Computer network Security Flashcards

1
Q

Define Security ?

A

Security is about protecting assets from threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Who is an Owner in terms of security ?

A

An owner is someone who values assets and seeks to protect assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Who is a threat agent ?

A

A threat agent is someone who values assets and seeks to abuse it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are threats ?

A

Threats are potential for a(n) asset(s) to be abused.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are countermeasures ?

A

Counter measures help reduce vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are vulnerabilities ?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Risk is measured in

A

occurrence likelihood and impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is security analysis ?

A

surveys the threats that pose risks and proposes a policy and solution at an appropriate cost.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

List all phases of security analysis ?

A

theat model -> risk assessment->security policy -> cost of countermeasures -> security solution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Explain the forces/factors acting against a system’s security

A

Computer Software Complexity
Human Factor
Expertise of Attackers and the Threat’s they pose.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

List all the profiles of Attackers you can and give examples.

A

Script Kiddies, Hobbist Hackers, Determined Hackers, Proffessional consultant, security services experts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When should you consider the profile of the attacker when doing security analysis ?

A

Risk Assessment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the security properties to ensure.

A

CIAAAA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How do i ensure confidentiality ?

A

include encryption, hashing, and access control list.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

________________ allows for two parties to confirm that they share the same information without sharing additional information.

A

private set intersection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Integrity ?

A

Information has not been altered or changed in an unauthorised or malicious way.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Ways to ensure integrity ?

A

backups, message authentication codes, checksums, data correcting code, cryptography based hashing functions and digital signatures.

18
Q

What is availability ?

A

Information and Services are accessible and modifiable in a timely fashion by those authorised to do so.

19
Q

Ways to ensure availability ?

A

use of a firewall, keep a redundant server. invest in a intrusion detection system.

20
Q

What is assurance ?

A

How trust is provided and managed in a computer system.

21
Q

How do you manage and provide trust in a computer system.

A

policies, permissions, and protection.

22
Q

What is accountability ?

A

Actions are traceable to the party/ individual responsible.

23
Q

why is keeping a secure audit trail important ?

A

so actions affecting the security of a system can be tracked back to the responsible party.

24
Q

___________________ is a stronger form of accountability.

A

non-repudiation

25
What are the ways to secure an audit trails ?
ensure that the persisted audit logs are store in isolation. an isolated remote server, printer, or make use of an append-only file.
26
What is authentication ?
Data and Services should only be available to authorised identities.
27
List Common attacks and their examples
Eavesdropping, Masquerading, repudiation, Correlation and backtrace , Denial of Service, Alteration,
28
Protection Countermeasures categories.
Prevention, Detection and Response..
29
What is Steganography ?
Study of hidden writing.
30
What is Steganalysis ?
The identification of discovery of hidden writing.
31
What is Cryptology ?
Cryptography + Cryptanalysis
32
What is cryptanalysis ?
breaking ciphers.
33
What is cryptography ?
secret writing with ciphers.
34
What is encryption ?
transforming plaintext to ciphertext.
35
What is decryption ?
recovering plaintext from ciphertext.
36
What is a Symmetric Cipher ?
A symmetric cipher is a cipher that makes use of the same key for encryption and decryption.
37
What are the two types of symmetric ciphers ?
block cipher and the stream cipher.
38
Explain the two types of symmetric ciphers and give examples o f some you know.
block and stream cipher block -> caesar cipher stream cipher -> one time pad or vernam cipher/ RC4.
39
List the types of Stream Ciphers you know.
Periodic, Non-Periodic, Synchronous and self-Synchronous.
40