Chapter 8: Security in Computer Networks Flashcards

1
Q

Which property of secure communication is described below?
Only sender & intended receiver should “understand” message contents.
1. Sender encrypts message
2. Receiver decrypts message

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which property of secure communication is described below?
Sender & receiver want to confirm each other’s identity

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which property of secure communication is described below?
Sender & receiver want to ensure message not altered, in transit / afterwards, without detection

A

Message integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which property of secure communication is described below?
Services must be accessible & available to users

A

Access & availability / Operational security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What act that a “bad guy” can do, is described below?
Intercept messages, or delete or modify them

A

Eavesdrop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What act that a “bad guy” can do, is described below?
Putting message into connection

A

Insertion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What act that a “bad guy” can do, is described below?
Faking (spoofing) source address or other fields in a packet

A

Impersonation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What act that a “bad guy” can do, is described below?
“Taking over” ongoing connection by removing sender/receiver, and inserting themselves in their place

A

Hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What act that a “bad guy” can do, is described below?
Preventing a service from being used by others

A

Denial of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which type of attack for breaking an encryption scheme is described below?
When the “bad guy” has a ciphertext that they can analyze

A

Ciphertext-only attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which type of attack for breaking an encryption scheme is described below?
A cipher text-only attack where the attacker search through all keys

A

Brute force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which type of attack for breaking an encryption scheme is described below?
When the attacker has a plaintext corresponding to a ciphertext

A

Known-plaintext attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which type of attack for breaking an encryption scheme is described below?
When the attacker can get the ciphertext for a chosen plaintext

A

Chosen-plaintext attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the type of cryptography where the sender and receiver share the same key, K, called?

A

Symmetric key cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What’s this cipher called?
A cipher that substitutes one thing for another

A

Substitution cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What’s this cipher called?
A cipher that substitutes one letter for another

A

Monoalphabetic cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the US encryption standard with a 56-bit symmetric key, 64-bit plaintext input and block cipher with cipher block chaining called?

A

Data Encryption Standard (DES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What do we call chaining where data is encrypted in specific blocks, and each block is dependent on the blocks before it for decryption?

A

Cipher block chaining

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What do we call the symmetric key NIST standard that replaced DES, processes data in 128 bit blocks & uses 128, 192, or 256 bit keys?

A

Advanced Encryption Standard (AES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What do we call the sort of cryptography where the sender & receiver don’t share a secret key, but use a public encryption key known to all & a private decryption key known only to the receiver?

A

Public key cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

If given the public key in public key cryptography, should one be able to compute the corresponding private key?

A

No, the fact that this should be impossible is one of the requirements for public key encryption algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What do we call the cryptographic technique analogous to hand-written signatures?

A

Digital signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What attribute of digital signatures is described below?
The recipient can prove to someone that the sender & no one else must’ve signed the document

A

Verifiable / non-forgeable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What cryptography technique that ensures message integrity has the following goal?
Fixed-length, easy-to-compue digital “fingerprint”

A

Message digest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What do we call the cryptography technique that ensures message integrity by giving a fixed sized result after applying a hash function, H, to a message, m?
Message digest
26
Given a message digest x, it should be computationally infeasible to find another m such that...
x = H(m)
27
Is internet checksum a good or bad cryptopgrahy function?
Bad
28
What hash function has the following fault? It's easy to find two messages with the same hash value given a message with a hash value
Internet checksum
29
Give the definition: An authority that binds a public key to a particular entity
Certification Authority (CA)
30
Which attribute(s) of secure communication does sending an e-mail in the following way ensure? Using symmetric key cryptography
Confidentiality
31
Which attribute(s) of secure communication does sending an e-mail in the following way ensure? Using symmetric key cryptography & a digital signature
Integrity & authentication
32
Which attribute(s) of secure communication does sending an e-mail in the following way ensure? Using 3 keys; one private key for the sender, one public key for the receiver & one new symmetric key
Integrity, authentication & confidentiality
33
Which protocol is this? A widely deployed security protocol that adds security to the transport layer and is above this layer. Provides an API that any application can use & secures a stream of any data.
Transport Layer Security (TLS)
34
How does TLS provide confidentiality?
Via symmetric encryption
35
How does TLS provide integrity?
Via cryptographic hashing
36
How does TLS provide authentication?
Via public key cryptography
37
Give the definition: Data as a series of records, not just one-time transactions
Stream data transfer
38
What requirement of a TLS protocol is this? Sender & receiver use their certificates & private keys to authenticate each other, exchange or create shared secrets.
Handshake
39
What requirement of a TLS protocol is this? Sender & receiver use shared secret to derive set of keys
Key derivation
40
In the key derivation stage of a TLS protocol it uses two different keys for what 2 purposes?
1. Message Authentication Code (MAC) 2. Encryption
41
What requirement of a TLS protocol is this? Stream data transfer
Data transfer
42
What requirement of a TLS protocol is this? Special messages to securely close connection
Connection closure
43
To resolve the issue of where MAC goes, since if it's at the end there's no message integrity until all data's received and the connection's closed, when encrypting data "in-stream" as written into TCP socket, the stream is broken into a series of...
records
44
Give the definition: Algorithms that can be used for key generation, MAC & digital signatures
Cipher suite
45
Which version of TLS is this? Combined encryption & authentication algorithm that only has 5 cipher choices, requires Diffie-Hellmann for key exchange & uses HMAC, that uses SHA as its cryptographic hash function.
TLS 1.3
46
Give the definition: A disjoint network dedicated to a particular institution
Private network
47
Give the definition: When an institution's inter-office traffic is sent over public Internet, and the traffic is encrypted before entering the public Internet & logically separate from other traffic
Virtual Private Network (VPN)
48
Give the definition: Provides datagram-level encryption, authentication & integrity for both user and control traffic
IPsec
49
Which mode of IPsec is this? Only datagram in payload is encrypted & authenticated
Transport mode
50
Which mode of IPsec is this? 1. Entire datagram is encrypted & authenticated 2. Encrypted datagram is encapsulated in new datagram with new IP header & tunneled to destination
Tunnel mode
51
Which protocol for an IPsec service model is this? Provides source authentication & data integrity but not confidentiality
Authentication Header (AH) protocol
52
Which protocol for an IPsec service model is this? Provides source authentication, data integrity & confidentiality. More widely used then the AH protocol.
Encapsulation Security Protocol (ESP)
53
Is this a step in authentication & encryption for a 4G or a 5G network? MME in visited network makes authentication decision
4G
54
Is this a step in authentication & encryption for a 4G or a 5G network? Home network provides authentication decision
5G
55
Is this a step in authentication & encryption for a 4G or a 5G network? Uses shared-in-advance keys
4G
56
Is this a step in authentication & encryption for a 4G or a 5G network? Keys not shared in advance for IoT
5G
57
Is this a step in authentication & encryption for a 4G or a 5G network? Device IMSI transmitted in cleartext to BS
4G
58
Is this a step in authentication & encryption for a 4G or a 5G network? Public key crypto used to encrypt IMSI
5G
59
Give the definition: Isolates an organization's internal network from larger Internet, allowing some packets to pass & blocking others
Firewall
60
Give the definition: Attacker establishes many bogus TCP connections, so that there are no resources left for "actual" connections
SYN flooding
61
What type of firewall is this? Internal network is connected to Internet via router firewall. Filters packet-by-packet, and makes the decision to forward/drop a packet based on several criteria.
Stateless packet filtering
62
Give the definition: Table of rules that's applied top to bottom of incoming packets: action & condition pairs
Access Control Lists (ACL)
63
What type of firewall is this? Tracks the status of every TCP connection and determines whether an incoming or outgoing packet "makes sense" by tracking connection setup (SYN) and teardown (FIN). No longer admits packets after timeout of inactive connections at firewall. Augments ACL to indicate need to check connection state table before admitting packet.
Stateful packet filtering
64
What type of firewall is this? Filters packets on application data as well as on IP/TCP/UDP fields
Application gateway
65
Give the definition: When the router can't know if the data "really" comes from the claimed source
IP spoofing