logistic_guy
Senior Member
- Joined
- Apr 17, 2024
- Messages
- 1,065
Match the definitions with their titles.
\(\displaystyle \bold{1.}\) Define the three security goals.
\(\displaystyle \bold{2.}\) Distinguish between passive and active security attacks. Name some passive attacks. Name some active attacks.
\(\displaystyle \bold{3.}\) List and define five security services discussed in this chapter.
\(\displaystyle \bold{4.}\) Define eight security mechanisms discussed in this chapter.
\(\displaystyle \bold{5.}\) Distinguish between cryptography and steganography.
\(\displaystyle \bold{A.}\)
Data confidentiality: Protects data from unauthorized disclosure.
Data integrity: Ensures data remains unmodified.
Authentication: Verifies the identity of users.
Nonrepudiation: Ensures data delivery can be verified.
Access control: Manages user permissions.
\(\displaystyle \bold{B.}\)
Encipherment: Hides data using cryptography or steganography.
Data integrity: Uses checksums to verify data hasn't changed.
Digital signature: Verifies data with private and public keys.
Authentication exchange: Verifies identity through message exchange.
Traffic padding: Adds dummy data to disrupt analysis.
Routing control: Changes packet routes to prevent interception.
Notarization: Involves a third party to verify communication.
Access control: Verifies user access, typically using passwords.
\(\displaystyle \bold{C.}\)
Confidentiality: Ensures data is accessible only to authorized users.
Integrity: Guarantees data hasn't been tampered with.
Accessibility: Ensures data is available to authorized users when needed.
\(\displaystyle \bold{D.}\)
Steganography: Hides data within other data (e.g., images, music).
Cryptography: Changes data to make it unrecognizable (e.g., hashing).
\(\displaystyle \bold{E.}\)
Passive attacks: Only observe or intercept data (e.g., snooping, phishing).
Active attacks: Modify or disrupt data (e.g., ransomware, DOS).
\(\displaystyle \bold{1.}\) Define the three security goals.
\(\displaystyle \bold{2.}\) Distinguish between passive and active security attacks. Name some passive attacks. Name some active attacks.
\(\displaystyle \bold{3.}\) List and define five security services discussed in this chapter.
\(\displaystyle \bold{4.}\) Define eight security mechanisms discussed in this chapter.
\(\displaystyle \bold{5.}\) Distinguish between cryptography and steganography.
\(\displaystyle \bold{A.}\)
Data confidentiality: Protects data from unauthorized disclosure.
Data integrity: Ensures data remains unmodified.
Authentication: Verifies the identity of users.
Nonrepudiation: Ensures data delivery can be verified.
Access control: Manages user permissions.
\(\displaystyle \bold{B.}\)
Encipherment: Hides data using cryptography or steganography.
Data integrity: Uses checksums to verify data hasn't changed.
Digital signature: Verifies data with private and public keys.
Authentication exchange: Verifies identity through message exchange.
Traffic padding: Adds dummy data to disrupt analysis.
Routing control: Changes packet routes to prevent interception.
Notarization: Involves a third party to verify communication.
Access control: Verifies user access, typically using passwords.
\(\displaystyle \bold{C.}\)
Confidentiality: Ensures data is accessible only to authorized users.
Integrity: Guarantees data hasn't been tampered with.
Accessibility: Ensures data is available to authorized users when needed.
\(\displaystyle \bold{D.}\)
Steganography: Hides data within other data (e.g., images, music).
Cryptography: Changes data to make it unrecognizable (e.g., hashing).
\(\displaystyle \bold{E.}\)
Passive attacks: Only observe or intercept data (e.g., snooping, phishing).
Active attacks: Modify or disrupt data (e.g., ransomware, DOS).