Assignment 1 - Short Answer Flashcards
The general security objectives of cybersecurity comprise the following:
availability; integrity, which may include data authenticity and
non-repudiation, and _______________
Confidentiality
A _____________ is a process (or a device incorporating such a process)
that is designed to detect, prevent, or recover from a security attack.
Security Mechanism
An ___________ is any kind of malicious activity that attempts to collect, disrupt,
deny, degrade, or destroy information system resources or the information
itself.
Attack
A __________ attack attempts to learn or make use of information from the
system but does not affect system resources.
passive
The emphasis in dealing with __________ attacks is on prevention rather than
detection.
passive
Active attacks can be subdivided into four categories: replay, _______________,
modification of messages, and denial of service
masquerade
_______________ prevents either sender or receiver from denying a
transmitted message.
Non-repudiation
_______________ is the property of a system, or a system resource being accessible
and usable upon demand by an authorized system entity, according to
performance specifications for the system.
Availability
_____________ is the insertion of bits into gaps in a data stream to frustrate traffic
analysis attempts
Padding
Digital _______________ is data appended to, or a cryptographic transformation of, a
data unit that allows a recipient of the data unit to prove the source and
integrity of the data unit and protect against forgery.
Digital Signature
Cryptographic algorithms can be divided into three categories: keyless,
__________, and two-key
one-key
A ___________ number generator produces a deterministic sequence of numbers
or bits that has the appearance of being a truly random sequence
hashing
Encryption algorithms that use a single key are referred to as ______________
encryption algorithms.
one-key
_____ is a measure of the extent to which an entity is threatened by a potential
circumstance or event, and typically a function of 1) the adverse impacts that
would arise if the circumstance or event occurs; and 2) the likelihood of
occurrence.
Risk
___________ is a characteristic of an entity that reflects the degree to which that
entity is deserving of trust
Integrity