Exam 1 Flashcards
Security Attack
Any action that compromises the security of information
Security Mechanism
A mechanism that is designed to detect, prevent, or recover from a security attack
Security Service
A service that enhances the security of data processing systems and information transfers. A security service makes use of one or more security mechanisms
What are some examples of Passive Threats?
- Release of message content
- Traffic analysis
What are some examples of Active Threats?
- Masquerade
- Replay
- Modification of message contents
- Denial of service
Name some security services
- Confidentiality (privacy)
- Authentication (who created or sent the data)
- Integrity (has not been altered)
- Non-repudiation (the order is final)
- Access control (prevent misuse of resources)
- Availability (permanence, non-erasure)
- Denial of service attack
- Virus that deletes files
Methods of Defense
- Encryption
- Software control (access limitations in a data base, in operating system protect each user from other users)
- Hardware Controls (smartcard)
- Policies (frequent changes of passwords)
- Physical Controls
What are Specific Security Mechanisms?
- May be incorporated into the appropriate protocol layer in order to provide some of the OSI security services
- Encipherment
- Digital Signature
- Access Control
- Data Integrity
- Authentication Exchange
- Traffic Padding
- Routing Control
- Notarization
Encipherment
The use of mathematical algorithms to transform data into a form that is not readily intelligible. The transformation and subsequent recovery of the data depend on an algorithm and zero or more encryption keys.
Digital Signature
Data appended to, or a cryptographic transformation of, a data unit that allows a recipient of the data unit to prove the source of integrity of that data unit and protect against forgery (e.g. by the recipient)
Access Control
A variety of mechanisms that enforce access rights to resources.
Data Integrity
A variety of mechanisms used to assure the integrity of a data unit or stream of data units.
Authentication Exchange
A mechanism intended to ensure the identity of an entity be means of information exchange
Traffic Padding
The insertion of bits into gaps in a data stream of frustrate traffic analysis attempts
Routing Control
Enables selection of particular physically secure routes for certain data and allows routing changes, especially when a breach of security is suspected
Notarization
The use of a trusted third party to assure certain properties of a data exchange
Conventional Encryption Principles
- An encryption scheme has five ingredients:
- Plaintext
- Encryption algorithm
- Secret Key
- Ciphertext
- Decryption algorithm
- Security depends on the secrecy of the key, not the secrecy of the algorithm
Cryptography
- Classified along three independent dimensions:
- The type of operations used for transforming plaintext to ciphertext
- Substitution: Each element (bit, letter) in the plaintext is mapped to another element (e.g., B -> F)
- Transposition: Elements in the plaintext are re-arranged (change locations)
- The type of operations used for transforming plaintext to ciphertext
- The number of keys used
- Symmetric (singe key)
- Asymmetric (two keys, or public-key encryption)
- The way in which the plaintext is processed
- One block at a time - block cipher
- Element by element, continuously - stream cipher