tricky? What is required to reliably filter it?(3p) 12) Malicious code (5pt) a) What is the difference between a virus, a worm and a Trojan Horse? Explain how they work.(2 pt) b) What do we mean by a Blended threat? Give an example of a Trojan horse.(1pt) c) Explain broadly how 4:th generation virus protection works.(2pt) 13) Security Models & Access Control (6pt) a) What kind of access can a process with the current security level (secret, {NATO, CRYPTO}) have to documents classified in each of the following ways under the Bell LaPadula Model (2pt): 1. (unclassified, { }) 2. (unclassified, {CRYPTO, NUCLEAR}) 3. (top secret, {NATO, NUCLEAR}) 4. (top secret, {NUCLEAR, CRYPTO, NATO}) b) Describe the difference between discretionary access control (DAC) and mandatory access control (MAC). How can DAC be compromised by a Trojan Horse?(2pt) c) What is XACML? What are the XACML components and how do they work together to decide about access control requests?(2pt) DVGC01 -3- Karlstads universitet HT-08 Datavetenskap Exam for Computer Security DVG C04, 7,5hp, 2009-01-12 kl 8:15 - 13:15 14) Database Security (7pt) a) What is polyinstantiation and how does it arise ? Give an example (3pt). b) What is the difference between a general and an individual tracker attack to a statistical database (1pt)? c) Consider the statistical database with N = 14 students Name Sex Major Class Course Grade Annicka Female CS 2001 2 Katrin Female Bio 2001 5 Jonas Male Bio 1999 3 Anette Female CS 1999 4 Johannes Male EE 2000 2 Per Male Bio 2002 4 Alfredo Male CS 2000 2 Lotta Female Psy 1999 5 Rickard Male CS 2001 4 Anna Female EE 1999 3 Helena Female Psy 2001 5 Peter Male Bio 1998 2 Paul Male CS 1999 5 Marianne Female CS 1997 5 Show how Annicka’s course grade can be compromised under a query-set-size restriction of n=2 using a. an individual tracker attack (1pt) b. l a general tracker attack (1pt) d) What are technical means to protect against tracker attacks? (1pt) 15) Legal Aspects (privacy) (4pt) a) Explain the “purpose binding” and the “data minimization” privacy principles and explain why they are important.(2pt) b) Discuss privacy risks of RFID applications (2pt) 16) Intrusion Detection (IDS) (3pt) a) What is the difference between Misuse Detection and Anomaly Detection? What are the pros and cons of both IDS methods?(2pt) b) Give an example how Misuse and Anomaly detection would be used to detect computer viruses or buffer overflow attacks. (1pt) DVGC01 -4-