CH 1 Flashcards
What are the 2 inherent needs human being from ages had ?
- To communicate and share information.
- To communicate selectively.
The art and science of concealing the messages to introduce secrecy in information security is recognized as ….. .
cryptography.
The word ‘cryptography’ was coined by combining two Greek words, ….. meaning hidden and ….. meaning writing.
‘Krypto’, ‘graphene’.
The art of cryptography is considered to be born along with the art of ….. .
writing.
These ideas of power, battles, supremacy, and politics fueled the natural need of people to ….. which in turn ensured the continuous evolution of cryptography as well.
communicate secretly with selective recipient.
Network security = ….. + ….. .
Information security, Network.
Traditionally information security provided by ….. and ….. .
Physical mechanism, administrative mechanism.
Examples of physical mechanism:
Rugged filing cabinets with locks.
Examples of administrative mechanism:
Personnel screening procedures during hiring process.
Is the physical security sufficient?
No.
Growing computer use implies a need for ….. for protecting files and other information stored on it.
Automated tools.
….. is the process of protecting data from unauthorized access, use, disclosure destruction, modification, or disruption.
Information security.
….. is the generic name for the collection of tools designed to protect data and to thwart hackers.
Computer Security
….. is the measures to protect data during their transmission.
Network Security
….. is the measures to protect data during their transmission over a collection of interconnected
networks.
Internet Security
What are the 3 main security goals ?
- Confidentiality
- Integrity
- Availability
What is the oldest Cryptographic Technique ?
Hieroglyph
What was the earlier Roman method of cryptography known as ?
Caesar Shift Cipher
How did the Caesar Shift Cipher work ?
It relied on shifting the letters of a message by an agreed number (three was a common choice).
In Steganography people not only want to protect the secrecy of an information by concealing it, But they also want to make sure ….. .
Any unauthorized person gets no evidence that the information even exists.
Give an Example of Steganography:
Invisible watermarking.
In ….., an unintended recipient or an intruder is unaware of the fact that observed data contains hidden information while in ….., an intruder is normally aware that data is being communicated, because they can see the coded/scrambled message.
Steganography, Cryptography.
When and who led to the rapid proliferation of cryptographic techniques ?
During and after the European Renaissance, various Italian and Papal states led the rapid proliferation of cryptographic techniques.
Improved coding techniques such as ….. came into existence in the 15th century.
Vigenere Coding.
How did Vigenere coding work ?
Moving letters in the message with a number of variable places instead of moving them the same number of places.
In the early 20th century, the invention of mechanical and electromechanical machines, such as the ….., provided more advanced and efficient means of coding the information.
Enigma rotor machine.
During the period of World War II, both cryptography and cryptanalysis became excessively ….. .
Mathematical.