MId term Flashcards

1
Q

Define plain Text

A

Text that is readable and not encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define Cipher Text

A

Text that has been encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define Encryption

A

The act of encipherment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define Decryption

A

The act of decipherment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Transposition Cipher

A

A cipher that moves letters around but does not change the letters present

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a substation Cipher

A

A cipher that substitutes letters for other letters given a rule. Eg caesar cypher substitutes one letter for that letter plus an offset in the alphabet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a polyalphabetic Cipher

A

A cypher where each letter is substituted based on the letter of the key that lines up with it in the table.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What method do you use to break a Caesar cipher

A

Frequency analysis and double letters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What method do you use to break a vigareta cipher

A

By finding the length of the key (N) and then using frequency analysis of every N’th character

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What encryption method is 100% secure

A

One time pads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is the length of a key in a one-time pad

A

The same length as the message that is encrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are side channel attacks

A

Side channel attacks attack the implementation of the encryption algorithm rather than a flaw in the encryption algorithm its self

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the C in the CIA triad

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the I in the CIA triad

A

Intergrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the A in the CIA triad

A

Accessibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What acronym represents the hexad

A

AUP

17
Q

What is the A in AUP hexad

A

Authenticity

18
Q

What is the U in AUP hexad

A

Usability

19
Q

What is the P in AUP hexad

A

Possesion

20
Q

What does integrity mean?

A

Keeping information from unauthorised changes

21
Q

What does accessibility mean?

A

Keeping information available for people to use

22
Q

What does confidentiality mean?

A

Keeping information from unauthorised access/viewing

23
Q

What does authenticity mean?

A

Knowing who or what sent a piece of information

24
Q

What does Utility mean?

A

The infomation must be in a useful state, it must not be encrypted.

25
Q

What does possession mean?

A

Control must not be lost of the information.

26
Q

What is an active threat

A

A threat that changes something in the system

27
Q

What is a passive threat

A

A threat that does not change anything in the system and observes

28
Q

What is an insider threat

A

Insider threats stem from people with permission already in the system and could involve elevation permissions or abusing current ones.

29
Q

What is an outsider threat

A

Outsider threats stem from outside the system and access to the system must be established first.

30
Q

what is a vulnerability

A

A weakness that could be exploited by a threat source.

31
Q

What is a thre

A

Is a event or circumstance where a vulnerability could be exploited.

32
Q

What is an attack

A

An attack is an intentional attempt to gain unauthorised access or unauthorised modifications to information.