CIS 473 Final Question Set 1 Flashcards
What is Authenticity?
Verifying that users are who they say they are and that each input arriving at the system came from a trusted source
What is the security goal ofAccountability?
The security goal that generates the requirement for actions of an entity to be traced uniquely to that entity
What isConfidentiality ?
Preserve authorized restrictions on information accessand disclosure, including means for protecting personal privacy and proprietaryinformation.A loss of confidentiality is the unauthorized disclosure ofinformation.
What isIntegrity ?
Guard against improper information modification or destruction,including ensuring information nonrepudiation and authenticity.A loss ofintegrity is the unauthorized modification or destruction of information.
What is Availability ?
What is the consequence of loss in availability ?
Ensure timely and reliable access to and use of information.
A loss of availability is the disruption of access to or use of information or aninformation system
What are the Passive Attacks ?
Passive attacks are in the nature of eavesdropping on, or monitoringof, transmissions. The goal of the opponent is to obtain information that is beingtransmitted. Two types of passive attacks are the release of message contents andtraffic analysis.
What are Active Attacks ?
Active attacks involve some modification of the data stream or thecreation of a false stream and can be subdivided into four categories: masquerade,replay, modification of messages, and denial of service.
What is Access Controls ?
What is its goal ?
is ability to limit and control the access to host systems and applications via communication links.To achieve this, each entity trying to gain access must first be indentified, or authenticated, so that access rights can be tailored to the individual
What is the functions of Nonrepudition ?
prevents either sender or receiver from denying a transmitted message.Thus, when a message is sent, the receiver can prove that the alleged sender infact sent the message. Similarly, when a message is received, the sender can provethat the alleged receiver in fact received the message.
what is Cryptanalysis ?
is an encryption scheme is computaionally secure if the ciphertext generated by the scheme meets one or both of the following cirteria.
- The cost of breaking the cipher exceeds the value of the encrypted information.
- The time required to break the cipher exceeds the useful lifetime of the information.
What is Cryptography ?
the study of encryption principles/methods
What is Cryptology ?
field of both cryptography and cryptanalysis
What are the two requirements for secure use of symmetric encryption?
- a strong encryption algorithm
* sender and reciever must have obtained copies of secret key in a secure fashion and must keep the key secure
What does the Block Ciphers do?
a block cipher processes the plaintext input in fixed-sized blocks and produces a block of ciphertext of equal size for each plaintext block.
What are the three most important symmertric block ciphers ?
- Data Encryption Standard (DES)
- Triple DES (3DES)
- The Advanced Encryption Standard (AES)Note: AES > 3DES > DES