2IRR40 Security Lecture 1

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/27

flashcard set

Earn XP

Description and Tags

Last updated 1:55 PM on 4/26/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

28 Terms

1
New cards

What is information security?

The preservation of confidentiality, integrity, authenticity and availability of information.

2
New cards

What is network security?

Protection of networks and their service from unauthorized modification, destruction, or disclosure. Also provides assurance that the network performs its critical function correctly and there are no harmful side effects.

3
New cards

What subtypes of network security are there?

  1. Communications Security

  2. Device/System Security

4
New cards

What is communication security?

Protecting the communication through network devices.

5
New cards

What is device/system security?

Protection against intruders that could gain access to the system in many ways to perform unauthorized actions.

6
New cards

What are security objectives?

The goals you want to achieve when protecting a system or data.

7
New cards

What are the 5 security objectives?

  1. Confidentiality

  2. Integrity

  3. Availability

  4. Authenticity

  5. Accountability

8
New cards

What is confidentiality?

Protection of information that only authorized people can access or recover.

Prevents passive attacks.

9
New cards

What is integrity?

Data is not changed incorrectly, with no outside unauthorized manipulation.

Prevents active attacks.

10
New cards

What is availability?

Service is not denied to authorized users when needed

11
New cards

What is authenticity?

Assure that an entity is really the one who claims to be

12
New cards

What is accountability?

Actions can be traced back to someone

13
New cards

What are the two subtypes of confidentiality?

  1. Data confidentiality: Assurance the private/confidential information is not disclosed or made available to unauthorized individuals

  2. Privacy: Assurance the individuals control or influence what information related to them may be collected and stored and by who and to who that information can be disclosed.

14
New cards

What are the two subtypes of integrity?

  1. Data integrity: Assurance that data and programs are changed only in specified and authorized manner

  2. System integrity: Assurance that a system performs its intended functions in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation.

15
New cards

What is availability?

Assurance that a service is not denied to authorized users

16
New cards

What are the two types of attacks?

  1. Passive Attacks: Attempt to learn or make use of information without affecting system resources.

  • Hard to detect, easier to prevent.

  1. Active Attacks: Involve active actions on information flow

  • Easier to detect, hard to prevent.

17
New cards

What are some exmaples of passive attacks?

  • Eavesdropping

  • Traffic Analysis

18
New cards

What are some exmaples of active attacks?

  • Impersonation

  • Data deletion

  • Replay

19
New cards

What is a security service?

A capability that supports one or more security objectives/requirements.

20
New cards

What are the six fundamental security services?

  1. Confidentiality

  2. Integrity

  3. Availability

  4. Access Control/Authorization

  5. Non-Repudiation

  6. Authentication

21
New cards

What are the two types of authentication?

  1. Peer Entity Authentication: Connection-oriented transfer, ensures confidence that the entity you are communicating with is the one who it claims to be.

  1. Data Authentication: Connectionless transfer, ensured that the source/destination of the data are the intended ones.

22
New cards

What is authorization/access control?

Assurance that the entity performing a given action has the rights to do so.

23
New cards

What are the types of rights in authorization?

  1. Identity (IBAC)

  2. Role (RBAC)

  3. Contextual Attributes (ABAC)

24
New cards

What is non-repudiation?

Ensures either the sender or receiver cannot deny sending/receiving a particular message.

25
New cards

What is a security algorithm?

A mathematical procedure applied to secure data

26
New cards

What are the classes of security algorithms?

  1. Encryption Algorithms

  2. Hashing Algorithms

  3. Authentication Algorithms

  4. Access Control Algorithms

27
New cards

What is a security protocol?

Sequence of operations providing one or more security services to the data/communication, through one or more security algorithms

28
New cards

Why would a TTP be involved in the Generic Network Security Model?

To distribute secrets and synchronize communications