Chapter 8: Security in Computer Networks Flashcards

1
Q

Which property of secure communication is described below?
Only sender & intended receiver should “understand” message contents.
1. Sender encrypts message
2. Receiver decrypts message

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which property of secure communication is described below?
Sender & receiver want to confirm each other’s identity

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which property of secure communication is described below?
Sender & receiver want to ensure message not altered, in transit / afterwards, without detection

A

Message integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which property of secure communication is described below?
Services must be accessible & available to users

A

Access & availability / Operational security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What act that a “bad guy” can do, is described below?
Intercept messages, or delete or modify them

A

Eavesdrop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What act that a “bad guy” can do, is described below?
Putting message into connection

A

Insertion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What act that a “bad guy” can do, is described below?
Faking (spoofing) source address or other fields in a packet

A

Impersonation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What act that a “bad guy” can do, is described below?
“Taking over” ongoing connection by removing sender/receiver, and inserting themselves in their place

A

Hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What act that a “bad guy” can do, is described below?
Preventing a service from being used by others

A

Denial of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which type of attack for breaking an encryption scheme is described below?
When the “bad guy” has a ciphertext that they can analyze

A

Ciphertext-only attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which type of attack for breaking an encryption scheme is described below?
A cipher text-only attack where the attacker search through all keys

A

Brute force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which type of attack for breaking an encryption scheme is described below?
When the attacker has a plaintext corresponding to a ciphertext

A

Known-plaintext attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which type of attack for breaking an encryption scheme is described below?
When the attacker can get the ciphertext for a chosen plaintext

A

Chosen-plaintext attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the type of cryptography where the sender and receiver share the same key, K, called?

A

Symmetric key cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What’s this cipher called?
A cipher that substitutes one thing for another

A

Substitution cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What’s this cipher called?
A cipher that substitutes one letter for another

A

Monoalphabetic cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the US encryption standard with a 56-bit symmetric key, 64-bit plaintext input and block cipher with cipher block chaining called?

A

Data Encryption Standard (DES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What do we call chaining where data is encrypted in specific blocks, and each block is dependent on the blocks before it for decryption?

A

Cipher block chaining

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What do we call the symmetric key NIST standard that replaced DES, processes data in 128 bit blocks & uses 128, 192, or 256 bit keys?

A

Advanced Encryption Standard (AES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What do we call the sort of cryptography where the sender & receiver don’t share a secret key, but use a public encryption key known to all & a private decryption key known only to the receiver?

A

Public key cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

If given the public key in public key cryptography, should one be able to compute the corresponding private key?

A

No, the fact that this should be impossible is one of the requirements for public key encryption algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What do we call the cryptographic technique analogous to hand-written signatures?

A

Digital signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What attribute of digital signatures is described below?
The recipient can prove to someone that the sender & no one else must’ve signed the document

A

Verifiable / non-forgeable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What cryptography technique that ensures message integrity has the following goal?
Fixed-length, easy-to-compue digital “fingerprint”

A

Message digest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What do we call the cryptography technique that ensures message integrity by giving a fixed sized result after applying a hash function, H, to a message, m?

A

Message digest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Given a message digest x, it should be computationally infeasible to find another m such that…

A

x = H(m)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Is internet checksum a good or bad cryptopgrahy function?

28
Q

What hash function has the following fault?
It’s easy to find two messages with the same hash value given a message with a hash value

A

Internet checksum

29
Q

Give the definition:
An authority that binds a public key to a particular entity

A

Certification Authority (CA)

30
Q

Which attribute(s) of secure communication does sending an e-mail in the following way ensure?
Using symmetric key cryptography

A

Confidentiality

31
Q

Which attribute(s) of secure communication does sending an e-mail in the following way ensure?
Using symmetric key cryptography & a digital signature

A

Integrity & authentication

32
Q

Which attribute(s) of secure communication does sending an e-mail in the following way ensure?
Using 3 keys; one private key for the sender, one public key for the receiver & one new symmetric key

A

Integrity, authentication & confidentiality

33
Q

Which protocol is this?
A widely deployed security protocol that adds security to the transport layer and is above this layer. Provides an API that any application can use & secures a stream of any data.

A

Transport Layer Security (TLS)

34
Q

How does TLS provide confidentiality?

A

Via symmetric encryption

35
Q

How does TLS provide integrity?

A

Via cryptographic hashing

36
Q

How does TLS provide authentication?

A

Via public key cryptography

37
Q

Give the definition:
Data as a series of records, not just one-time transactions

A

Stream data transfer

38
Q

What requirement of a TLS protocol is this?
Sender & receiver use their certificates & private keys to authenticate each other, exchange or create shared secrets.

39
Q

What requirement of a TLS protocol is this?
Sender & receiver use shared secret to derive set of keys

A

Key derivation

40
Q

In the key derivation stage of a TLS protocol it uses two different keys for what 2 purposes?

A
  1. Message Authentication Code (MAC)
  2. Encryption
41
Q

What requirement of a TLS protocol is this?
Stream data transfer

A

Data transfer

42
Q

What requirement of a TLS protocol is this?
Special messages to securely close connection

A

Connection closure

43
Q

To resolve the issue of where MAC goes, since if it’s at the end there’s no message integrity until all data’s received and the connection’s closed, when encrypting data “in-stream” as written into TCP socket, the stream is broken into a series of…

44
Q

Give the definition:
Algorithms that can be used for key generation, MAC & digital signatures

A

Cipher suite

45
Q

Which version of TLS is this?
Combined encryption & authentication algorithm that only has 5 cipher choices, requires Diffie-Hellmann for key exchange & uses HMAC, that uses SHA as its cryptographic hash function.

46
Q

Give the definition:
A disjoint network dedicated to a particular institution

A

Private network

47
Q

Give the definition:
When an institution’s inter-office traffic is sent over public Internet, and the traffic is encrypted before entering the public Internet & logically separate from other traffic

A

Virtual Private Network (VPN)

48
Q

Give the definition:
Provides datagram-level encryption, authentication & integrity for both user and control traffic

49
Q

Which mode of IPsec is this?
Only datagram in payload is encrypted & authenticated

A

Transport mode

50
Q

Which mode of IPsec is this?
1. Entire datagram is encrypted & authenticated
2. Encrypted datagram is encapsulated in new datagram with new IP header & tunneled to destination

A

Tunnel mode

51
Q

Which protocol for an IPsec service model is this?
Provides source authentication & data integrity but not confidentiality

A

Authentication Header (AH) protocol

52
Q

Which protocol for an IPsec service model is this?
Provides source authentication, data integrity & confidentiality. More widely used then the AH protocol.

A

Encapsulation Security Protocol (ESP)

53
Q

Is this a step in authentication & encryption for a 4G or a 5G network?
MME in visited network makes authentication decision

54
Q

Is this a step in authentication & encryption for a 4G or a 5G network?
Home network provides authentication decision

55
Q

Is this a step in authentication & encryption for a 4G or a 5G network?
Uses shared-in-advance keys

56
Q

Is this a step in authentication & encryption for a 4G or a 5G network?
Keys not shared in advance for IoT

57
Q

Is this a step in authentication & encryption for a 4G or a 5G network?
Device IMSI transmitted in cleartext to BS

58
Q

Is this a step in authentication & encryption for a 4G or a 5G network?
Public key crypto used to encrypt IMSI

59
Q

Give the definition:
Isolates an organization’s internal network from larger Internet, allowing some packets to pass & blocking others

60
Q

Give the definition:
Attacker establishes many bogus TCP connections, so that there are no resources left for “actual” connections

A

SYN flooding

61
Q

What type of firewall is this?
Internal network is connected to Internet via router firewall. Filters packet-by-packet, and makes the decision to forward/drop a packet based on several criteria.

A

Stateless packet filtering

62
Q

Give the definition:
Table of rules that’s applied top to bottom of incoming packets: action & condition pairs

A

Access Control Lists (ACL)

63
Q

What type of firewall is this?
Tracks the status of every TCP connection and determines whether an incoming or outgoing packet “makes sense” by tracking connection setup (SYN) and teardown (FIN). No longer admits packets after timeout of inactive connections at firewall. Augments ACL to indicate need to check connection state table before admitting packet.

A

Stateful packet filtering

64
Q

What type of firewall is this?
Filters packets on application data as well as on IP/TCP/UDP fields

A

Application gateway

65
Q

Give the definition:
When the router can’t know if the data “really” comes from the claimed source

A

IP spoofing