Session 17 Flashcards

1
Q

Information Security Challenges

A

client user (unauthorized access, errors)- communication line (tapping, sniffing, message alteration, theft & fraud, radiation)- corporate servers (hacking viruses & worms, theft and fraud, vandalism, denial of service attacks) - corporate systems to database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

the system triangle

A

security- functionality- ease of use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CIA Framework

A

Confidentiality- the improper disclosure of information
Integrity- the improper modification of data
Availability- the unauthorized denial of service to data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is DOS attack

A

DOS define: denial of service & attacking the availability aspect of the system
Types of DOS Attacks: technical attacks, non-technical attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Identity Theft: Phishing

A

sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Identity Theft: Spoofing

A

is an attack in which one person or program successfully masquerades as another by falsifying data, thereby gaining an illegitimate advantage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Managing passwords

A

main use of password: authentication/identification
(security threats: all passwords are crackable)
securing passwords: hashing (no one expect the user can ever see the password)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Encryption & Decryption

A

scrambling & unscrambling
Advantage of digital vs. analog signals (more secure, more flexible)
Encryption key vs decryption Key
(public/private key structure: public key shared - encrypting info.
private key- kept secret- decrypting info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Public & Private Keys

A

Sender- encrypt with public key- scrambled message- decrypt with private key- recipient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly