mirror of
https://github.com/jackyzha0/quartz.git
synced 2025-12-27 06:44:07 -06:00
vault backup: 2022-08-05 15:29:10
This commit is contained in:
parent
4c2547eabe
commit
179580e721
@ -9,6 +9,16 @@ sr-interval: 3
|
|||||||
sr-ease: 250
|
sr-ease: 250
|
||||||
---
|
---
|
||||||
|
|
||||||
|
- [authorisation](notes/authorisation.md)
|
||||||
|
- [authentication](notes/authentication.md)
|
||||||
|
- [passwords](notes/passwords.md)
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
# Authentication
|
# Authentication
|
||||||
- proof of identity
|
- proof of identity
|
||||||
- need to be sure a user is who they say they are before you can trust them
|
- need to be sure a user is who they say they are before you can trust them
|
||||||
|
|||||||
@ -4,8 +4,8 @@ aliases:
|
|||||||
tags:
|
tags:
|
||||||
- cosc204
|
- cosc204
|
||||||
- lecture
|
- lecture
|
||||||
sr-due: 2022-08-04
|
sr-due: 2022-08-24
|
||||||
sr-interval: 8
|
sr-interval: 19
|
||||||
sr-ease: 250
|
sr-ease: 250
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|||||||
@ -4,12 +4,15 @@ aliases:
|
|||||||
tags:
|
tags:
|
||||||
- lecture
|
- lecture
|
||||||
- cosc204
|
- cosc204
|
||||||
sr-due: 2022-08-05
|
sr-due: 2022-08-23
|
||||||
sr-interval: 7
|
sr-interval: 18
|
||||||
sr-ease: 250
|
sr-ease: 250
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|
||||||
|
- [6809](notes/6809.md)
|
||||||
|
|
||||||
|
|
||||||
# Warnings
|
# Warnings
|
||||||
- different CPU architectures have their own machine codes and their own assembly languages
|
- different CPU architectures have their own machine codes and their own assembly languages
|
||||||
- assembly language programs are **not** portable across CPU architectures (e.g., 6809 to x86 ARM) but are often backwards compatible (e.g., x86_64 family)
|
- assembly language programs are **not** portable across CPU architectures (e.g., 6809 to x86 ARM) but are often backwards compatible (e.g., x86_64 family)
|
||||||
|
|||||||
@ -4,8 +4,8 @@ aliases:
|
|||||||
tags:
|
tags:
|
||||||
- lecture
|
- lecture
|
||||||
- cosc204
|
- cosc204
|
||||||
sr-due: 2022-08-04
|
sr-due: 2022-08-15
|
||||||
sr-interval: 3
|
sr-interval: 10
|
||||||
sr-ease: 250
|
sr-ease: 250
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|||||||
26
content/notes/authentication.md
Normal file
26
content/notes/authentication.md
Normal file
@ -0,0 +1,26 @@
|
|||||||
|
---
|
||||||
|
title: "authentication"
|
||||||
|
aliases:
|
||||||
|
tags:
|
||||||
|
- comp210
|
||||||
|
---
|
||||||
|
|
||||||
|
# Authentication
|
||||||
|
- proof of identity
|
||||||
|
- need to be sure a user is who they say they are before you can trust them
|
||||||
|
- usually done via a unique identifier
|
||||||
|
- unique username
|
||||||
|
- and a secret that is only known by the authorised user
|
||||||
|
- password
|
||||||
|
- biometrics
|
||||||
|
- 2fa code
|
||||||
|
|
||||||
|
## MFA
|
||||||
|
- many secrets
|
||||||
|
- protects user/system in the case that a password is disclosed
|
||||||
|
- additional secrets generated at the time of use.
|
||||||
|
- short lived
|
||||||
|
- if found - attackers have a small windoe to exploit
|
||||||
|
- e.g.,
|
||||||
|
- sms message
|
||||||
|
- authenticator app
|
||||||
18
content/notes/authorisation.md
Normal file
18
content/notes/authorisation.md
Normal file
@ -0,0 +1,18 @@
|
|||||||
|
---
|
||||||
|
title: "authorisation"
|
||||||
|
aliases:
|
||||||
|
tags:
|
||||||
|
- comp210
|
||||||
|
---
|
||||||
|
|
||||||
|
|
||||||
|
# Authorisation
|
||||||
|
- verifying that a user is allowed to access the operation that they are attempting to access
|
||||||
|
- requires explicit check in the system for restricted operatons
|
||||||
|
- some code that check if the roles assigned to the authenticaed user intersect the roles required for the current operation
|
||||||
|
- use is assigned a **role** that defines the operations they are allowed to perform
|
||||||
|
- e.g.
|
||||||
|
- custoemer - can view products, and see retail prices
|
||||||
|
- sales rep - can view products and see retail and cost prices
|
||||||
|
- manager - can add/delete/modify products
|
||||||
|
- admin - can change system configuration. can assign roles to users
|
||||||
62
content/notes/cmoc.md
Normal file
62
content/notes/cmoc.md
Normal file
@ -0,0 +1,62 @@
|
|||||||
|
---
|
||||||
|
title: "cmoc"
|
||||||
|
aliases:
|
||||||
|
tags:
|
||||||
|
- cosc204
|
||||||
|
---
|
||||||
|
|
||||||
|
CMOC is a 6809 c compiler.
|
||||||
|
|
||||||
|
it compiles c code into 6809 assembly
|
||||||
|
|
||||||
|
callling conventions
|
||||||
|
- A routine must preserve Y, U, S and DP
|
||||||
|
- A routine may change A, B, X and CC
|
||||||
|
|
||||||
|
- Parameters are pushed on the stack in the reverse order
|
||||||
|
- The caller pops them off the stack after the call
|
||||||
|
|
||||||
|
- char parameters are promoted to int
|
||||||
|
- unsigned char are promoted to unsigned int
|
||||||
|
|
||||||
|
- Return 8-but values in B
|
||||||
|
- Return 16-bit values in D
|
||||||
|
|
||||||
|
# examples
|
||||||
|
parameters
|
||||||
|
``` c
|
||||||
|
uint16_t two_params(uint8_t first, uint16_t second) {
|
||||||
|
return first + second;
|
||||||
|
}
|
||||||
|
|
||||||
|
uint16_t call_one(void) {
|
||||||
|
return two_params(204, 431);
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
```
|
||||||
|
```
|
||||||
|
|
||||||
|
local variables
|
||||||
|
|
||||||
|
``` c
|
||||||
|
uint16_t one_param(uint16_t xyzzy) {
|
||||||
|
uint16_t val = xyzzy;
|
||||||
|
return val;
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
```
|
||||||
|
_one_param
|
||||||
|
PSHS U
|
||||||
|
LEAU ,S
|
||||||
|
LEAS -2,S
|
||||||
|
* Formal parameter(s):
|
||||||
|
* 4,U: 2 bytes: xyzzy
|
||||||
|
* Local non-static variable(s):
|
||||||
|
* -2,U: 2 bytes: val
|
||||||
|
LDD 4,U
|
||||||
|
STD -2,U
|
||||||
|
LEAS ,U
|
||||||
|
PULS U,PC
|
||||||
|
```
|
||||||
@ -20,6 +20,9 @@ No final exam
|
|||||||
- [cia-triad](notes/cia-triad.md)
|
- [cia-triad](notes/cia-triad.md)
|
||||||
- [cryptography](notes/cryptography.md)
|
- [cryptography](notes/cryptography.md)
|
||||||
- [randomness](notes/randomness.md)
|
- [randomness](notes/randomness.md)
|
||||||
|
- [authorisation](notes/authorisation.md)
|
||||||
|
- [authentication](notes/authentication.md)
|
||||||
|
- [passwords](notes/passwords.md)
|
||||||
|
|
||||||
# Lectures
|
# Lectures
|
||||||
- [01-information-assurance](notes/01-information-assurance.md)
|
- [01-information-assurance](notes/01-information-assurance.md)
|
||||||
@ -27,5 +30,3 @@ No final exam
|
|||||||
- [03-threats-social-engineering-and-failures](notes/03-threats-social-engineering-and-failures.md)
|
- [03-threats-social-engineering-and-failures](notes/03-threats-social-engineering-and-failures.md)
|
||||||
- [04-authentication-authorisation-passwords](notes/04-authentication-authorisation-passwords.md)
|
- [04-authentication-authorisation-passwords](notes/04-authentication-authorisation-passwords.md)
|
||||||
- [05-cryptography](notes/05-cryptography.md)
|
- [05-cryptography](notes/05-cryptography.md)
|
||||||
|
|
||||||
# Archive
|
|
||||||
|
|||||||
@ -27,6 +27,7 @@ tags:
|
|||||||
- [ALU](notes/ALU.md)
|
- [ALU](notes/ALU.md)
|
||||||
- [computer-architecture](notes/computer-architecture.md)
|
- [computer-architecture](notes/computer-architecture.md)
|
||||||
- [6809-addressing-modes](notes/6809-addressing-modes.md)
|
- [6809-addressing-modes](notes/6809-addressing-modes.md)
|
||||||
|
- [6809](notes/6809.md)
|
||||||
|
|
||||||
# Lectures
|
# Lectures
|
||||||
- [01-bits-and-bytes](notes/01-bits-and-bytes.md)
|
- [01-bits-and-bytes](notes/01-bits-and-bytes.md)
|
||||||
|
|||||||
25
content/notes/passwords.md
Normal file
25
content/notes/passwords.md
Normal file
@ -0,0 +1,25 @@
|
|||||||
|
---
|
||||||
|
title: "passwords"
|
||||||
|
aliases:
|
||||||
|
tags:
|
||||||
|
- comp210
|
||||||
|
---
|
||||||
|
|
||||||
|
# Passwords
|
||||||
|
- not good
|
||||||
|
- lots of bad advice
|
||||||
|
- we are lazy
|
||||||
|
- "safe" passwords are difficult to enter on touch screen devices
|
||||||
|
- to many accouts
|
||||||
|
|
||||||
|
## entropy
|
||||||
|
- amount of randomness
|
||||||
|
- measure of the number of guesse an attacker would need to brute foarce
|
||||||
|
- $E = log_2(A^L)$
|
||||||
|
- A = size of alphabet
|
||||||
|
- L = length of password
|
||||||
|
- E = entropy in bits
|
||||||
|
- 80 bits is "safe"
|
||||||
|
- would take decades
|
||||||
|
- 6 digits passoword - 29 bits (took 4 seconds to brute force)
|
||||||
|
- + uppercase and numbers - 36 bits
|
||||||
Loading…
Reference in New Issue
Block a user