Monday, January 23, 2006

[轉貼]喝茶

狀況:適合的茶

1.用腦過多:茉莉花茶、綠茶
2.體力勞動、運動過後:烏龍茶、紅茶
3.常處於空氣污染嚴重環境:綠茶
4.孕婦:淡綠茶(臨盆前1-2月改飲紅茶,產後則改喝加糖的紅茶)
5.少勞動、運動的人:綠茶、花茶
6.嗜煙酒者:綠茶
7.肉食主義者:烏龍茶
8.陰虛體質者 :綠茶
9.陽虛體質、脾胃虛寒者:烏龍茶、花茶
10.便秘:蜂蜜茶
11.減肥美容:烏龍茶、普洱茶、綠茶
12.抗癌、防癌:綠茶
13.降血脂、防動脈硬化:烏龍茶、綠茶
14.延年益壽:烏龍茶、紅茶

Sunday, January 22, 2006

[CISSP] Domain Security Models and Architecture

Domain Security Models and Architecture


  • Availability Prevention of loss of access to resources and data
  • Integrity Prevention of unauthorized modification of data
  • Confidentiality Prevention of unauthorized disclosure of data
Protection rings


  • Ring 0 Operationg system kernel
  • Ring 1 Remaining parts of the operationg system
  • Ring 2 I/O drivers and utilities
  • Ring 3 Applications and programs

CPU

The CPU is made up of two parts: ALU and registers. There are two types of registers: dedicated and status. Dedicated registers are program counters that point to memory locations which hold the next instructions. Status registers hold state information.

Common Criteria works to answer two basic questions about products being evaluated: what the security mechanisms within the product do(functionality), and how sure are you of that(assurance)?

Bell-LaPadula model

A model that protects the confidentiality of the information within a system

  • No read up
  • No write down
  • read/write at the same security level.

Biba model

A model that protects the integrity of the information within a system

  • No read down
  • No write up

Clark-Wilson model

The invocation property is part of Biba security model and enforces integrity principles between subjects and objects. It ensures that subjects can only access objects through a program(access triple).

Subjects cannot acces objects directly, but rather through specified programs. This layer of protection enforces integrity. It ensures that subjects can only access objects through a program(access triple), enforces separation of duties, and requires auditing.

Brewer and Nash model

Also called the Chinese Wall model, was designed to establish access control mechanisms that can change dynamically. The system is intended to prevent conflicts of interest between users who are accessing the same system.

Trust Computer Security Evaluation Criteria(TCSEC) principles

  • Functionality
  • Effectiveness
  • Assurance

TCSCE also know as the Orange Book, mainly addresses government and military requirements. It looks specifically at the operating system and not ohter issues like networking and databases. It focuses on confidentiality, not on integrity, availability, or authenticity.

Trusted Computing Base(TCB) is the hardware, software and firmware components that work together to implement the system security policy, creating a consistent, stable and secure environment for information processing.

The Orange Book(Trusted Computer System Evaluation Criteria- TCSEC) Secrity levels

  • A Verified
  • B Mandatory protection
  • C Discretionary protection
  • D Minimal security

B1 Labeled Security

B2 Structured Protection: Covert channel analysis is required for systems evaluated at levels B2 and above.

B3 Security Domains: Requires that the integrity of the reference monitor be checked to prove that is is small enough to be tested thoroughly and tamperproof.

C1 Descretionary Security Proctection

C2 Controlled Access Protection: Object reuse protection introduced.

Information Technology Security Evaluation Criteria(ITSEC)

Became official in 1995 as Europe's own standard for evaluating computing devices. Security is based on two principles: effectiveness and correctness.

Common Criteria

Five sections

  • Descriptive elements
  • Rationale
  • Functional requirements
  • Development assurance requirements
  • Evaluation assurance requirements

Threats

Convert timing attacks manipulate system resources to access information obtained by another process.

  • Timing: One process relays information to another by modulating its use of system resources.
  • Storage: When a process writes data to a storage location and another process directly, or indirectly, reads it.

Asynchronous attacks, time-of -check versus time-of use checks are the same and use timing based attack methods that take advantage of time intervals between legitimate activities that are vulnerable to subversion.

Buffer overflows send more information to the CPU than it can process, causing malicious code to execute.

Nonvolatile storage: sequential, real space, and virtual space. Real space is used to store instructions and data during computing. It is referred to as the computer's main storage area.

Zachman Framework for enterprise architecture

  • Strategic planner
  • System user
  • System designer
  • System developer
  • Subcontractor
  • System itself

Security Modes of Operation

Dedicated Security Mode

All users have the clearance and formal need-to-know to all data processed within the system.

System-High Security Mode

All users have a security clearance or authorization to access the infromation but not necessarily a need-to-know for all the information processed on the system.

Compartmented Security Mode

All users have the clearance to access all the infromation processed by the system, but might not have the need-to-know and formal access approval.

Multilevel Security Mode

It permits tow or more classification level of information to be processed at the same time when all the users do not have the clearance or formal approval to access all the information being processed by the system.

A protection domain is also called a security domain or an execution domain. which system resources that are available to a subject.

Wednesday, January 18, 2006

[CISSP] Domain Access Control

Domain Access Control

Access control
Security features that control how users and systems communicate and interact with other systems and resources

Domain
The resources that are available to a subject for it to carry out ists tasks. The subjects can be users, applications, or processes.

Access criteria

  • Roles
  • Groups
  • Physical or logical location
  • Time of day
  • Transaction type


Hybrid smart cards
A hybrid smart card has two chips embedded into a card's surface — one contact and one contactless — each with its own interface. This effectively doubles the functionality and security of every card issued.

Combi smart cards
Combi smart cards allow a single smart chip to securely interface with both contact and contactless readers. The Smart Card Alliance forecasts that the transportation and banking industries will adopt this technology first.

Characteristic of Kerberos
The user sends over his username to the authentication service(AS). The AS creates a ticket granting ticket(TGT), which is encrypted with the user's secret key. The TGT is used to communicate to the ticket that contains two instances of the same session key that is encrypted with the individual principals' secret keys. It is this second ticket that allows the two principals to obtain their session keys.

Secure Domain
A domain that is managed by the same group using the same security policy.

Attribute Valuse Pairs
are constructs that outline how cummunication will take place between cummunicationg entities. The more AVPs that are present in a protocol, the more functionality and capabilities that protocol has. Diameter has many more AVPs than RADIUS, which is why it can authenticate devices in many different ways and have more functionality through its peer to peer mode.

Kerberos
is made up of a KDC, a realm of principals(users, services, applications, devices), an authenticaion service, tickets, and a ticket granting service.

Access Control Models

Descretionary(DAC)

A system that uses discretionary access control(DAC) enables the owner of the resource to specify which subjects can access specific resources. This model is called discretionary because the control of access is based on the discretion of the owner. The system compares the subject's security token (permissions and rights) to the ACL on the resource. Data owners decide who has access to resources.

Mandatory(MAC)

The operating system makes the final decision and can override the data owner's wishes. The system makes access decisions by comparing the subject's clearance and need-to-know level to that of the security label. Access decisions are based on security labels.

Sensitivity Labels

When MAC is being used, every subject and object must have a sensitivity label, also called a security label.

Role-Based

Also called nondiscretionary access control, uses a centrally administrated set of controls to determine how subjects and objects interact. Access decisions are based on subject's role.

Type II error means that the system has authenticated a person who shuld not be allowed into the environment.

Type I error means that the system did not successfully authenticate someone who is authorized to access the environment.

Hybrid administration is a common access control method used today. It combines the centralized and decentralized approaches. Individual users may be able to dictate who can access their shares and local files, but the IT administration would control access to file servers, network printers, and network devices.

Tuesday, January 17, 2006

[CISSP] Domain Telecommunications and Networking Security

Domain Telecommunications and Networking Security
Firewall Type

Packet-level filtering firewall
  • Network layer
  • ACL
Proxy firewall - Application
  • Application layer
  • This looks deep into packets and makes granular access control decisions.
  • It requires one proxy per service.

Proxy firewall - Circuit

  • Network layer
  • This looks only at the header packet information.

State inspection firewall

  • Network layer
  • using a state table
  • It looks at the state and context of packtes
  • Third -generation firewall

Firewall Architecture Characteristics

Dual-homed

  • Single pc with two or more NICs

Screened host

  • Router filters(screens) traffic before it is passed to the firewall

Screened subnet

  • External router filters(screens) traffic before it enters the subnet. Traffic headed toward the internal network then goes through the firewall and another router

[CISSP] Domain Business Continuity Planning

Domain Business Continuity Planning

The phases of a continuty plan

  • Project Initiation
  • Business Impact Analysis
  • Strategy Development
  • Plan Development
  • Implementation
  • Testing
  • Maintenance

Maximun Tolerable Downtime(MTD)

Maximun elapsed time required to complete recovery of application data

The first step in planning disaster response procedure is identify a team.

An incremental backup takes longer to resotre than a differential and removes the archive attribute. A full backup removes the archive attribute and must be restored before an incremental or differential backup.

65 precent of businesses would fail if they were forced to shut down operations for a one-week time period.

Senior executives have key responsibilities within disaster recover:

  • Support and approval of plans
  • Sponsor all aspects of plans
  • Verify testing phases are being carried out
  • Oversee budgets.

Disk-Shadowing

A system that writes to two different disk for redundancy.

A disaster is defined as an event that affects a business for one day or longer.

Saturday, January 14, 2006

[CISSP] Domain Crytography

Domain Crytography

Symmetric keys: secret keys. When using symmetric algorithms, the sender and receiver use the same key for encryption and decryption functions.

Strengths:

  • Much faster than asymmetric systems
  • Hard to break if using a large key size

Weaknesses:

  • Requires a secure mechanism to deliver keys properly(out-of-band method) .
  • Each pair of users needs a unique pair of keys, so the number of keys grows, and key management can become overwhelming.
  • Provide confidentiality, but not authenticity or nonrepudiation.

Algorithms:

  • Data Encryption Standard(DES)
  • Triple-DES (3DES)
  • Blowfish
  • IDEA
  • RC4, RC5, AND RC6
  • Advanced Encryption Standard(AES)
Block Cipher: work on blocks(64 bits) of plaintext and ciphertext

Stream Cipher: work on streams of plaintext and ciphertext, one bit at a time. It is using keystream generator. Because stream ciphers encrypt and decrypt one bit at a time, they are more suitable for hardware implementations.

Asymmetric keys: public and private keys. Asymmetric systems use two different keys for encryption and decryption purposes.

For confidentiality-> encrypt the file with receiver's public key. This is called a secure message format.

For authentication-> encrypt the data with sender's private key. This is called an open message format.

For confidentiality and authentication -> encrypt the sender's private key and then encrypt it again with receiver's public key. This is called a secure and signed format.

Strengths:

  • Better key distribution than symmetric systems
  • Better scalability than symmetric systems
  • Can provide authentication and nonrepudiation

Weaknesses:

  • Works much more slowly than symmetric systems
  • Mathematically intensive tasks

Algorithms:

  • RSA(is used often in webbrowsers with SSL)
  • Elliptic Curve Cryptosystem(ECC)
  • Diffie-Hellman(Electronic key distribution, first asymmetirc algorithm)
  • El Gamal
  • Digital Signature Algorithm(DSA)
  • knapsack

Link encryption happens at lower layers and encrypts headers and trailers of the packet. It would be considered the more secured encryption method acorss a single link.

End-to-end encryption happens at higher layers and does not encrypt headers and trailers.

Public key Infrastructure(PKI)

is a hybrid system of symmetric and asymmetric key algorithms and methods.

Message Integrity

Digital Signature

is a hash value that has been encrypted with the sender's private key. Provides authentication(knowing who really sent the message), integrity(because a hashing algorithm is onvolved), and nonrepudiation(sender cannot deny sending the message). Accountability(?)

One-way hasing

Creates a fingerprint of the message so it can more easily identify and monitor the message to see if it has been altered. It takes a variable-length string(the message) and generates a fixed-length value(message digest). It provide integrity of a message.

Message Authentication Code(MAC)

A user would like to send a message and allow only one other person to verify the integrity of the message.

  • A symmetric key is combined with the message before being put through a hashing algorithm.
  • It provides integrity and data origin authentication.

One-time pad

are basically stream ciphers considered impossible to break if implemented and maintained properly. A stream algorithm generates a keystream that is XORed to the plaintext. A one-time pad is made up of random values(just like a key stream), which is used to XOR to plaintext data.

Data Encryption Standard(DES)

Key size of 64 bits
(8 bits used for parity, resulting in an effective key length of 56 bits)->DEA
Replace by the Rijndael algorithm as the Advanced Encryption Standard(AES) BY NIST

How Does DES Work?

Electronic Code Book(ECB) Mode

This mode is usually used for small amounts of data like encrypting and protecting encryption keys. It is uese for challenge-response encryption operations and some key managements tasks. It is also used to encrypt personal identification number(PINs) in ATM machines for financial institutions.

Cypher Block Chaining(CBC) Mode

Ciphertext from the pervious block of data is used in encrypting the next block of data.

Advanced Encryption Standard(AES)

The AES was to be a symmetric block cypher algorithm supporting keys sizes of 128, 192, and 256 bits keys.

Rijndael was NIST's choice in replacing DES. It is a block cipher with a variable block length and key length.

Pretty Good Privacy (PGP)

It was the first widespread public key encryption program. It uses passphrases. The passphrase is used to encrypt the user's private key that is stored on her hard drive. PGP does not have a central leader, like a CA, certain standardized functionality is harder to accomplish. PGP is considered a cryptosystem. PGP is web of trust structure and using session key.

S-HTTP is a technology that protects each message that is sent between two computers.

HTTPS protects the communication channel between two computers, messages and all.

SSL works on transport layer. It protects a communication channel instead of individual messages. The client creates a session key and encrypts it with a public key and need PKI(CA).

Secure Electronic Transaction (SET) is a security technology proposed by Visa and MasterCard.

Cookie

Secure Shell (SSH) functions as a type of tunneling mechnism that provides terminal-like access to remote computers.

Internet Protocol Security(IPSec)

is a method of setting up a secure channel for protected data exchange between two divices. IPSec uses two basic security protocols: Authentication header(AH) and the Encapsulating Security Payload(ESP). It provide integrity and system authentication.

Transport mode:

Where the payload of message is protected.

Tunnel mode:

Where the payload and the routing and header information is also protected.

Zero knowledge proof means that someone can tell you something without telling you more information than you need to know. In cryptography it means to prove that you have a specific key without sharing that key or showing it to anyone.

Concealment ciphers disguise messages within the text or body of a message, such as using every other word in a sentence to form a different message.

[CISSP] Domain Operations Security

Domain Operations Security

Basic forms of electronic vaulting

  • Online tape vaulting
  • Remove transaction journaling
  • Database shadowing

Due dilligence is going through the necessary steps to know what a company or individual's actural risks are.

Due care is carrying out responsible actions to reduce those risks.

A user should have a need-to-know to access particular resources; least privilege should be implemented to ensure she only accesses the resources she has a need-to-know.

Three primary types of recovery procedures for computers:

1. System reboot - Restarts in a controlled manner.

2. Emergency reboot - Restarts when normal procedures cannot be initiated.

3. System cold start - User administered-restart due to the system being unable to properly recover.

Fingerprinting

Network mapping tools perform fingerprinting functions within networks. The responses received from ping commands and port scans can help provide useful information to the requestor, such as clarifying what type of device it is connected to. The attacker can also learn about what operating system software and applications are running.

Port scanning is used by attackers to identify open ports in a victim's network

Configuration management is a process to control the changes that take place while a system or application is being developed. This control takes place throughout the life time of the system or application, so any changes to it in production also fall under configuration management. Configuration management does not ensure that changes take place, but controls the changes to make sure they are carried out properly.

Change management policy

1. Request a change

2. Approve a change

3. Document a change

4. Test a change

5. Implement a change

6. Report a change to management

Deviation from standards

Performing at a different level than the standard set baseline of security and functionality

Juggernaut and Hunt are two programs used to accomplish session hijacking.

Authorization creep violates both the least privilege and need-to-know concepts.

Slamming is when a user's telephone service provider has been chnaged without that user's consent.

Cramming is adding on charges that are bogus in nature that the user did not request or receive.

The basic features and architecture of a system are the focus of operational assurance.

Tursted recovery refers to the right procedures following a system failure and can be classified as either a system reboot, emergency system restart, or a cold start. Trusted recovery is carried out so that even if a system fails for one reason or another, it is not put into an insecure state.

Sunday, January 08, 2006

[CISSP] Domain Physical Security

Domain Physical Security

Primary goals of physical security


  • Deter
  • Delay
  • Detect
  • Assess
  • Respond

Elctrical Power Issues

  • Spike Mometary high voltage
  • Surge Prolonged high voltage
  • Fault Momentary power out
  • Blackout Prolonged loss of power
  • Sag/Dip Momentary low voltage
  • Brownout Prolonged power supply this is below normal voltage

Fire type

  • A common combustible
  • B Liquid fire
  • C Electrical Fire
  • D Metals such as Magnesium

Portable extinguishers should be placed within 50 feet of electrical equipment and be inspected quarterly.

Perimeter intrusion and detection assessment sytems(PIDAS) consist of boundary fencing with motion detectors.

Seismic system is sensitive to sounds and vibrations and detects the changes in the noise level of an area it is placed within.

Somke-activated detectors use photoelectric optical detectors to detect changes in light intensity.

A passive infrared system measures any changes in heat waves for a specified area.

Lighting is an important part of physical security.

[CISSP] Notes

Confidentiality deals with Disclosure

Integrity deals with Modification, Alteration

Availability deals with Destruction

Core Prinicples of Security

1. Principle of Least Privelege

2. Know thy system

3. Prevention is Ideal, Detection is must

4. Defense in depth.

Principle of Least Privelege ==> Seperation of Duty ==> Job Rotation

Trusted Computing Base

Security Kernel implements Reference Monitor rules. Security Kernel comprises of the hardware, software, and firmware. Reference Monitor check all access. Reference Monitor holds all.

TCSEC was developed by DoD

ITSEC was developed by Europe

Control Types

- Policies, standards, guidelines, personnel screening, and security awareness training are Directive Controls

- Firewall, encryptio, identification, and authentication are Preventive Controls

- Log review, auditing, and integrity checkers are Detective Controls

- Instruction Manuals and audit trails are Corrective Controls

Law and Ethics

HIPAA : Regulatory Law : Deals with Medical : aka Kennedy-Kassebaum Act

GLBA : Regulatory Law : Deals with Finance : aka Financial Modernization Act

FOIA : Freedom of Information Act makes federal information readily available to public.

DMCA : Digital Millennium Copyright Act brings US into complaince with Article 20 of Berne Convention

CFAA Computer Fraud and Abuse Act is the "root" law - criminalizes an attack on any computer connected to the internet.

U.S. National Information Infrstructure Protection Act of 1996 is an ammendment to U.S. Computer Fraud and Privacy Act of 1986 and addresses CIA.

Evidence Life Cycle comprises of the following:

1. Collection and identification.

2. Storage, preservation, and transporation

3. Presentation in the court

4. Return to victim or owner

Trade Secret is the most appropriate protection level granted to proprietary source code.

Copyright is used to protect expression of ideas.

Civil Law aka Tort Law requires preponderance of evidence.

The Foreign Corrupt Practices Act voilations are investigated by SEC

The Economic Espionage and Protection of Proprietary Economic Information Act of 1996 voilations are investigated by FBI

Thursday, January 05, 2006

[Trading] Notes for The Successful Investor by William O'Neil - 笑傲股市 Part 2

1. 在股票上漲時買進股票
2. 在股價接近年度高點時買進
3. 通常要在略為虧損時立即賣出股票
4. 不要太過注重一家公司的帳面淨值、股利或本益比。
5. 不需要訂閱一大堆的市場資訊或顧問服務,也不應受到分析師的建議所影響。

五大步驟


1.分析大盤漲跌驅勢

  • 進貨(Accumulation)
  • 出貨(Distribution)

2.訂立3比1的獲利或停損計劃

  • 20-25%停利
  • 7-8%停損

3.在最佳時機買進最棒的股票

4.及時出脫持股落袋為安

5.管理最佳投資組合

[Trading] 期貨/選擇權操作

每天注意事項
1. 外資買賣超
2. 美股走勢
3. 政府動作

[Snapshot] 2005 Taipei Computer Show


F1010006
Originally uploaded by jyhsieh.
每年一度的電腦大拜拜,大家都人手一台照相機拍Show girl。這幾年電腦show的重點不外乎是mp3 player, notebook, digital camera, LCD monitor, smart phone, 沒什麼特別。反到是digital camera的盛行,沒有洗照片的花費,降低拍照的門檻。 這是在三館用Olympus Mju II和Fujifilm Superia X-tra 400拍的。台下一大堆人拿dslr,有人自帶小椅子取得高點拍照的位置,真是奇觀。

Monday, January 02, 2006

[Camera] Olympus [Mju:]-II Specification



這是Olympus出的傻瓜相機,輕巧、方便又便宜。由於現在大家流行數位相機,所以你可以用便宜的價格買到這些仍用底片的相機。
Mju II 的優點是定焦大光圈,加上底片銀鹽的品質還是比數位的image好太多;缺點是要買底片和沖掃底片,花費較貴,並且無法隨拍隨看。


1997 Debut
Aperture f2.8-f11
Shutter speed 4 Sec-1/1000 Sec
108mm×59mm×43mm
140g

[Snapshot] 2005 Christmas vacation in Hong Kong Part 3

Peninsula Hotel
Olympus [Mju:]-II
Fujifilm Superia X-tra 400
12/23/2005

聖誕節前夕走到尖東經過半島酒店,大門前到處是遊客拍照留戀的身影,路過的每個人都感染到歡樂的氣氛。