Introduction to Network Security Flashcards

1
Q

Computer security vs. network security

A

Computer security (by NIST):

The protection afforded to an automated information system in order to attain the applicable objectives of preserving the Integrity, Availability, and Confidentiality of information system resources.
- C.I.A. of the computer system
- C.I.A. of computer system resources: hardware, software, firmware, information/data, and communication.

Network security:

Distributed computer systems
- using networks and communication facilities to carry data between computers.

Measures to deter, prevent, detect, and correct security violations that involve transmission of information
- computer security
- special focuses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are some network security objectives?

A
  1. Confidentiality
  2. Integity
  3. Availability
  4. Non-repudiation
  5. Controlability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How can we ensure confidentiality?

A
  • By encrypting each datagram.
  • By encrypting the whole “channel” : session, connection, flow.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What can encryption not prevent?

A

Interception. Suitable ID and authentication mechanisms are needed for this.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is traffic confidentiality?

A

Data transmission at both ends. Including protection from traffic analysis (source and destination, frequency, length).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How can the integrity be protected?

A

The sender can make a message digest, binding the content and the sender ID.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is connectionless integrity?

A

A form of data integrity. It deals with individual messages without considering any larger context, and generally provides protection against message modification only.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is availability?

A

When a system or system resource is accessible and usable upon demand by an authorised entity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is non-repudiation?

A

The ability to prove who the sender and the receiver was

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is controllability?

A

Data transmission:
- Only the allowed entities can use the allowed resources
- Information flowing, information content

Provides audit and tracing measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly