MId term Flashcards

(32 cards)

1
Q

Define plain Text

A

Text that is readable and not encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define Cipher Text

A

Text that has been encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define Encryption

A

The act of encipherment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define Decryption

A

The act of decipherment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Transposition Cipher

A

A cipher that moves letters around but does not change the letters present

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a substation Cipher

A

A cipher that substitutes letters for other letters given a rule. Eg caesar cypher substitutes one letter for that letter plus an offset in the alphabet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a polyalphabetic Cipher

A

A cypher where each letter is substituted based on the letter of the key that lines up with it in the table.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What method do you use to break a Caesar cipher

A

Frequency analysis and double letters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What method do you use to break a vigareta cipher

A

By finding the length of the key (N) and then using frequency analysis of every N’th character

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What encryption method is 100% secure

A

One time pads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is the length of a key in a one-time pad

A

The same length as the message that is encrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are side channel attacks

A

Side channel attacks attack the implementation of the encryption algorithm rather than a flaw in the encryption algorithm its self

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the C in the CIA triad

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the I in the CIA triad

A

Intergrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the A in the CIA triad

A

Accessibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What acronym represents the hexad

17
Q

What is the A in AUP hexad

18
Q

What is the U in AUP hexad

19
Q

What is the P in AUP hexad

20
Q

What does integrity mean?

A

Keeping information from unauthorised changes

21
Q

What does accessibility mean?

A

Keeping information available for people to use

22
Q

What does confidentiality mean?

A

Keeping information from unauthorised access/viewing

23
Q

What does authenticity mean?

A

Knowing who or what sent a piece of information

24
Q

What does Utility mean?

A

The infomation must be in a useful state, it must not be encrypted.

25
What does possession mean?
Control must not be lost of the information.
26
What is an active threat
A threat that changes something in the system
27
What is a passive threat
A threat that does not change anything in the system and observes
28
What is an insider threat
Insider threats stem from people with permission already in the system and could involve elevation permissions or abusing current ones.
29
What is an outsider threat
Outsider threats stem from outside the system and access to the system must be established first.
30
what is a vulnerability
A weakness that could be exploited by a threat source.
31
What is a thre
Is a event or circumstance where a vulnerability could be exploited.
32
What is an attack
An attack is an intentional attempt to gain unauthorised access or unauthorised modifications to information.