Shared Flashcard Set

Details

CS 347 Midterm
Network Security
135
Computer Science
Undergraduate 3
10/10/2012

Additional Computer Science Flashcards

 


 

Cards

Term
With the introduction of the computer the need for automated tools for protecting files and other
information stored on the computer became evident.
Definition
True
Term
There is a natural tendency on the part of users and system managers to perceive little benefit
from security investment until a security failure occurs.
Definition
True
Term
There are clear boundaries between network security and internet security.
Definition
False
Term
The CIA triad embodies the fundamental security objectives for both data and for information
and computing services.
Definition
True
Term
In developing a particular security mechanism or algorithm one must always consider potential
attacks on those security features.
Definition
True
Term
A loss of confidentiality is the unauthorized modification or destruction of information.
Definition
False
Term
Patient allergy information is an example of an asset with a moderate requirement for integrity.
Definition
False
Term
The more critical a component or service, the higher the level of availability required.
Definition
True
Term
Data origin authentication provides protection against the duplication or modification of data
units.
Definition
False
Term
The emphasis in dealing with passive attacks is on prevention rather than detection.
Definition
True
Term
Data integrity is the protection of data from unauthorized disclosure.
Definition
False
Term
Information access threats exploit service flaws in computers to inhibit use by legitimate users.
Definition
False
Term
Viruses and worms are two examples of software attacks.
Definition
True
Term
A connection-oriented integrity service deals with individual messages without regard to any
larger context and generally provides protection against message modification only.
Definition
False
Term
Pervasive security mechanisms are not specific to any particular OSI security service or protocol
layer
Definition
True
Term
Public-key encryption is also referred to as conventional encryption, secret-key, or single-key
encryption.
Definition
False
Term
The advantage of a block cipher is that you can reuse keys.
Definition
True
Term
Ciphertext is the scrambled message produced as output.
Definition
True
Term
The security of symmetric encryption depends on the secrecy of the algorithm, not the secrecy of
the key
Definition
False
Term
The ciphertext-only attack is the easiest to defend against because the opponent has the least
amount of information to work with.
Definition
True
Term
The Feistel structure is a particular example of the more general structure used by all symmetric
block ciphers.
Definition
True
Term
Smaller block sizes mean greater security but reduced encryption/decryption speed.
Definition
False
Term
The essence of a symmetric block cipher is that a single round offers inadequate security but that
multiple rounds offer increasing security.
Definition
True
Term
Triple DES was first standardized for use in financial applications in ANSI standard X9.17 in
1985.
Definition
True
Term
The most commonly used symmetric encryption algorithms are stream ciphers.
Definition
False
Term
The principal drawback of 3DES is that the algorithm is relatively sluggish in software.
Definition
True
Term
AES uses a Feistel structure.
Definition
False
Term
Random numbers play an important role in the use of encryption for various network security
applications.
Definition
True
Term
The primary advantage of a stream cipher is that stream ciphers are almost always faster and use
far less code than do block ciphers.
Definition
True
Term
One desirable property of a stream cipher is that the ciphertext be longer in length than the
plaintext.
Definition
False
Term
Public key algorithms are useful in the exchange of conventional encryption keys.
Definition
True
Term
Private key encryption is used to produce digital signatures which provide an enhanced form of
message authentication.
Definition
False
Term
The strength of a hash function against brute-force attacks depends solely on the length of the
hash code produced by the algorithm.
Definition
True
Term
The two important aspects of encryption are to verify that the contents of the message have not
been altered and that the source is authentic.
Definition
False
Term
In the ECB mode of encryption if an attacker reorders the blocks of ciphertext then each block
will still decrypt successfully, however, the reordering may alter the meaning of the overall data
sequence.
Definition
True
Term
Message encryption alone provides a secure form of authentication.
Definition
False
Term
Because of the mathematical properties of the message authentication code function it is less
vulnerable to being broken than encryption.
Definition
True
Term
In addition to providing authentication, a message digest also provides data integrity and
performs the same function as a frame check sequence.
Definition
True
Term
Cryptographic hash functions generally execute slower in software than conventional encryption
algorithms such as DES.
Definition
False
Term
The main advantage of HMAC over other proposed hash based schemes is that HMAC can be
proven secure, provided that the embedded hash function has some reasonable cryptographic
strengths.
Definition
True
Term
Public key algorithms are based on mathematical functions rather than on simple operations on
bit patterns.
Definition
True
Term
The private key is known only to its owner.
Definition
True
Term
The security of the Diffie-Hellman key exchange lies in the fact that, while it is relatively easy to
calculate exponentials modulo a prime, it is very easy to calculate discrete logarithms.
Definition
False
Term
The key exchange protocol is vulnerable to a man-in-the-middle attack because it does not
authenticate the participants.
Definition
True
Term
Even in the case of complete encryption there is no protection of confidentiality because any
observer can decrypt the message by using the sender's public key.
Definition
True
Term
For symmetric encryption to work the two parties to an exchange must share the same key, and
that key must be protected from access by others.
Definition
True
Term
It is not necessary for a certification authority to maintain a list of certificates issued by that CA
that were not expired but were revoked.
Definition
False
Term
A session key is destroyed at the end of a session.
Definition
True
Term
Kerberos relies exclusively on asymmetric encryption and makes use of public key encryption.
Definition
False
Term
The automated key distribution approach provides the flexibility and dynamic characteristics
needed to allow a number of users to access a number of servers and for the servers to exchange
data with each other.
Definition
True
Term
If an opponent captures an unexpired service granting ticket and tries to use it they will be
denied access to the corresponding service.
Definition
False
Term
The ticket-granting ticket is encrypted with a secret key known only to the authentication server
and the ticket granting server.
Definition
True
Term
If the lifetime stamped on a ticket is very short (e.g., minutes) an opponent has a greater
opportunity for replay.
Definition
False
Term
Kerberos version 4 did not fully address the need to be of general purpose.
Definition
True
Term
One of the major roles of public-key encryption is to address the problem of key distribution.
Definition
True
Term
It is not required for two parties to share a secret key in order to communicate securely with
conventional encryption.
Definition
False
Term
X.509 is based on the use of public-key cryptography and digital signatures.
Definition
True
Term
User certificates generated by a CA need special efforts made by the directory to protect them
from being forged.
Definition
False
Term
The principal underlying standard for federated identity is the Security Assertion Markup
Language (SAML) which defines the exchange of security information between online business
partners.
Definition
True
Term
Federated identity management is a concept dealing with the use of a common identity
management scheme across multiple enterprises and numerous applications and supporting
many thousands, even millions, of users.
Definition
True
Term
SSl/TLS includes protocol mechanisms to enable two TCP users to determine the security
mechanisms and services they will use.
Definition
True
Term
Unlike traditional publishing environments, the Internet is three-way and vulnerable to attacks
on the Web servers.
Definition
False
Term
Sessions are used to avoid the expensive negotiation of new security parameters for each
connection that shares security parameters.
Definition
True
Term
Microsoft Explorer originated SSL.
Definition
False
Term
The World Wide Web is fundamentally a client/server application running over the Internet and
TCP/IP intranets.
Definition
True
Term
One way to classify Web security threats is in terms of the location of the threat: Web server,
Web browser, and network traffic between browser and server.
Definition
True
Term
The encryption of the compressed message plus the MAC must increase the content length by
more than 1024 bytes.
Definition
False
Term
The Change Cipher Spec Protocol is one of the three SSL-specific protocols that use the SSL
Record Protocol.
Definition
True
Term
The SSL Record Protocol is used before any application data is transmitted.
Definition
False
Term
The first element of the CipherSuite parameter is the key exchange method.
Definition
True
Term
The certificate message is required for any agreed on key exchange method except fixed
Diffie-Hellman.
Definition
False
Term
Phase 3 completes the setting up of a secure connection of the Handshake Protocol.
Definition
False
Term
The shared master secret is a one-time 48-byte value generated for a session by means of secure
key exchange.
Definition
True
Term
The TLS Record Format is the same as that of the SSL Record Format.
Definition
True
Term
Server authentication occurs at the transport layer, based on the server possessing a
public/private key pair
Definition
True
Term
_________ security consists of measures to deter, prevent, detect, and correct security violations
that involve the transmission of information.
Definition
Internet
Term
Verifying that users are who they say they are and that each input arriving at the system came
from a trusted source is _________ .
Definition
authenticity
Term
__________ assures that systems work promptly and service is not denied to authorized users.
Definition
Availability
Term
__________ assures that a system performs its intended function in an unimpaired manner, free
from deliberate or inadvertent unauthorized manipulation of the system.
Definition
System integrity
Term
The security goal that generates the requirement for actions of an entity to be traced uniquely to
that entity is _________ .
Definition
accountability
Term
__________ attacks attempt to alter system resources or affect their operation.
Definition
Active
Term
A __________ takes place when one entity pretends to be a different entity.
Definition
masquerade
Term
X.800 defines _________ as a service that is provided by a protocol layer of communicating
open systems and that ensures adequate security of the systems or of data transfers.
Definition
security service
Term
_________ is a professional membership society with worldwide organizational and individual
membership that provides leadership in addressing issues that confront the future of the Internet
and is the organization home for the groups responsible for Internet infrastructure standards,
including the IETF and the IAB.
Definition
ISOC
Term
The protection of data from unauthorized disclosure is _________ .
Definition
data confidentiality
Term
__________ is a U.S. federal agency that deals with measurement science, standards, and
technology related to U.S. government use and to the promotion of U.S. private sector
innovation.
Definition
NIST
Term
The prevention of unauthorized use of a resource is __________ .
Definition
access control
Term
The __________ service addresses the security concerns raised by denial-of-service attacks.
Definition
availability
Term
_________ is the insertion of bits into gaps in a data stream to frustrate traffic analysis attempts.
Definition
Traffic padding
Term
_________ is a variety of mechanisms used to assure the integrity of a data unit or stream of data
units.
Definition
Data integrity
Term
A symmetric encryption scheme has _________ ingredients.
Definition
five
Term
_________ is the original message or data that is fed into the algorithm as input.
Definition
Plaintext
Term
_________ mode requires only the implementation of the encryption algorithm and not the
decryption algorithm.
Definition
CTR
Term
A __________ processes the input elements continuously, producing output one element at a
time, as it goes along.
Definition
stream cipher
Term
If both sender and receiver use the same key the system is referred to as _________ encryption.
Definition
symmetric
Term
If the sender and receiver each use a different key the system is referred to as __________ encryption.
Definition
asymmetric
Term
A _________ approach involves trying every possible key until an intelligible translation of the
ciphertext into plaintext is obtained.
Definition
brute-force
Term
With the ________ mode if there is an error in a block of the transmitted ciphertext only the
corresponding plaintext block is affected.
Definition
ECB
Term
The most common key length in modern algorithms is ________ .
Definition
128 bits
Term
A ________ takes as input a source that is effectively random and is often referred to as an
entropy source.
Definition
TRNG
Term
A symmetric block cipher processes _________ of data at a time.
Definition
one block
Term
In _________ mode a counter equal to the plaintext block size is used.
Definition
CTR
Term
The _________ algorithm performs various substitutions and transformations on the plaintext.
Definition
encryption
Term
If the analyst is able to get the source system to insert into the system a message chosen by the
analyst, a _________ attack is possible.
Definition
chosen plaintext
Term
The _________ key size is used with the Data Encryption Standard algorithm.
Definition
56 bit
Term
A _________ is a key used between entities for the purpose of distributing session keys.
Definition
permanent key
Term
The __________ knows the passwords of all users and stores these in a centralized database and also shares a unique secret key with each server.
Definition
authentication server
Term
Once the authentication server accepts the user as authentic it creates an encrypted _________ which is sent back to the client.
Definition
ticket
Term
In order to solve the problem of minimizing the number of times that a user has to enter a
password and the problem of a plaintext transmission of the password a __________ server is
used.
Definition
ticket granting
Term
In order to prevent an opponent from capturing the login ticket and reusing it to spoof the TGS,
the ticket includes a __________ indicating the date and time at which the ticket was issued.
Definition
timestamp
Term
A ___________ is a service or user that is known to the Kerberos system and is identified by its principal name.
Definition
Kerberos principal
Term
Kerberos version 4 requires the use of ____________ .
Definition
IP address
Term
Encryption in version 4 makes use of a nonstandard mode of DES known as ___________ .
Definition
PCBC
Term
A random value to be repeated to assure that the response is fresh and has not been replayed by
an opponent is the __________ .
Definition
nonce
Term
Used in most network security applications the __________ standard has become universally
accepted for formatting public-key certificates.
Definition
X.509
Term
Containing the hash code of the other fields encrypted with the CA's private key, the __________
covers all of the other fields of the certificate and includes the signature algorithm identifier.
Definition
signature
Term
The _________ extension lists policies that the certificate is recognized as supporting, together
with optional qualifier information.
Definition
certificate policies
Term
_________ are entities that obtain and employ data maintained and provided by identity and
attribute providers, which are often used to support authorization decisions and to collect audit
information.
Definition
Data Consumers
Term
An __________ manages the creation and maintenance of attributes such as passwords and biometric information.
Definition
attribute service
Term
__________ is a centralized, automated approach to provide enterprise wide access to resources
by employees and other authorized individuals, with a focus of defining an identity for each
user, associating attributes with the identity, and enforcing a means by which a user can verify identity.
Definition
Identity management
Term
________ protects against passive attack (eavesdropping).
Definition
Encryption
Term
The most important hash function is ________ .
Definition
SHA
Term
__________ is a procedure that allows communicating parties to verify that received messages are authentic.
Definition
Message authentication
Term
If the message includes a _________ the receiver is assured that the message has not been
delayed beyond that normally expected for network transit.
Definition
timestamp
Term
The purpose of a ___________ is to produce a "fingerprint" of a file, message, or other block of data.
Definition
hash function
Term
It is computationally infeasible to find any pair (x, y) such that H(x) = H(y). A hash function
with this property is referred to as __________ .
Definition
collision resistant
Term
"It is easy to generate a code given a message, but virtually impossible to generate a message
given a code" describes the __________ hash function property.
Definition
preimage resistant
Term
The __________ property protects against a sophisticated class of attack known as the birthday
attack.
Definition
collision resistant
Term
Secure Hash Algorithms with hash value lengths of 256, 384, and 512 bits are collectively known
as _________ .
Definition
SHA-2
Term
Public key cryptography is __________.
Definition
asymmetric
Term
The readable message or data that is fed into the algorithm as input is the __________ .
Definition
plaintext
Term
The key used in conventional encryption is typically referred to as a _________ key.
Definition
secret
Term
The most widely accepted and implemented approach to public-key encryption, _________ is a
block cipher in which the plaintext and ciphertext are integers between 0 and n - 1 for some n.
Definition
RSA
Term
The purpose of the _________ algorithm is to enable two users to exchange a secret key
securely that then can be used for subsequent encryption of messages and depends on the
difficulty of computing discrete logarithms for its effectiveness.
Definition
Diffie-Hellman
Term
Based on the use of a mathematical construct known as the elliptic curve and offering equal
security for a far smaller bit size, __________ has begun to challenge RSA.
Definition
ECC
Supporting users have an ad free experience!