Intro Flashcards
Mention two options for attacks and mention examples for each.
Passive attacks
1.Eavesdropping
Active attacks
1.All passive attacks
2.Delay
3.replay
Deletion, modification etc..
What are the 6 security goals? explain them and give an example of how we can achieve them.
1.confidentiality: Make sure that the data transfared is encrypted
2.data integrity: make sure that the data transfared hasnt been tampered with (hashing)
3.authenticity: make sure that the data we received came from the correct source we are expecting. (digital signature)
4.Availability: make sure that the system is available and function correctly
5.Controlled access: Only authorized entities can access certain services or information (access control system or firewall)
6.Accountanility: Identify the entity responsible for a (communication) event/change at a file/… (logging system)
What is a vulnerability?
It is a design flaw in a cryptographic protocol, programming error, etc.. which exists in a system
What is a threat
The possibility that someone abuses a vulnerability