Week 13 UAS Flashcards
1
Q
Security rests on?
A
- confidentiality
- authenticity
- integrity
- availability.
2
Q
Attacks Classification?
A
1. Passive Attacks – System unaltered, hard to detect. – Eavesdropping on, or monitoring of, transmissions to: • obtain message contents, or • monitor traffic flows.
- Active Attacks .
– System altered, easier to detect. – ModificaAon of data stream to:
• masquerade of one enAty as some other.
• replay previous messages.
• modify messages in transit.
• denial of service.
3
Q
Impact of attacks?
A
• Theft of confidential information. • Unauthorized use of – Network bandwidth. – Computing resource. • Spread of false information. • Disruption of legitimate services.
4
Q
Methods of Defence from Attacks?
A
• Information Protection – Encryption. • Software Controls – Access limitations in a data base. – In operating system protect each user from other users. • Hardware Controls – Smartcard, biometric. • Policies – Frequent changes of passwords. • Physical Controls
5
Q
Study of encryption principles/methods
characterized by
A
• Number of keys used. – Single-key or secret key. – Two-key or public key. • Type of encryption operations used – Substitution. – Transposition. – Product . • Way in which plaintext is processed – Block. – Stream.
6
Q
An encryption scheme has five ingredients:
A
- Plaintext.
- Encryption algorithm.
- Secret Key.
- Ciphertext.
- Decryption algorithm.
7
Q
Key in cryptography?
A
- Public-key, which may be known by anybody.
2. Private-key, known only to the recipient.