Security Flashcards

1
Q

Masquerading attack

A

Pretending to be another entity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

What are the four main types of security violations?

A
  1. Breach of confidentiality (unauthorised data access)
  2. Breach of integrity (unauthorised data modification)
  3. Breach of availability (unauthorised data destruction)
  4. Theft of service (unauthorised resource use)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Replay attack

A

Maliciously resending valid data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Man-in-the-middle

A

Intercepting and altering communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

At which 4 levels must security be implemented?

A
  1. Physical (data centres, hardware)
  2. Human (prevent social engineering)
  3. Operating System (protection mechanisms)
  4. Network (secure communications)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Threats: Trojan Horse

A

Disguised malware e.g. fake login

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Threats: Logic Bomb

A

Triggers under specific conditions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Threats: Buffer Overflow

A

Overwrites memory to exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Threats: Virus

A

Self-replicating code infects files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Symmetric Encryption

A

Uses one shared skey to encrypt/decrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Asymmetric Encryption

A

Uses public key (encrypt) and private key (decrypt)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does RSA encryption work?

A
  1. Generate primes p and q; compute N=p*q
  2. Public key: (ke, N)
  3. Private key: (kd, N)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Worms

A

Self-replicating malware e.g. Morris worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DoS attacks

A

Overloads systems to deny service e.g. traffic floods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Plaintext

A

Original message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Ciphertext

A

Encrypted message

16
Q

Cipher

A

Algorithm for encryption/decryption

17
Q

Why is cryptography essential in networks?

A

Prevents eavesdropping/spoofing by ensuring:
- Confidentiality (only authorised parties read data)
- Authentication (verify sender/receiver)