ITM820 Midterm

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/291

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

292 Terms

1
New cards

What is the primary goal of confidentiality in security?

Preserving authorized restrictions

2
New cards

When does a loss of confidentiality occur?

When there is unauthorized disclosure of information

3
New cards

What does a loss of integrity involve?

Unauthorized modification or destruction of information

4
New cards

What does availability ensure in security?

Reliable access to information

5
New cards

What does a loss of availability involve?

Disruption of access to or use of information

6
New cards

Authenticity verifies what?

The genuineness of a message or its originator

7
New cards

What is the security goal of accountability?

Trace actions to an entity

8
New cards

What must systems keep records of?

Activities to permit later forensic analysis

9
New cards

The essential network and computer security requirements include?

Confidentiality, integrity, availability, authenticity, and accountability

10
New cards

Describe the 3 impact levels

Low Limited adverse effect

Moderate Serious adverse effect

High Severe or catastrophic effect

11
New cards

Why is computer security considered complex?

Subtle mechanisms are needed

12
New cards

In developing security mechanisms what must one always consider?

Potential attacks

13
New cards

Users often perceive little benefit from security investment until what happens?

A failure occurs

14
New cards

What are the categories of computer system assets?

Hardware, software, data

15
New cards

What do data assets include?

Files, databases, and security-related data such as password files

16
New cards

What is a leaky system?

A system where unauthorized access to information occurs

17
New cards

What is a passive attack in security?

Learning information without altering resources

18
New cards

Who is an outside attack initiated by?

An unauthorized or illegitimate user

19
New cards

What does a countermeasure aim to do?

Prevent, detect, or recover from security attacks.

20
New cards

Why are fundamental security design principles important?

Guide development of protection mechanisms

21
New cards

What is one fundamental security design principle?

Least astonishment

22
New cards

What is a formal security policy?

A statement of rules and practices

23
New cards

What are the four complementary courses of action in security implementation?

1⃣ Prevention

2⃣ Detection

3⃣ Response

4⃣ Recovery

24
New cards

How does the NIST Computer Security Handbook define assurance?

Degree of confidence in measures

25
New cards

What does symmetric encryption use the same key for?

Encryption and decryption

26
New cards

DES and AES are examples of what?

Block encryption algorithms

27
New cards

What are the two requirements for secure use of symmetric encryption?

Strong algorithm and secure key exchange

28
New cards

In symmetric encryption what is the secret key used as?

It is used as input to the encryption algorithm

29
New cards

What happens if an opponent knows the encryption algorithm and has access to ciphertexts?

They cannot decipher it

30
New cards

What must secret keys do?

They must be obtained securely and kept secure to prevent compromise of communication

31
New cards

What is a symmetric encryption scheme's five main components?

Plaintext, encryption algorithm, secret key, ciphertext, and decryption algorithm

32
New cards

What is the role of the plaintext in symmetric encryption?

Original message or data

33
New cards

What does the encryption algorithm do to the plaintext?

Performs substitutions and transformations

34
New cards

For a given message two different secret keys will produce what?

Two different ciphertexts

35
New cards

What are the four steps of the decryption algorithm in symmetric encryption?

1⃣ Receive ciphertext

2⃣ Input secret key

3⃣ Reverse transformations

4⃣ Output original plaintext

36
New cards

What does a cryptanalytic attack rely on in symmetric encryption?

The algorithm's nature

37
New cards

What does a brute-force attack involve?

It involves trying every possible key

38
New cards

On average a brute-force attack requires what?

Trying half of all possible keys to succeed

39
New cards

What are the most commonly used symmetric encryption algorithms based on?

Block ciphers

40
New cards

How does a block cipher process plaintext?

In fixed-size blocks

41
New cards

Name three examples of block ciphers

DES, 3DES, AES

42
New cards

Describe DES

DES uses a 64-bit plaintext block and a 56-bit key to produce a 64-bit ciphertext block

43
New cards

What key size does 3DES use?

168 bits

44
New cards

Why was AES developed as a replacement for DES?

It is faster and more secure

45
New cards

What bit key size does the current version of AES use?

A 256-bit key size

46
New cards

What is a stream cipher?

Combines plaintext with keystream

47
New cards

How does a stream cipher compare to a block cipher?

A properly designed stream cipher can be as secure as a block cipher of comparable key length

48
New cards

What is the primary advantage of stream ciphers over block ciphers?

They are faster

49
New cards

What is the most popular stream cipher?

RC4

50
New cards

Describe each cipher and its typical use case

Block cipher File transfer

Stream cipher Browser/Web link

51
New cards

What type of attack does encryption protect against?

Passive attack

52
New cards

When is a message authentic?

When it is genuine and comes from its alleged source

53
New cards

Why is symmetric encryption alone insufficient for data authentication?

Reordering blocks is possible

54
New cards

What is a message authentication code (MAC)?

A small block of data generated using a secret key

55
New cards

What is the purpose of a MAC in data authentication?

Verify message integrity

56
New cards

What happens If a MAC matches the calculated code?

The receiver is assured the message is from the alleged sender

57
New cards

Describe each algorithm with its use in generating a MAC

DES Old encryption standard

AES More secure and faster

58
New cards

What is the key difference between a MAC and a hash function?

MAC uses a secret key

59
New cards

How can a message digest be encrypted?

Using symmetric or public-key encryption

60
New cards

What are the two advantages of using public-key encryption for message authentication?

Digital signature and no key distribution

61
New cards

What does a keyed hash MAC use?

A secret key to generate a hash code without encryption

62
New cards

How is the secret key incorporated into a keyed hash MAC?

As a prefix and suffix

63
New cards

What is the primary purpose of a hash function?

Produce a fingerprint of data

64
New cards

What must a hash function be?

Computationally easy to compute for any given input

65
New cards

What is one way referred to in a hash function?

A property that is computationally infeasible to find an input for a given code

66
New cards

What does second preimage resistance ensure in a hash function?

No alternative message with the same hash

67
New cards

What does a strong collision-resistant hash function make infeasible?

To find any pair of inputs with the same hash value

68
New cards

Which hash function is currently the most widely used?

SHA-256

69
New cards

What is a hash function that satisfies the first five properties called?

Weak hash function

70
New cards

What does a strong hash function satisfy?

It satisfies all six properties of a hash function

71
New cards

What does a strong hash function protect against?

An attack in which one party generates a message for another party to sign

72
New cards

How many bits does SHA-1 produce in its hash value?

160

73
New cards

Describe the SHA-2 versions by their hash value lengths in order

1⃣ SHA-256 (256 bits)

2⃣ SHA-384 (384 bits)

3⃣ SHA-512 (512 bits)

74
New cards

The SHA-2 and SHA-1 versions use the same of what?

Modular arithmetic and logical binary operations

75
New cards

What has SHA-1 shown to be?

It has shown to be far weaker than its 160-bit hash length suggests

76
New cards

What happens when a user enters a password?

The hash of that password is compared to the stored hash value for verification

77
New cards

What type of preimage resistance is required for intrusion detection?

Weak second preimage resistance

78
New cards

Describe the four steps for using public-key cryptography

1⃣ Each user generates a pair of keys.

2⃣ Each user places one key in a public file.

3⃣ Bob encrypts a message using Alice's public key.

4⃣ Alice decrypts the message using her private key.

79
New cards

What don’t private keys in public-key cryptography need to do?

They dont need to be distributed to all users

80
New cards

What type of cipher is RSA?

Block cipher

81
New cards

What is the Diffie-Hellman algorithm not used for?

Encryption purposes

82
New cards

What does the Diffie-Hellman algorithm allow?

It allows two users to securely reach agreement about a shared secret

83
New cards

Which hash function does the Digital Signature Standard (DSS) use?

SHA-1

84
New cards

What can the Digital Signature Algorithm (DSA) not be used for?

For both encryption and key exchange

85
New cards

What is a competing system to RSA that offers equal security for a smaller bit size?

Elliptic Curve Cryptography

86
New cards

How does the confidence level compare between ECC and RSA?

The confidence level in ECC is not yet as high as that in RSA

87
New cards

What does a digital signature ensure?

That the data block has not been altered since signing

88
New cards

Describe the digital signature algorithms

DSA Based on discrete logarithms

RSA Digital Signature Algorithm Based on the RSA algorithm

ECDSA Based on elliptic-curve cryptography

89
New cards

What is a digital envelope used for?

Protecting a symmetric key

90
New cards

How is the one-time key used in a digital envelope?

The one-time key is encrypted using public-key encryption with Alice’s public key

91
New cards

What is an example of a digital envelope?

PGP which is used to encrypt email messages.

92
New cards

What are the two steps in the authentication process?

Identification and verification

93
New cards

What is user authentication?

The process of verifying a claimed identity

94
New cards

User authentication is distinct from what?

Message authentication

95
New cards

Describe the authentication methods with an example

Something the individual knows Password

Something the individual possesses Smart card

Something the individual is Fingerprint

Something the individual does Typing rhythm

96
New cards

What is the term for biometric recognition based on fixed physical characteristics?

Static biometrics

97
New cards

What do managing passwords and tokens involve?

Significant administrative overhead

98
New cards

What are some problems associated with biometric authenticators?

False positives

99
New cards

Describe the concepts related to user authentication

Assurance level Organization’s degree of certainty in user identity

Potential impact Effect of a security breach

Areas of risk Mapping between impact and assurance

100
New cards

What does an assurance level describe in user authentication?

Degree of certainty