Chapter 1 Flashcards

1
Q

What are the three security goals?

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are security attacks?

A

Threats that compromise the three security goals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are security services?

A

Mechanisms implemented to achieve security goals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are security mechanisms?

A

Tools or processes used to provide security services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What two techniques are introduced to implement security mechanisms?

A

Cryptography, Steganography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define computer security according to NIST.

A

Protection of an automated information system to preserve integrity, availability, and confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the three fundamental questions in computer security?

A
  • What assets do we need to protect? * How are those assets threatened? * What can we do to counter those threats?
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does network security refer to?

A

Measures to protect data during transmission and to prevent unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Internet security?

A

Protection of data during transmission over interconnected networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

True or False: Nothing is ever completely or truly secure.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the CIA triad?

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does confidentiality mean in information security?

A

Protection of confidential information from unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does integrity mean in the context of information?

A

Changes to information must be made only by authorized entities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does availability signify in information security?

A

Information must be accessible to authorized entities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is snooping?

A

Unauthorized access to or interception of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define modification in the context of security attacks.

A

Interception and alteration of a message by an attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is masquerading or spoofing?

A

When an attacker impersonates someone else

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does replaying mean in security attacks?

A

Obtaining a copy of a message and re-sending it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is repudiation in security context?

A

Sender or receiver denies having sent or received a message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a denial of service (DoS) attack?

A

An attack that slows down or interrupts service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What does ITU-T provide in terms of security?

A

Security services and mechanisms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is cryptography?

A

The science and art of transforming messages to secure them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What does the term steganography mean?

A

Covered writing, in contrast to secret writing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is encryption?

A

Transformation of intelligible information into unintelligible form

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is decryption?

A

Transformation of encrypted information back into intelligible form

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is cryptanalysis?

A

Analyzing encrypted information to recover the original message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is cryptology?

A

The field encompassing both cryptography and cryptanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is the study of principles and methods of deciphering ciphertext without knowing the key called?

A

Cryptology

Cryptology encompasses both cryptography and cryptanalysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is the original message before encryption called?

A

Plain text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is the algorithm used to transform plaintext into unintelligible form called?

A

Encryption Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is the encrypted text referred to as?

A

Cipher text

32
Q

What is the key used in the encryption process called?

A

Encryption key

33
Q

What is the algorithm used to transform cipher text back to plaintext called?

A

Decryption Algorithm

34
Q

What is the key used in the decryption process called?

A

Decryption key

35
Q

In a cryptosystem, what must be public while the keys remain secret?

A

All algorithms

36
Q

What type of intruder listens to communications without modification?

A

Passive intruder

37
Q

What type of intruder modifies messages and re-inserts them?

A

Active intruder

38
Q

What does cryptography ensure regarding the knowledge of transferred information?

A

Confidentiality

39
Q

What does cryptography ensure regarding the integrity of a message during transmission?

40
Q

What does authenticity in cryptography confirm?

A

You can verify that you are talking to the entity you think you are talking to

41
Q

What does identity in cryptography allow you to verify?

A

Who is the specific individual behind that entity

42
Q

What does non-repudiation ensure in cryptography?

A

The individual behind that asset cannot deny being associated with it

43
Q

What is the classification of cryptography based on the number of keys used?

A

Symmetric key cryptography and Asymmetric key cryptography

44
Q

What type of cryptography uses the same key for encryption and decryption?

A

Symmetric key cryptography

45
Q

What type of cryptography uses two mathematically related keys?

A

Asymmetric key cryptography

46
Q

What is an example of symmetric encryption?

A

DES (Data Encryption Standard)

47
Q

What must both sender and receiver possess in a symmetric encryption system?

A

The same key

48
Q

What are two requirements for secure use of symmetric encryption?

A

A strong encryption algorithm and a secret key known only to sender/receiver

49
Q

What is the mathematical representation of encryption in symmetric cryptography?

A

C = E_K(M)

50
Q

What is the mathematical representation of decryption in symmetric cryptography?

A

M = D_K(C)

51
Q

What is a substitution cipher?

A

Replaces the actual bits, character, or block of characters with substitutes

52
Q

What is a transposition cipher?

A

Rearranges the order of the bits, characters, or blocks of characters

53
Q

What is a product cipher?

A

Combination between transposition cipher and substitution cipher

54
Q

What is a key characteristic of asymmetric key cryptography?

A

The relation between the two keys is unknown

55
Q

What can messages encrypted with the public key be decrypted with?

A

The private key

56
Q

What can messages encrypted with the private key be decrypted with?

A

The public key

57
Q

What are the essential steps in the asymmetric encryption model?

A
  • Each entity generates a pair of keys
  • Each entity publishes its public key
  • User A encrypts a message using User B’s public key
  • User B decrypts the message using their private key
58
Q

What are examples of asymmetric ciphers?

A
  • RSA
  • Rabin
  • ElGamal
  • Elliptic curve cryptography
59
Q

What is a digital signature?

A

Data appended to, or a cryptographic transformation of, a data unit that allows a recipient to prove the source and integrity of the data unit

60
Q

What are the two fundamental assumptions upon which digital signatures depend?

A
  • The private key is secure
  • The only way to produce a digital signature is to use the private key
61
Q

What must a digital signature be verifiable by?

A

Third parties to resolve disputes

62
Q

What must be possible to verify regarding a digital signature?

A
  • The author
  • The date
  • The time
63
Q

What is a key property of digital signatures?

A

The signature must be verifiable by third parties to resolve disputes.

This ensures that the authenticity of the signature can be confirmed by someone other than the signer.

64
Q

What must be possible to verify regarding a digital signature?

A

The author, the date, and time of the signature.

This verification is crucial for establishing the context and legitimacy of the signature.

65
Q

What must be authenticated at the time of a digital signature?

A

The contents.

This ensures that the information being signed has not been altered after the signature was created.

66
Q

Name one standard associated with digital signatures.

A

DSS (Digital Signature Standard).

DSS is a federal information processing standard for digital signatures.

67
Q

What is one example of a digital signature algorithm?

A

RSA (Rivest-Shamir-Adleman).

RSA is widely used for secure data transmission.

68
Q

What is a key advantage of symmetric-key cryptography?

A

High rates of data throughput.

This allows for faster encryption and decryption processes compared to asymmetric-key methods.

69
Q

What is a disadvantage of symmetric-key cryptography?

A

The key must remain secret in two-party communication.

This requirement complicates the secure exchange of keys between parties.

70
Q

What challenge arises in large networks with symmetric-key cryptography?

A

Many key pairs must be managed.

This leads to a significant increase in the number of keys required as the number of users grows.

71
Q

How many keys does a cryptosystem with n users require?

A

n*(n-1)/2 keys.

This formula arises from the need for each user to have a unique key with every other user.

72
Q

What is a key advantage of asymmetric-key cryptography?

A

Only the private key must be kept secret.

This simplifies key management since the public key can be shared openly.

73
Q

What problem does asymmetric-key cryptography aim to solve?

A

Key distribution and digital signature.

These issues are critical in ensuring secure communications and verifying identities.

74
Q

What is a disadvantage of asymmetric-key cryptography?

A

Slower than the best-known symmetric key schemes.

The computational complexity of asymmetric algorithms leads to longer processing times.

75
Q

What is typically larger in asymmetric-key cryptography compared to symmetric-key cryptography?

A

Key sizes.

Larger key sizes are necessary to achieve comparable security levels.