Ch.15 Flashcards

(9 cards)

1
Q

Security violation categories (5):

A

Breach of confidentiality

Breach of integrity

Theft of service

Denial of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security violation methods(4):

A

Masquerading

Replay attack

Man in the middle.

Session hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Security must be enforced at four levels:

A

Physical

Human

Operating system

Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Program threats(6):

A

Trojan horse

Trap door

Logic bomb

Stack and buffer overflow

Viruses

Virus dropper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Virus categories

A

File/ parasitic

Boot/memory

Macro

Source code

Polymorphic( to avoid having a virus signature)

Encrypted

Stealth
Tunneling

Multipartite

Armored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Network threats are harder to detect because:

A
  • weaker protection systems
  • no shared secret
  • no physical limits
  • can’t determine the location of connecting system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Worms attack strategy:

A
  • exploited UNIX networking features
  • exploited trust relationships
  • used a grappling hook program
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does cryptography enable

A

Confirmation of source

Receipts only by certain destination

Trust relationships between sender and receiver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cryptography can be done ate various layers of ISO reference model. What are those layers:

A

Transport layer: SSL
Network layer: IPSec, IKE protocol, basis of VPNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly