Computer network Security Flashcards

1
Q

Define Security ?

A

Security is about protecting assets from threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Who is an Owner in terms of security ?

A

An owner is someone who values assets and seeks to protect assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Who is a threat agent ?

A

A threat agent is someone who values assets and seeks to abuse it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are threats ?

A

Threats are potential for a(n) asset(s) to be abused.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are countermeasures ?

A

Counter measures help reduce vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are vulnerabilities ?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Risk is measured in

A

occurrence likelihood and impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is security analysis ?

A

surveys the threats that pose risks and proposes a policy and solution at an appropriate cost.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

List all phases of security analysis ?

A

theat model -> risk assessment->security policy -> cost of countermeasures -> security solution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Explain the forces/factors acting against a system’s security

A

Computer Software Complexity
Human Factor
Expertise of Attackers and the Threat’s they pose.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

List all the profiles of Attackers you can and give examples.

A

Script Kiddies, Hobbist Hackers, Determined Hackers, Proffessional consultant, security services experts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When should you consider the profile of the attacker when doing security analysis ?

A

Risk Assessment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the security properties to ensure.

A

CIAAAA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How do i ensure confidentiality ?

A

include encryption, hashing, and access control list.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

________________ allows for two parties to confirm that they share the same information without sharing additional information.

A

private set intersection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Integrity ?

A

Information has not been altered or changed in an unauthorised or malicious way.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Ways to ensure integrity ?

A

backups, message authentication codes, checksums, data correcting code, cryptography based hashing functions and digital signatures.

18
Q

What is availability ?

A

Information and Services are accessible and modifiable in a timely fashion by those authorised to do so.

19
Q

Ways to ensure availability ?

A

use of a firewall, keep a redundant server. invest in a intrusion detection system.

20
Q

What is assurance ?

A

How trust is provided and managed in a computer system.

21
Q

How do you manage and provide trust in a computer system.

A

policies, permissions, and protection.

22
Q

What is accountability ?

A

Actions are traceable to the party/ individual responsible.

23
Q

why is keeping a secure audit trail important ?

A

so actions affecting the security of a system can be tracked back to the responsible party.

24
Q

___________________ is a stronger form of accountability.

A

non-repudiation

25
Q

What are the ways to secure an audit trails ?

A

ensure that the persisted audit logs are store in isolation. an isolated remote server, printer, or make use of an append-only file.

26
Q

What is authentication ?

A

Data and Services should only be available to authorised identities.

27
Q

List Common attacks and their examples

A

Eavesdropping, Masquerading, repudiation, Correlation and backtrace , Denial of Service, Alteration,

28
Q

Protection Countermeasures categories.

A

Prevention, Detection and Response..

29
Q

What is Steganography ?

A

Study of hidden writing.

30
Q

What is Steganalysis ?

A

The identification of discovery of hidden writing.

31
Q

What is Cryptology ?

A

Cryptography + Cryptanalysis

32
Q

What is cryptanalysis ?

A

breaking ciphers.

33
Q

What is cryptography ?

A

secret writing with ciphers.

34
Q

What is encryption ?

A

transforming plaintext to ciphertext.

35
Q

What is decryption ?

A

recovering plaintext from ciphertext.

36
Q

What is a Symmetric Cipher ?

A

A symmetric cipher is a cipher that makes use of the same key for encryption and decryption.

37
Q

What are the two types of symmetric ciphers ?

A

block cipher and the stream cipher.

38
Q

Explain the two types of symmetric ciphers and give examples o f some you know.

A

block and stream cipher

block -> caesar cipher
stream cipher -> one time pad or vernam cipher/ RC4.

39
Q

List the types of Stream Ciphers you know.

A

Periodic, Non-Periodic, Synchronous and self-Synchronous.

40
Q
A