Term
What does security architecture define? |
|
Definition
Defines trust relationship among nodes and protection mechanism of information processed, stored, and transmitted |
|
|
Term
What are nodes capable of? |
|
Definition
Processing, storing, transmitting information |
|
|
Term
|
Definition
edge where two nodes can transfer information through medium, usually with security protection |
|
|
Term
What are 5 OSI model for computer networking? |
|
Definition
from top to bottom: application, transport, network, data link, physical |
|
|
Term
What's the purpose of physical layer? |
|
Definition
transfer signals(bit by bit) |
|
|
Term
what's the purpose of data link layer? |
|
Definition
transfer signals between two nodes(packet by packet) |
|
|
Term
what's the purpose of network layer? |
|
Definition
transfer signal from 1 node to another node in a network (e.g IP which transfers packet to another node in a network) |
|
|
Term
what's the purpose of transport layer? |
|
Definition
a file as a whole rather than packet, makes sure reliability and security of the file (e.g TCP which makes sure all the data are transferred properly) |
|
|
Term
How to make a key unpredictable? |
|
Definition
probability of every possible data are same and also run is distributed correctly |
|
|
Term
What are 5 things you can do with crypto algorithm? |
|
Definition
1. confidentiality 2. integrity and authentication 3. digital signature 4. non-repudiation 5. access control |
|
|
Term
what is a problem with public key encryption? |
|
Definition
need to authenticate the public key is from correct person |
|
|
Term
What is one solution for public-key's problem? |
|
Definition
public-key infrastructure where certified authorities will authorize the public-key to ensure it's from correct person |
|
|
Term
|
Definition
protect information accessed from non-eligible parties by using encryption |
|
|
Term
|
Definition
the data received is same as the data sent |
|
|
Term
Why is authentication needed? |
|
Definition
to verify the sender of information is the actual sender |
|
|
Term
describe how symmetric key encryption works |
|
Definition
|
|
Term
describe how public-key encryption works |
|
Definition
|
|
Term
what are two methods that will provide integrity and authentication? |
|
Definition
MAC and digital signature |
|
|
Term
|
Definition
|
|
Term
describe how digital signature works |
|
Definition
|
|
Term
|
Definition
define trust relationships among nodes |
|
|
Term
what are two ways trust relationship is established? |
|
Definition
1. assumed trust 2. applied trust |
|
|
Term
what does security infrastructure supposed to do? |
|
Definition
provide certain service to establish trust for other parties (public key infrastructure)
This is important because when a person is applying for trust, how can I make sure that person is a trust worthy person? |
|
|
Term
What is side-channel attacks? |
|
Definition
break into the nodes and by looking at power consumption, timing, temperature, etc to find key |
|
|
Term
if you were to choose to break into a system for wired and for wireless, which one do you prefer? |
|
Definition
|
|
Term
describe man-in-the-middle attack |
|
Definition
third person intercepts the communication in two ways: change the information sent(active) or listen to the information(passive) |
|
|
Term
what is the difficulty with man-in-the-middle attack? |
|
Definition
middle man must be able to fake message or digital signature in real time, so basically timing is important in man-in-the-middle attack |
|
|
Term
what are two things a trusted platform(node) should do? |
|
Definition
1. cannot bypass encryption and transmit if supposed to 2. cannot issue access to a file if process is not entitled to |
|
|
Term
what are 4 classes of threats? |
|
Definition
1. break into algorithms and protocols 2. physical attack 3. wireless attack 4. MITM attack |
|
|
Term
what are two main focus on communication system security? |
|
Definition
1. trusted nodes 2. protected edges |
|
|
Term
What are five requirements of a trusted platform? |
|
Definition
1. robust from physical attacks 2. validated system software 3. authenticated applications
4. cannot bypass encryption and transmit if supposed to 5. cannot issue access to a file if process is not entitled to |
|
|
Term
How to protect a communication? |
|
Definition
1. confidentiality 2. integrity 3. authenticity |
|
|
Term
What are 4 requirements of establish and protect communications? |
|
Definition
1. mutual authentication 2. key establishment 3. protected negotiation 4. failure detection
e.g sending mail |
|
|
Term
In digital signature, who uses private key? |
|
Definition
|
|
Term
what's the fundamental difference between MAC and Digital Signature? |
|
Definition
1. MAC is symmetric key 2. Digital Signature is public-key |
|
|
Term
public-key infrastructure is related to digital signature? |
|
Definition
Yes, a infrastructure is needed to say this is correct digital signature (challenge-response based auth) |
|
|
Term
Security infrastructure is related to what? |
|
Definition
|
|
Term
What's run for 1001011 counts wrap of 1s? |
|
Definition
run 1 of length 3 = 1 because of wrap |
|
|