Network Security cont Flashcards

1
Q

Key Elements of Security

A

Security Attack:
Any action that compromises the security of information.

Security Mechanism:
A mechanism that is designed to detect, prevent, or recover from a security attack (e.g. antivirus software).

Security Service:
A service that enhances the security of data processing systems and information transfers. A security service makes use of one or more security mechanisms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security Goals

A

-Confidentiality (Transmission privacy)
-Integrity (Data has not been altered)
-Authentication knowing who created or sent the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Security Attacks- Interruption

A

attack on Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Security Attacks - Interception

A

attack on Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Security Attacks - Modification

A

attack on Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Security Attacks - Modification

A

attack on Authenticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Passive Cable Taps

A

-10BASE5 cable tap
-Passive Spliced Network Tap
-LAN Tap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Types of Security Threats– Passive Threats

A

-Passive attacks are eavesdropping on, or monitoring (listening) of transmissions

-The goal of the attacker is to obtain the information that is being transmitted (i.e. interception)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Types of Security Threats– Active Threats

A

-Attempt to cause harm typically through system faults or brute force attack

-Attempt to overload the victim’s computer to the point that it either slows to an unusable crawl, hangs, or completely crashes!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Security Services - Non-repudiation (the order is final)

A

-The assurance that someone cannot deny something

-Digital Signatures ensure that a message has been electronically signed by the originator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Security Services - Access control

A

-Levels of access
-Read or write access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Security Services - Availability (permanence, non-erasure)

A

-Denial of Service Attacks
-Virus that deletes files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Methods of Defence -Encryption

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Methods of Defence - Software Controls

A

-access limitations in a data base,

-operating system protect each user from other users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Methods of Defence - Hardware Controls

A

-Smartcard access to data,

-Biometrics, finger prints, iris scans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Methods of Defence - Policies and procedures

A

E.g. frequent changes of passwords

17
Q

Methods of Defence - Physical Controls

A

Controlled access

18
Q

Security Vunerabilies

A

Securing communications over networks has always been a dilemma

-a secure way to initiate such communications is required
-The data needs to be protected at all times
-Users need to be trusted

19
Q

Security Policy Based on Organisational Requirements

A

-Prevent/Detect Security Violations
-Disaster Recovery
-Security Risk Policy
-Legal Requirements-Data Protection