CS-3310 - 05 Security - Models and Cryptography

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/29

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

30 Terms

1
New cards

What is the Bell-LaPadula model?

Confidentiality: no read up, no write down.

2
New cards

What is the Biba model?

Integrity: no write up, no read down.

3
New cards

What is a covert channel?

Unintended information leak path.

4
New cards

What is the confinement problem?

Preventing hidden communication.

5
New cards

What is steganography?

Hiding data inside other data.

6
New cards

What is cryptography?

Encoding data for secrecy.

7
New cards

What is plaintext?

Original readable data.

8
New cards

What is ciphertext?

Encrypted output.

9
New cards

What is a cryptographic key?

Value controlling encryption.

10
New cards

What is Kerckhoff's principle?

Algorithms public; keys secret.

11
New cards

What is secret-key (symmetric) cryptography?

Same key for encryption/decryption.

12
New cards

What is a drawback of symmetric keys?

Key distribution problem.

13
New cards

What is public-key cryptography?

Separate public/private keys.

14
New cards

Who invented public-key crypto?

Diffie and Hellman.

15
New cards

What is RSA based on?

Difficulty of factoring.

16
New cards

What is a one-way function?

Easy forward, hard reverse.

17
New cards

What is a hash function?

One-way fixed-length digest.

18
New cards

What is a digital signature?

Encrypted hash for authenticity.

19
New cards

What ensures non-repudiation?

Private key signature.

20
New cards

What is a digital certificate?

Public key signed by CA.

21
New cards

What is a Certification Authority (CA)?

Trusted public-key signer.

22
New cards

What is a Public Key Infrastructure (PKI)?

System for managing keys/certs.

23
New cards

What is a Trusted Platform Module (TPM)?

Hardware for secure key storage.

24
New cards

Why is the TPM controversial?

Restricts user control.

25
New cards

What are the three authentication factors?

Know, have, are.

26
New cards

What is the most common authentication method?

Password login.

27
New cards

What are weak passwords vulnerable to?

Brute-force guessing.

28
New cards

How does UNIX secure stored passwords?

Salted hashing.

29
New cards

What is a salt?

Random bits added to passwords.

30
New cards

What is a one-time password (OTP)?

Password valid once.