Computer Security Test 1

Ace your homework & exams now with Quizwiz!

Example of Modification

-unauthorised changing values in a database -modify hardware

Ozil is given the right to read and modify FileArsenal.docx

Violation of Integrity

Denial of Services (DOS) attacks are caused by

replay attacks

Access Control

specifies and controls who can access what

Types of Attacks

Passive Attack Active Attack

In what type of attack that there is no modification to message contents?

Passive attacks

OS Controls

Trusted OS Confined programs Access logs for auditing

Non-repudiation

does not allow the sender of a message to refute the claim of not sending the message

Confidentiality

ensures that computer related assets are accessed only by authorised parties

Example of Interruption

erasure of a program or data file, malicious destruction of a hardware device

(Cryptographic Services) Confidentiality

content cannot be revealed

Stream cipher

convert each symbol of the plaintext into a symbol of ciphertext

Encryption can be used to defense the _______ of data

secrecy

Interception

some unauthorised party has gained access to an asset

Fabrication

unauthorised party might create a fabrication of counterfeit objects on a computing system

Modification

unauthorised party not only accesses but tampers with an asset

Attack

Realization of a threat

Passive Attack

the attacker only monitors free traffic attacking the confidentiality of the data

Encryption

the process of coding message so that it's meaning is concealed

Decryption

the process of transforming encrypted message into the original form

Example of Interception

-Wiretapping to obtain data in a network -Illicit copying of programs or data files

Adminstrative Controls

-enforcing standards of design, documentations, programming, testing, configuration management -security audits -separation of duties among employees

Allowing certain users specific accesses comes in the purview of ________________?

Access control

In what attack that the message contents are modified?

Active attacks

What attack is related to confidentiality?

Interception

Software Controls

Internal Program Controls Operating System Controls Independent Control Programs Development Controls

What attack is related to availability?

Interruption

4 Primary Security Principles

Confidentiality, Authentication, Non-repudiation, Integrity

What attack is related to authentication?

Fabrication

Type of Vulnerabilities

Hardware, software, data, others

Input to DES is divided into blocks of 64 bits. It is then permutated by a process called ____?

Initial Permutation

What attack is related to integrity?

Modification

Controls Against Program Threats

OS Controls Adminstrative controls

If the recipient of the message has to be satisfied with the identity of the sender, which principle comes into picture?

Principle of Authentication

Which principle is violated when a Computer is not accessible?

Principle of Availability

Only the sender and the intended recipients have access to the contents of a message

Principle of Confidentiality

The contents of the message must not be modified while the message is in transmission to ensure the ________________?

Principle of Integrity

Ensures that the sender of a message cannot later claim that the message was never sent

Principle of non repudiation

What can be achieved by using Cryptography?

Secrecy, Integrity

Hardware Controls

Smart card Locks Devices to verify identities Boards to control access to disks

Methods of Defense

Software controls, hardware controls, physical controls

Walcott crashes the operating system IN Ramsey 's computer

Violation of Availability

Alexis copies Wilshere's homework

Violation of Confidentiality

Carl installs a software(sniffer) and captures his office mate's traffic

Violation of Confidentiality

Jack hacks the website of www.visa.com and adds a message in support of wikileaks

Violation of Integrity

Nick pretends to be a system administrator and calls Ellen from human resources at his company to ask for her password. He then logs in as Ellen and increases his salary by 20%

Violation of Integrity

Cryptosystem

a system for encryption and decryption

Vulnerabilities

a weakness in the system that can be exploited

Accountability

ability to map between action in a system and responsibility for the action

Example of Fabrication

adding records to a database insert spurious transactions to a network communication system

Active attack

adversary attempts to alter the transmission attacking data integrity, confidentiality, and authentication

Interruption

an asset become lost, unavailable, or unusable

Availability

assets are accessible to authorised parties at appropriate times

Integrity

assets can be modified only by authorised parties or only in authorised ways

Key-based Algorithm

based on the secrecy of the algorithm, the secrecy of the key(s), or both

Block Cipher

break the plaintext into strings(blocks) of fixed lengths and encrypt one block at a time

Threats

has potentiality for loss or harm

Authentication

identifies the user of the computer system and builds a trust with the recipient of the message

Physical Controls

lock on doors backups

(Cryptographic Services) Integrity

message cannot be altered

(Cryptographic Services) Authentication

message cannot be forged

(Cryptographic Services) Non-repudiation

only sender could have produced the message

Restricted Algorithm

requires keeping the algorithm secret


Related study sets

Thoracic spine plus scoliosis- from the book

View Set

Human Biology Chapter 2 Online Quiz

View Set

Lifespan Development Ch 7. Early Childhood

View Set

MARK 380 Digital Marketing Overview

View Set