ITC 101 Introduction to Computers - Lecture 5

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/16

flashcard set

Earn XP

Description and Tags

These flashcards cover key concepts from Lecture 5 of the ITC 101 Introduction to Computers course, focusing on security attacks, types, cryptography, and their definitions.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

17 Terms

1
New cards

Security Attack

Any action that compromises the security of information owned by an organization.

2
New cards

Passive Attack

An attack that involves eavesdropping on or monitoring transmissions.

3
New cards

Active Attack

An attack that involves an attempt to alter system resources or affect their operation.

4
New cards

Masquerade

An active attack where an attacker pretends to be an authorized user.

5
New cards

Replay

An active attack where a message is captured and sent again to the recipient.

6
New cards

Denial of Service (DoS) Attack

An attack meant to shut down a machine or network, making it inaccessible to its intended users.

7
New cards

Authentication

A security service that provides verification of the identity of a user.

8
New cards

Access Control

A security service that regulates who can view or use resources in a computing environment.

9
New cards

Data Confidentiality

A security service that ensures that sensitive information is accessed only by authorized users.

10
New cards

Data Integrity

A security service that ensures the accuracy and consistency of data over its entire lifecycle.

11
New cards

Non-repudiation

A security service that ensures that a party in a transaction cannot deny the authenticity of their signature.

12
New cards

Symmetric Cipher

A cryptographic system that uses the same key for both encryption and decryption.

13
New cards

Substitution Techniques

Methods of encrypting data by replacing input message parts with other parts.

14
New cards

Caesar Cipher

A type of substitution cipher where each letter in the plaintext is 'shifted' a certain number of places down or up the alphabet.

15
New cards

Cryptanalysis

The process of recovering secret keys or plaintext from ciphertext.

16
New cards

Brute Force Attack

A method of cryptanalysis where all possible keys are systematically tried until the correct one is found.

17
New cards

Chosen Plaintext Attack

An attack model for cryptanalysis where the attacker can choose arbitrary plaintexts to be encrypted and obtain the corresponding ciphertexts.