Chapter 1 Flashcards

(75 cards)

1
Q

What are the three security goals?

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are security attacks?

A

Threats that compromise the three security goals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are security services?

A

Mechanisms implemented to achieve security goals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are security mechanisms?

A

Tools or processes used to provide security services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What two techniques are introduced to implement security mechanisms?

A

Cryptography, Steganography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define computer security according to NIST.

A

Protection of an automated information system to preserve integrity, availability, and confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the three fundamental questions in computer security?

A
  • What assets do we need to protect? * How are those assets threatened? * What can we do to counter those threats?
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does network security refer to?

A

Measures to protect data during transmission and to prevent unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Internet security?

A

Protection of data during transmission over interconnected networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

True or False: Nothing is ever completely or truly secure.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the CIA triad?

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does confidentiality mean in information security?

A

Protection of confidential information from unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does integrity mean in the context of information?

A

Changes to information must be made only by authorized entities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does availability signify in information security?

A

Information must be accessible to authorized entities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is snooping?

A

Unauthorized access to or interception of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define modification in the context of security attacks.

A

Interception and alteration of a message by an attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is masquerading or spoofing?

A

When an attacker impersonates someone else

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does replaying mean in security attacks?

A

Obtaining a copy of a message and re-sending it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is repudiation in security context?

A

Sender or receiver denies having sent or received a message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a denial of service (DoS) attack?

A

An attack that slows down or interrupts service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What does ITU-T provide in terms of security?

A

Security services and mechanisms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is cryptography?

A

The science and art of transforming messages to secure them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What does the term steganography mean?

A

Covered writing, in contrast to secret writing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is encryption?

A

Transformation of intelligible information into unintelligible form

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is decryption?
Transformation of encrypted information back into intelligible form
26
What is cryptanalysis?
Analyzing encrypted information to recover the original message
27
What is cryptology?
The field encompassing both cryptography and cryptanalysis
28
What is the study of principles and methods of deciphering ciphertext without knowing the key called?
Cryptology ## Footnote Cryptology encompasses both cryptography and cryptanalysis.
29
What is the original message before encryption called?
Plain text
30
What is the algorithm used to transform plaintext into unintelligible form called?
Encryption Algorithm
31
What is the encrypted text referred to as?
Cipher text
32
What is the key used in the encryption process called?
Encryption key
33
What is the algorithm used to transform cipher text back to plaintext called?
Decryption Algorithm
34
What is the key used in the decryption process called?
Decryption key
35
In a cryptosystem, what must be public while the keys remain secret?
All algorithms
36
What type of intruder listens to communications without modification?
Passive intruder
37
What type of intruder modifies messages and re-inserts them?
Active intruder
38
What does cryptography ensure regarding the knowledge of transferred information?
Confidentiality
39
What does cryptography ensure regarding the integrity of a message during transmission?
Integrity
40
What does authenticity in cryptography confirm?
You can verify that you are talking to the entity you think you are talking to
41
What does identity in cryptography allow you to verify?
Who is the specific individual behind that entity
42
What does non-repudiation ensure in cryptography?
The individual behind that asset cannot deny being associated with it
43
What is the classification of cryptography based on the number of keys used?
Symmetric key cryptography and Asymmetric key cryptography
44
What type of cryptography uses the same key for encryption and decryption?
Symmetric key cryptography
45
What type of cryptography uses two mathematically related keys?
Asymmetric key cryptography
46
What is an example of symmetric encryption?
DES (Data Encryption Standard)
47
What must both sender and receiver possess in a symmetric encryption system?
The same key
48
What are two requirements for secure use of symmetric encryption?
A strong encryption algorithm and a secret key known only to sender/receiver
49
What is the mathematical representation of encryption in symmetric cryptography?
C = E_K(M)
50
What is the mathematical representation of decryption in symmetric cryptography?
M = D_K(C)
51
What is a substitution cipher?
Replaces the actual bits, character, or block of characters with substitutes
52
What is a transposition cipher?
Rearranges the order of the bits, characters, or blocks of characters
53
What is a product cipher?
Combination between transposition cipher and substitution cipher
54
What is a key characteristic of asymmetric key cryptography?
The relation between the two keys is unknown
55
What can messages encrypted with the public key be decrypted with?
The private key
56
What can messages encrypted with the private key be decrypted with?
The public key
57
What are the essential steps in the asymmetric encryption model?
* Each entity generates a pair of keys * Each entity publishes its public key * User A encrypts a message using User B's public key * User B decrypts the message using their private key
58
What are examples of asymmetric ciphers?
* RSA * Rabin * ElGamal * Elliptic curve cryptography
59
What is a digital signature?
Data appended to, or a cryptographic transformation of, a data unit that allows a recipient to prove the source and integrity of the data unit
60
What are the two fundamental assumptions upon which digital signatures depend?
* The private key is secure * The only way to produce a digital signature is to use the private key
61
What must a digital signature be verifiable by?
Third parties to resolve disputes
62
What must be possible to verify regarding a digital signature?
* The author * The date * The time
63
What is a key property of digital signatures?
The signature must be verifiable by third parties to resolve disputes. ## Footnote This ensures that the authenticity of the signature can be confirmed by someone other than the signer.
64
What must be possible to verify regarding a digital signature?
The author, the date, and time of the signature. ## Footnote This verification is crucial for establishing the context and legitimacy of the signature.
65
What must be authenticated at the time of a digital signature?
The contents. ## Footnote This ensures that the information being signed has not been altered after the signature was created.
66
Name one standard associated with digital signatures.
DSS (Digital Signature Standard). ## Footnote DSS is a federal information processing standard for digital signatures.
67
What is one example of a digital signature algorithm?
RSA (Rivest-Shamir-Adleman). ## Footnote RSA is widely used for secure data transmission.
68
What is a key advantage of symmetric-key cryptography?
High rates of data throughput. ## Footnote This allows for faster encryption and decryption processes compared to asymmetric-key methods.
69
What is a disadvantage of symmetric-key cryptography?
The key must remain secret in two-party communication. ## Footnote This requirement complicates the secure exchange of keys between parties.
70
What challenge arises in large networks with symmetric-key cryptography?
Many key pairs must be managed. ## Footnote This leads to a significant increase in the number of keys required as the number of users grows.
71
How many keys does a cryptosystem with n users require?
n*(n-1)/2 keys. ## Footnote This formula arises from the need for each user to have a unique key with every other user.
72
What is a key advantage of asymmetric-key cryptography?
Only the private key must be kept secret. ## Footnote This simplifies key management since the public key can be shared openly.
73
What problem does asymmetric-key cryptography aim to solve?
Key distribution and digital signature. ## Footnote These issues are critical in ensuring secure communications and verifying identities.
74
What is a disadvantage of asymmetric-key cryptography?
Slower than the best-known symmetric key schemes. ## Footnote The computational complexity of asymmetric algorithms leads to longer processing times.
75
What is typically larger in asymmetric-key cryptography compared to symmetric-key cryptography?
Key sizes. ## Footnote Larger key sizes are necessary to achieve comparable security levels.