Chapter 21 Security Flashcards

1
Q

Why is a key need in encryption?

A

Key is needed to encrypt code or to decript code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Plaintext?

A

Plaintext is data before encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Ciphertext?

A

Ciphertext is the result of applying an encryption algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which are the main concerns relating to transmission?

A
Confidentiality
Authenticity
Integrity
Non-repudiation
Availability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In encryption what must remain in Public Domain and what must not remain in public domain?

A

The encryption algorithm must reamain in Public Domain and the Key must remain a secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What happens in Symmetric key encryption?

A

Only one key used to encrypt and decrypt

Key is a secret between sender and receiver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What happens in Asymteric encryption?

A

The receiver sends the encryption key to the sender in order to encrypt the code so that the receiver would be able to decrypt the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which are the requirements to ensure condifentiality

A

Have a complex encryption algorithm and a large number of bits to be used to define the key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What happens in a Digital signiture and what is its disadvantage

A

Private key is only sent to those whom you want to decyphere the code
The disadvantage is that the digital signature associated with an encryption of the whole message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What happens in a one-way hash function and what does it do?

A

Recreates form the message sent a number, uniquely defined for the particular message, called ‘digest’.
Speeds up the process confirming the sender’s identity
The process at the sender’s end of the transmission is outlined
At the receivers end the same hash key function is used to have the same digest if there were no alterations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is TLS and SSL?

A

TLS Secure Socket Layer protocol is a slightly modified version of SSL Secure Socket Layer protocol.
Provide security in using using the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which are the types of malware and what do they do?

A

Virus
tries to replicate itself other executable code
Worm
runs independentely and propagates to other network hosts
Logic bomb
lies dormant until some condition is met
Trojan horse
eprlacess all or part of a previously useful program
Spyware
collects information and transmits it to another system
Bot
takes control of another computer and uses it o launch attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which are the the types of malitous activities?

A

Phishing
sending an email or electronic message from an apparently legitimate source requesting confidential information
Pharming
setting up a bogus website which appears to be a legitimate site
Keylogger
recording keyboard usage by the legitimate user of the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How can a user introduce a malware inadvertently?

A

By attaching a portable storage device
By openning an email attachment
By accessing a website
By downloading a file from the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly