computer security

logistic_guy

Senior Member
Joined
Apr 17, 2024
Messages
1,065
Match the definitions with their titles.

\(\displaystyle \bold{1.}\) Define the three security goals.
\(\displaystyle \bold{2.}\) Distinguish between passive and active security attacks. Name some passive attacks. Name some active attacks.
\(\displaystyle \bold{3.}\) List and define five security services discussed in this chapter.
\(\displaystyle \bold{4.}\) Define eight security mechanisms discussed in this chapter.
\(\displaystyle \bold{5.}\) Distinguish between cryptography and steganography.

\(\displaystyle \bold{A.}\)
Data confidentiality: Protects data from unauthorized disclosure.
Data integrity: Ensures data remains unmodified.
Authentication: Verifies the identity of users.
Nonrepudiation: Ensures data delivery can be verified.
Access control: Manages user permissions.

\(\displaystyle \bold{B.}\)
Encipherment: Hides data using cryptography or steganography.
Data integrity: Uses checksums to verify data hasn't changed.
Digital signature: Verifies data with private and public keys.
Authentication exchange: Verifies identity through message exchange.
Traffic padding: Adds dummy data to disrupt analysis.
Routing control: Changes packet routes to prevent interception.
Notarization: Involves a third party to verify communication.
Access control: Verifies user access, typically using passwords.

\(\displaystyle \bold{C.}\)
Confidentiality: Ensures data is accessible only to authorized users.
Integrity: Guarantees data hasn't been tampered with.
Accessibility: Ensures data is available to authorized users when needed.

\(\displaystyle \bold{D.}\)
Steganography: Hides data within other data (e.g., images, music).
Cryptography: Changes data to make it unrecognizable (e.g., hashing).

\(\displaystyle \bold{E.}\)
Passive attacks: Only observe or intercept data (e.g., snooping, phishing).
Active attacks: Modify or disrupt data (e.g., ransomware, DOS).
 
\(\displaystyle \bold{1.}\) Define the three security goals.

Confidentiality: Ensures data is accessible only to authorized users.
Integrity: Guarantees data hasn't been tampered with.
Accessibility: Ensures data is available to authorized users when needed.
 
\(\displaystyle \bold{2.}\) Distinguish between passive and active security attacks. Name some passive attacks. Name some active attacks.

Passive attacks: Only observe or intercept data (e.g., snooping, phishing).
Active attacks: Modify or disrupt data (e.g., ransomware, DOS).
 
Top