07 Handout 1 - Security and Cryptography

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/41

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

42 Terms

1
New cards

Confidentiality

is the art of ensuring that data is kept private and accessed only by the intended recipient.

2
New cards

Integrity

is the art of ensuring that data is transmitted from source to destination without alteration.

3
New cards

Availability

is the information created and stored by an organization that needs to be available to authorized entities

4
New cards

Authentication

is the process of verifying that the user is exactly who he claims to be.

5
New cards

Single-factor authentication

is usually done through the use of passwords or user IDS.

6
New cards

Two-factor authentication

is a two-step verification that provides an extra layer of security beyond user ID and password, usually with a software code generator or a hardware-based login key.

7
New cards

Network Attacks

It is an intrusion on network infrastructure.

8
New cards

Network Attacks Example:

o The attacker first analyzes the environment and collects information in order to exploit the existing open ports or vulnerabilities.

o An attack can be performed either from outside of the organization by an unauthorized entity or from within the company by an “insider” that already has some access to the network

9
New cards

Security Goals and Services

  1. Confidentiality

  2. Integrity

  3. Availability

  4. Authentication

10
New cards

Snooping

refers to unauthorized access to or interception of data.

11
New cards

Traffic Analysis.

Although encipherment of data may make it unintelligible for the interceptor, she can obtain some other types of information by monitoring online traffic.

12
New cards

Attacks Threatening Confidentiality:

  1. Snooping

  2. Traffic Analysis

13
New cards

Modification

After intercepting or accessing information, the attacker modifies the information to make it beneficial to herself.

14
New cards

Masquerading

happens when the attacker impersonates somebody else.

15
New cards

Replaying

The attacker obtains a copy of a message sent by a user and later tries to replay it.

16
New cards

Repudiation

This type of attack is different from others because it is performed by one of the two parties in the communication: the sender or the receiver.

17
New cards

Attacks Threatening Integrity:

  1. Modification

  2. Masquerading

  3. Replaying

  4. Repudiation

18
New cards

Denial of Service (DoS)

may slow down or totally interrupt the service of a system.

19
New cards

Network sniffing (packet sniffing)

is a process of capturing the data packets traveling in the network. It is used by IT professionals to analyze and monitor the traffic to find such things as unexpected suspicious traffic.

20
New cards

Spoofing

is a process by which an intruder masquerades as a trusted user in order to gain unauthorized access to a secure environment

21
New cards

IP address spoofing

is a process of creating IP packets with forged source IP address to impersonate a legitimate system. This kind of spoofing is often used in denial-of-service (DoS) attacks.

22
New cards

ARP spoofing

is a process of sending fake ARP messages in the network. The purpose of this type of spoofing is to associate the MAC address with the IP address of another legitimate host, causing traffic redirection to the attacker’s system.

23
New cards

DNS spoofing

is an attack where the wrong data is inserted into the DNS server cache, causing the DNS server to divert the traffic by returning wrong IP addresses as the results for client queries.

24
New cards

Man-in-the-middle (MITM) attack

is an attack that involves placing a software agent between the client and server ends before or during a communication session

25
New cards

A replay attack

is a variation on the man-in-the-middle attack. In this case, an agent is once again placed within the client-server line of communication where it records the transaction data.

26
New cards

How does DoS disruptthe network?

A DoS attack can be in the form of flooding the network with invalid data until traffic from authorized network users cannot be processed.

It can also be in the form of disrupting communication between hosts and clients through the modification of system configurations.

It can be in the form of causing physical network destruction, such as crashing a server or router in the network.

27
New cards

distributed denial-of-service attack (DDoS),

An attacker can initiate a DoS attack from multiple computers or systems. This type of attack is called a

28
New cards

Trojan horse

is a program that installs malicious software while under the guise of doing something else

29
New cards

Session hijacking

refers to the exploitation of a valid computer to gain unauthorized access to information or services in a computer system.

30
New cards

Phishing

is an attack in which the attacker attempts to fraudulently acquire sensitive information, such as usernames, passwords, and credit card details, by masquerading as a trustworthy entity in a communication session

31
New cards

Encryption

is a method of concealing information from a recognizable text into encrypted form.

32
New cards

plaintext (or cleartext)

ion is a method of concealing information from a recognizable text into encrypted form. Encryption transforms readable text, called

33
New cards

ciphertext

into an unintelligible form, called ____, using an encryption algorithm.

34
New cards

encryption algorithm

The purpose of an ____ is to scramble a message so that it remains secure even if the ciphertext is transmitted over a nonsecure medium

35
New cards

decryption

• The process of recovering a plaintext from its ciphertext is called .

36
New cards

cryptosystem

• A system that encrypts and decrypts information is called a .

37
New cards

cryptography

The art of creating and using cryptosystems is called ,

38
New cards

cryptanalysis

the art of breaking encrypted messages (usually by intruders) is called

39
New cards

cryptology

o The study of cryptography and cryptanalysis is called .

40
New cards

key

Both encryption and decryption use a _____

41
New cards

• Symmetric Cryptosystems

The same key is used for encryption and decryption.

o Both the originator and the recipient of a message must know the key, which is either known to the recipient through some prior arrangement or communicated in parallel with the ciphertext.

42
New cards

• Public-Key Cryptosystems (or Asymmetric Cryptosystems)

A public-key cryptosystem uses one key (public-key) for encryption and another key (private-key) for decryption. Each user is assigned a pair of unique and mathematically related keys: a public key and a private key.

o The private key is a secret key that is available only to the owner, and the public key is published.