Computer Security: Principles and Practice, 4th Edition Midterm Review

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/96

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

97 Terms

1
New cards

T

Access control is the central element of computer security.

2
New cards

T

An auditing function monitors and keeps a record of user accesses to system resources.

3
New cards

T

The principal objectives of computer security are to prevent
unauthorized users from gaining access to resources, to prevent legitimate users from accessing resources in an unauthorized manner, and to enable legitimate users to access resources in an authorized manner.

4
New cards

T

A user may belong to multiple groups.

5
New cards

T

An access right describes the way in which a subject may access an object.

6
New cards

F

Traditional RBAC systems define the access rights of individual users and groups of users.

7
New cards

Access control

1. __________ implements a security policy that specifies who or what may have access to each specific system resource and the type of access that is permitted in each instance.

8
New cards

Authentication

__________ is verification that the credentials of a user or other system entity are valid.

9
New cards

Authorization

_________ is the granting of a right or permission to a system entity to access a system resource.

10
New cards

DAC

__________ is the traditional method of implementing access control.

11
New cards

MAC

__________ controls access based on comparing security labels with security clearances.

12
New cards

mandatory access control

A concept that evolved out of requirements for military information security is ______ .

13
New cards

subject

A __________ is an entity capable of accessing objects.

14
New cards

object

A(n) __________ is a resource to which access is controlled.

15
New cards

RBAC

__________ is based on the roles the users assume in a system rather than the user's identity.

16
New cards

role

A __________ is a named job function within the organization that controls this computer system

17
New cards

Constraints

__________ provide a means of adapting RBAC to the specifics of administrative and security policies in an organization.

18
New cards

Cardinality

__________ refers to setting a maximum number with respect to roles.

19
New cards

ABAC

Subject attributes, object attributes and environment attributes are the three types of attributes in the __________ model.

20
New cards

access management

The __________ component deals with the management and control of the
ways entities are granted access to resources.

21
New cards

Object

The basic elements of access control are: subject, __________, and access right.

22
New cards

Environment

The three types of attributes in the ABAC model are subject attributes, object attributes, and _________ attributes.

23
New cards

T

User authentication is the fundamental building block and the primary line of defense.

24
New cards

F

Identification is the means of establishing the validity of a claimed identity provided by a user.

25
New cards

T

Many users choose a password that is too short or too easy to guess.

26
New cards

T

User authentication is the basis for most types of access control and for user accountability.

27
New cards

F

Memory cards store and process data.

28
New cards

T

Enrollment creates an association between a user and the user's biometric characteristics.

29
New cards

T

In a biometric scheme some physical characteristic of the individual is mapped into a digital representation.

30
New cards

password cracker

A __________ is a password guessing program.

31
New cards

reactive password checking

A __________ strategy is one in which the system periodically runs its own password cracker to find guessable passwords.

32
New cards

facial characteristics

The most common means of human-to-human identification are __________.

33
New cards

Hand geometry

__________ systems identify features of the hand, including shape, and lengths and widths of fingers.

34
New cards

enrolled

Each individual who is to be included in the database of authorized users must first be __________ in the system.

35
New cards

host attack

A __________ is directed at the user file at the host where passwords, token passcodes, or biometric templates are stored.

36
New cards

replay

A __________ attack involves an adversary repeating a previously captured user response.

37
New cards

Identification

An authentication process consists of the _________ step and the verification step.

38
New cards

tokens

Objects that a user possesses for the purpose of user authentication are called ________

39
New cards

Biometric

A __________ authentication system attempts to authenticate an individual based on his or her unique physical characteristics.

40
New cards

denial-of-service

A _________ attack attempts to disable a user authentication service by flooding the service with numerous authentication attempts.

41
New cards

T

Symmetric encryption is used primarily to provide confidentiality

42
New cards

T

Two of the most important applications of public-key encryption are digital signatures and key management.
True or False

43
New cards

F

Cryptanalytic attacks try every possible key on a piece of ciphertext until an intelligible translation into plaintext is obtained.
True or False

44
New cards

T

The secret key is input to the encryption algorithm.
True or False

45
New cards

F

Triple DES takes a plaintext block of 64 bits and a key of 56 bits to produce a ciphertext block of 64 bits.
True or False

46
New cards

T

Modes of operation are the alternative techniques that have been developed to increase the security
of symmetric block encryption for large sequences of data.
True or False

47
New cards

F

The advantage of a stream cipher is that you can reuse keys.
True or False

48
New cards

T

A message authentication code is a small block of data generated by a
secret key and appended to a message.
True or False

49
New cards

T

Public-key cryptography is asymmetric.

50
New cards

T

The strength of a hash function against brute-force attacks depends solely on the length of the hash code produced by the algorithm.

51
New cards

plaintext

The original message or data that is fed into the algorithm is __________.

52
New cards

decryption algorithm

The __________ is the encryption algorithm run in reverse.

53
New cards

Ciphertext

__________ is the scrambled message produced as output.

54
New cards

half

On average, __________ of all possible keys must be tried in order to achieve success with a brute-force attack.

55
New cards

AES

The most important symmetric algorithms, all of which are block ciphers, are the DES, triple DES, and the __________.

56
New cards

use longer keys

If the only form of attack that could be made on an encryption algorithm is brute-force, then the way to counter such attacks would be to __________ .

57
New cards

Message authentication

__________ is a procedure that allows communicating parties to verify that received or stored messages are authentic.

58
New cards

hash function

The purpose of a __________ is to produce a "fingerprint" of a file, message, or other block of data.

59
New cards

symmetric encryption

Also referred to as single-key encryption, the universal technique for providing confidentiality for transmitted or stored data is _______________________ .

60
New cards

brute-force

There are two general approaches to attacking a symmetric encryption scheme:
cryptanalytic attacks and _______________________ attacks.

61
New cards

decryption

The ________________ algorithm takes the ciphertext and the secret key and produces
the original plaintext.

62
New cards

cryptanalytic

A _________________ attack exploits the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used.

63
New cards

block cipher

A _________________ processes the plaintext input in fixed-size blocks and produces a block of ciphertext of equal size for each plaintext block.

64
New cards

stream cipher

A _________________ processes the input elements continuously, producing output one element at a time.

65
New cards

Diffie and Hellman

Public-key encryption was first publicly proposed by _________________ in 1976.

66
New cards

uniform distribution

The two criteria used to validate that a sequence of numbers is random are independence and _________ .

67
New cards

digital signature

A __________ is created by using a secure hash function to generate a hash value for a message and then encrypting the hash code with a private key.

68
New cards

public-key

Digital signatures and key management are the two most important applications of __________ encryption.

69
New cards

brute-force attack

A __________ is to try every possible key on a piece of ciphertext until an intelligible translation into plaintext is obtained.

70
New cards

T

Computer security is protection of the integrity, availability, and confidentiality of information system resources.

71
New cards

T

Data integrity assures that information and programs are changed only in a specified and authorized manner.

72
New cards

T

Availability assures that systems work promptly and service is not denied to authorized users.

73
New cards

F

The "A" in the CIA triad stands for "authenticity".

74
New cards

T

The more critical a component or service, the higher the level of availability required.

75
New cards

T

Computer security is essentially a battle of wits between a perpetrator who tries to find holes and the administrator who tries to close them.

76
New cards

T

Many security administrators view strong security as an impediment to
efficient and user-friendly operation of an information system.

77
New cards

F

Assurance is the process of examining a computer product or system
with respect to certain criteria.

78
New cards

Privacy

________assures that individuals control or influence what information related to them may be collected and stored and by whom and to whom that information may be disclosed.

79
New cards

System Integrity

_________assures that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system.

80
New cards

confidentiality

A loss of _________ is the unauthorized disclosure of information.

81
New cards

countermeasure

A(n) __________ is an action, device, procedure, or technique that reduces a threat, a vulnerability, or an attack by eliminating or preventing it, by minimizing the harm it can cause, or by discovering and reporting it so that correct action can be taken.

82
New cards

High

A ________ level breach of security could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals.

83
New cards

denial of service

The _________ prevents or inhibits the normal use or management of communications facilities

84
New cards

exposure

A threat action in which sensitive data are directly released to an unauthorized entity is __________.

85
New cards

masquerade

An example of __________ is an attempt by an unauthorized user to gain access to a system by posing as an authorized user.

86
New cards

passive attack

A(n) _________ is an attempt to learn or make use of information from the system that does not affect system resources.

87
New cards

deception

Masquerade, falsification, and repudiation are threat actions that cause __________ threat consequences.

88
New cards

security attack

A __________ is any action that compromises the security of information owned by an organization.

89
New cards

Computer Security

_________ is the protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability, and confidentiality of information system resources.

90
New cards

Passive

Release of message contents and traffic analysis are two types of _________ attacks.

91
New cards

Recovery

Security implementation involves four complementary courses of action: prevention, detection, response, and____________

92
New cards

CIA Triad

Confidentiality, Integrity, and Availability form what is often referred to as the ________

93
New cards

Data

The assets of a computer system can be categorized as hardware, software, firmware, communication lines and networks, and _________

94
New cards

Active

Replay, masquerade, modification of messages, and denial of service are example of ________ attacks.

95
New cards

data integrity

The assurance that data received are exactly as sent by an authorized entity is __________.

96
New cards

vulnerability

A flaw or weakness in a system's design, implementation, or operation and management that could be exploited to violate the system's security policy is a(n) __________.

97
New cards

attack

An assault on system security that derives from an intelligent act that is a deliberate attempt to evade security services and violate the security policy of a system is a(n) __________.