Introduction Flashcards

Easy shit

1
Q

Computer Security

A

Generic name for collection of tools to thwart hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Network Security

A

Protect data in transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Internet Security

A

Network security, but for interconnected networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CIA Security Triad

A

Confidentiality, Integrity, and Availability (also Accountability and Authenticity have been added elsewhere)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Types of Attacks

A

Passive-Difficult to detect, possible to prevent

Active-Difficult to prevent, possible to detect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Repudiation

A

Send something, then deny you sent it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Security Services

A

Layers to process/communicate security-related concerns and implement security policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Authentication

A

Peer Entity-Used in association with a logical connection to ensure the identity of connected entity; Ex: Ciphers, Digital Signatures, Key Exchange

Data Origin-Connectionless; assures that source of data is as claimed; doesn’t protect against duplication;
Ex: Ciphers, Digital Signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Access Control

A

Preventing unauthorized use of a resource; protects against masquerade attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data Confidentiality

A

Connection-Protect data throughout its transmission

Connectionless-Protect entire block of data

Selective Field-Protect certain fields of data

Traffic Flow-Protect against skimmers of traffic

Ex: Ciphers, routing control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data Integrity

A

Connection w/ and w/o Recovery-Detects against modding, deletion, insertion, etc. of data during a connection; may attempt recovery

Selective Field Connection-Connection Integrity but only for selected fields

Connectionless-Checks for modding; maybe limited replay detection

Selective Field Connectionless-Selective Field but for a single block of data

Ex: Ciphers, Digital Signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Nonrepudiation

A

Origin-Proof that whoever sent it did send it
Destination-Proof that whoever received it did receive it
Ex: Digital Signatures, Notarization, Data Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly