1 - Introduction Flashcards

1
Q

What is Network Security?

Define Security, Security Threat and Security Attack

A

Security:
- the state of being free from danger or threat

Security Threat:
- a potential violation of security

Security Attack:
- Attempt to gain unauthorized access to a service, resource, or information, or to compromise integrity, availability, or confidentiality
(Note that success is not necessary! )

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Passive vs Active attacks

A

Passive attacks

  • Eavesdropping: secretly listening to a conversation
  • Traffic Analysis: the inference of information from observation of traffic flows

Active attacks

  • Spoofing (Masquerading): the pretence by an entity to be a different entity
  • Denial of Service (DoS): prevention or inhibition of the normal use or management of communication facilities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How to get our network free from Security threats?

A

Using security Services and Mechanism:

Security Services:
- a service provided by a layer of communicating open systems, which ensures adequate security of the systems or of data transfers

Security Mechanism:
- a mechanism that is designed to detect, prevent, or recover from a security attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the Security Services?

A
  • Authentication
  • Access Control
  • Confidentiality
  • Integrity
  • Non-repudiation
  • Availability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Authentication

A
  • The corroboration that the source of data received or the peer entitiy in association is the one claimed.
  • Who am I talking with? Who created this information?
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Access Control

A
  • The prevention of unauthorized use of a resource, including the prevention of use of a resource in an unauthorized manner.
  • Who is allowed to access resources?
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Confidentiality

A
  • The property that information is not made available or disclosed to unauthorized individuals, entities, or processes.
  • Who is able to read information?
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Integrity

A
  • The property that data has not been altered or destroyed in an unauthorized manner.
  • Is this the original information? Have I received everything?
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Non-repudiation

A
  • The property that the denial by one of the entities involved in a communication of having participated in all or part of the communication is not possible.
  • Has Bob really sent or received this information?
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Availability

A
  • The property of being accessible and useable upon demand by an authorized entity.
  • Can I use the system whenever I want?
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How to attack each security services?

A

Authentication
- IP spoofing, cracking passwords

Access Control
- wire-tapping, breaking authentication

Confidentiality
- eavesdropping, traffic analysis

Integrity
- man-in-the-middle attack, replay attack

Non-repudiation
- deletion of log files, masquerading

Availability
- denial of service attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly