CH 1 Flashcards

1
Q

What are the 2 inherent needs human being from ages had ?

A
  • To communicate and share information.

- To communicate selectively.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The art and science of concealing the messages to introduce secrecy in information security is recognized as ….. .

A

cryptography.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The word ‘cryptography’ was coined by combining two Greek words, ….. meaning hidden and ….. meaning writing.

A

‘Krypto’, ‘graphene’.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The art of cryptography is considered to be born along with the art of ….. .

A

writing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

These ideas of power, battles, supremacy, and politics fueled the natural need of people to ….. which in turn ensured the continuous evolution of cryptography as well.

A

communicate secretly with selective recipient.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Network security = ….. + ….. .

A

Information security, Network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Traditionally information security provided by ….. and ….. .

A

Physical mechanism, administrative mechanism.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Examples of physical mechanism:

A

Rugged filing cabinets with locks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Examples of administrative mechanism:

A

Personnel screening procedures during hiring process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Is the physical security sufficient?

A

No.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Growing computer use implies a need for ….. for protecting files and other information stored on it.

A

Automated tools.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

….. is the process of protecting data from unauthorized access, use, disclosure destruction, modification, or disruption.

A

Information security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

….. is the generic name for the collection of tools designed to protect data and to thwart hackers.

A

Computer Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

….. is the measures to protect data during their transmission.

A

Network Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

….. is the measures to protect data during their transmission over a collection of interconnected
networks.

A

Internet Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the 3 main security goals ?

A
  • Confidentiality
  • Integrity
  • Availability
17
Q

What is the oldest Cryptographic Technique ?

A

Hieroglyph

18
Q

What was the earlier Roman method of cryptography known as ?

A

Caesar Shift Cipher

19
Q

How did the Caesar Shift Cipher work ?

A
It relied on shifting the letters of a message by an 
agreed number (three was a common choice).
20
Q

In Steganography people not only want to protect the secrecy of an information by concealing it, But they also want to make sure ….. .

A

Any unauthorized person gets no evidence that the information even exists.

21
Q

Give an Example of Steganography:

A

Invisible watermarking.

22
Q

In ….., an unintended recipient or an intruder is unaware of the fact that observed data contains hidden information while in ….., an intruder is normally aware that data is being communicated, because they can see the coded/scrambled message.

A

Steganography, Cryptography.

23
Q

When and who led to the rapid proliferation of cryptographic techniques ?

A

During and after the European Renaissance, various Italian and Papal states led the rapid proliferation of cryptographic techniques.

24
Q

Improved coding techniques such as ….. came into existence in the 15th century.

A

Vigenere Coding.

25
Q

How did Vigenere coding work ?

A

Moving letters in the message with a number of variable places instead of moving them the same number of places.

26
Q

In the early 20th century, the invention of mechanical and electromechanical machines, such as the ….., provided more advanced and efficient means of coding the information.

A

Enigma rotor machine.

27
Q

During the period of World War II, both cryptography and cryptanalysis became excessively ….. .

A

Mathematical.