Intro Flashcards

1
Q

Mention two options for attacks and mention examples for each.

A

Passive attacks
1.Eavesdropping
Active attacks
1.All passive attacks
2.Delay
3.replay
Deletion, modification etc..

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 6 security goals? explain them and give an example of how we can achieve them.

A

1.confidentiality: Make sure that the data transfared is encrypted
2.data integrity: make sure that the data transfared hasnt been tampered with (hashing)
3.authenticity: make sure that the data we received came from the correct source we are expecting. (digital signature)
4.Availability: make sure that the system is available and function correctly
5.Controlled access: Only authorized entities can access certain services or information (access control system or firewall)
6.Accountanility: Identify the entity responsible for a (communication) event/change at a file/… (logging system)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a vulnerability?

A

It is a design flaw in a cryptographic protocol, programming error, etc.. which exists in a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a threat

A

The possibility that someone abuses a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly