1/16
These flashcards cover key concepts from Lecture 5 of the ITC 101 Introduction to Computers course, focusing on security attacks, types, cryptography, and their definitions.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Security Attack
Any action that compromises the security of information owned by an organization.
Passive Attack
An attack that involves eavesdropping on or monitoring transmissions.
Active Attack
An attack that involves an attempt to alter system resources or affect their operation.
Masquerade
An active attack where an attacker pretends to be an authorized user.
Replay
An active attack where a message is captured and sent again to the recipient.
Denial of Service (DoS) Attack
An attack meant to shut down a machine or network, making it inaccessible to its intended users.
Authentication
A security service that provides verification of the identity of a user.
Access Control
A security service that regulates who can view or use resources in a computing environment.
Data Confidentiality
A security service that ensures that sensitive information is accessed only by authorized users.
Data Integrity
A security service that ensures the accuracy and consistency of data over its entire lifecycle.
Non-repudiation
A security service that ensures that a party in a transaction cannot deny the authenticity of their signature.
Symmetric Cipher
A cryptographic system that uses the same key for both encryption and decryption.
Substitution Techniques
Methods of encrypting data by replacing input message parts with other parts.
Caesar Cipher
A type of substitution cipher where each letter in the plaintext is 'shifted' a certain number of places down or up the alphabet.
Cryptanalysis
The process of recovering secret keys or plaintext from ciphertext.
Brute Force Attack
A method of cryptanalysis where all possible keys are systematically tried until the correct one is found.
Chosen Plaintext Attack
An attack model for cryptanalysis where the attacker can choose arbitrary plaintexts to be encrypted and obtain the corresponding ciphertexts.