CS2005 - Lecture 12 - Security

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/17

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 2:58 PM on 11/18/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

18 Terms

1
New cards

Masquerading attack

Pretending to be another entity

2
New cards

What are the four main types of security violations?

  1. Breach of confidentiality (unauthorised data access)

  2. Breach of integrity (unauthorised data modification)

  3. Breach of availability (unauthorised data destruction)

  4. Theft of service (unauthorised resource use)

3
New cards

Replay attack

Maliciously resending valid data

4
New cards

Man-in-the-middle

Intercepting and altering communications

5
New cards

At which 4 levels must security be implemented?

  1. Physical (data centres, hardware)

  2. Human (prevent social engineering)

  3. Operating System (protection mechanisms)

  4. Network (secure communications)

6
New cards

Trojan Horse

Disguised malware e.g. fake login

7
New cards

Logic Bomb

Triggers under specific conditions

8
New cards

Buffer Overflow

Overwrites memory to exploit

9
New cards

Virus

Self-replicating code infects files

10
New cards

Symmetric Encryption

Uses one shared skey to encrypt/decrypt

11
New cards

Asymmetric Encryption

Uses public key (encrypt) and private key (decrypt)

12
New cards

RSA encryption

Generate primes p and q; compute N=p*q Public key: (ke, N) Private key: (kd, N)

13
New cards

Worms

Self-replicating malware e.g. Morris worm

14
New cards

DoS attacks

Overloads systems to deny service e.g. traffic floods

15
New cards

Plaintext

Original message

16
New cards

Ciphertext

Encrypted message

17
New cards

Cipher

Algorithm for encryption/decryption

18
New cards

Cryptography

Prevents eavesdropping/spoofing by ensuring:

- Confidentiality (only authorised parties read data)

- Authentication (verify sender/receiver)