13b - Internet Security Flashcards

(7 cards)

1
Q

What are two purposes of the addition of the digital signature to a message?

A
  • To authenticate/confirm identity of sender
  • To detect if message has been tampered with/altered/changed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the difference between Symmetric Key and Public Key encryption?

A
  • Symmetric key encryption: the same key/process/algorithm is used for encrypting and decrypting
  • Public Key encryption: a public key and a private key are used in combination; one to encrypt, the other to decrypt
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why is a firewall needed if the school wants to connect to the Internet?

A
  • To prevent unauthorized access to a private network
  • To safeguard the school’s network against hackers
  • To block internal access to specific external sites
  • To block certain ranges of IP addresses
  • To close ports
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

List four measures that can be used to reduce the threat posed by viruses.

A
  • Use Anti-Virus Software
  • Implement a Firewall
  • Use a Proxy Server
  • Employ Spam Filters
  • Use Web Filters
  • Utilize Digital Certificates
  • Use Digital Signatures/Checksums
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the key exchange problem in relation to a symmetric cipher?

A

How to pass the key from the sender to the receiver without it being intercepted securely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Virus?

A

Program that attaches itself to/conceals itself within another program/file; Self-replicating; Has malicious purpose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explain the difference between a virus and a worm.

A
  • Worm duplicates by exploiting network security weaknesses
  • Worm is standalone software
  • Worm replicates without user action
  • Virus copies itself by attaching to other files
  • Virus conceals itself within another file
  • Virus relies on user running program to replicate it
How well did you know this?
1
Not at all
2
3
4
5
Perfectly