Immediate Attention Flashcards
What is Differential cryptanalysis?
seeks to find the difference between related plaintexts that are encrypted.
The plaintexts may differ by a few bits.
It is usually launched as an adaptive chosen plaintext attack; the attacker chooses the plaintext to be encrypted (but does not know the key) and then encrypts related plaintexts.
What is Linear cryptanalysis?
is a known plaintext attack where the cryptanalyst finds large amounts of plaintext/ciphertext pairs created with the same key. The pairs are studied to derive information about the key used to create them. Both differential and linear analysis can be combined as differential linear analysis.
What is Side-channel attacks?
use physical data to break a cryptosystem, such as monitoring CPU cycles or power consumption used while encrypting or decrypting.
What security principle can be used to help detect fraud coming from users becoming comfortable in their position?
rotation of duties
What is the purpose of rotation of duties?
to detect fraudulent behavior, which increases detection capabilities. the fact that responsibilities are routinely rotated deters fraud. Collusion prevention
What is the purpose of Separation of duties?
multiple people are required to complete critical or sensitive transactions. Minimize collusion
which plan provides strategies to detect, respond to, and limit consequences of malicious cyber incident
Cyber Incident Response Plan
Graham-Denning Model
concerned with how subjects and objects are created, how subjects are assigned rights or privileges, and how ownership of objects is managed. It has three parts: objects, subjects, and rules. It provides a more granular approach for interaction between subjects and objects. There are eight rules: Create object, create subject, delete object, delete subject, read access right, grant access right, delete access right, and transfer access right.
Harrison–Ruzzo–Ullman (HRU) Model
maps subjects, objects, and access rights to an access matrix. It is considered a variation to the Graham–Denning Model. It differs from Graham–Denning because it considers subjects to be also objects.
Incremental
only backup files that have changed since the last backup of any kind was performed and will reset archive bit. The time to perform the incremental backup is greatly reduced but it requires quite a few tapes. The most time in restoration.
Differential backups
differential backup records every piece of data in a file that has changed since the last full backup.
Diffusion
means the order of the plaintext should be spread out in the ciphertext.
Confusion
means that the relationship between the plaintext and ciphertext should be as random as possible.
What is terminology used to describe the data in data-link?
Frame
What is terminology used to describe the data in network layer?
Packets