Introduction Flashcards
Which are the main Security Goals?
(CADAC) Confidentiality, Accountability, Data Integrity, Availability, Controlled Access.
What does Confidentiality mean?
Confidentiality means that data transmitted or stored should be only be disclosed to those entitled. Confidentiality of entitles is also referred to as anonymity..
What does data integrity mean?
Data integrity means that it should be possible to detect any modification of data, as well as it requires to be able to identify the creator of some data.
What does accountability mean?
Accountability means that it should be possible to identify the entity responsible for any communication event.
What does availability mean?
Availability means that services should be available and function correctly.
What does controlled access mean?
Controlled access mean that only authorized entities should be able to access certain services or information.
Which are the main security threat types?
(REFILS) Repudiation (denial of communication acts), eavesdropping, forgery of information, impersonation (masquerade), loss or modification of information, sabotage.
Explain masquerade/impersonation.
Masquerade or impersonation is when an entity claims to be another entity.
Explain eavesdropping.
Eavesdropping is when an entity reads information it is not intended to read.
Explain authorization violation.
Authorization violation is when an entity uses a service or resources it is not intended to use.
Explain loss or modification of information.
loss or modification of information is when data is being altered or destroyed.
Explain denial of communication acts (repudiation).
Denial of communication acts (or repudiation) is when an entity falsely denies its participation in a communication act.
Explain forgery of information.
Forgery of information is when an entity creates new information in the name of another entity.
Explain sabotage.
Sabotage is any action that aims to reduce the availability and/or correct functioning of services or systems.
What does a detailed network security analysis needs?
A detailed network security analysis needs:
- evaluates the risk potential of the general threats to the entities using a network; and
- estimates the expenditure (resources, time, etc.) needed to perform known attacks.
Why a detailed security analysis of a given network / configuration / specific protocol architecture would required/is important?
- Might be required in order to convince financially controlling entities in an enterprise to grant funding for security enhancements
- evaluates the feasibility and costs on different attacks and compares it to the cost of protection.
What are the possible classification of attacks against protocols?
Passive and active attacks.
What is an active attack?
An active attack is an attack which has active intervention of attackers. Ex.: man-in-the-middle attack, any manipulation of protocol (such as modification, insertion, deletion of packets), IP-spoofing, phishing…
What is a passive attack?
A passive attack is an attack which the attacker is not involved in the protocol. Ex.: attacker observes the protocol, tries to gain information, eavesdropping attack, war-driving (sniffing at wireless network)
Where can an attack happen in a layered protocol architecture?
In the interface (endsystem [initiator/responder], network) or in the layers (application layer, communication layer, etc).
What is a cryptographic algorithm?
A cryptographic algorithm is a mathematical transformation of input data (e.g. data, key) to output data.
Where are the cryptographic algorithms used?
Cryptographic algorithms are used in cryptographic protocols.
What is a cryptographic protocol?
A cryptographic protocol is a series of steps and message exchange between multiple entities in order to achieve a specific security objective.