Term
| What does security architecture define? |
|
Definition
| Defines trust relationship among nodes and protection mechanism of information processed, stored, and transmitted |
|
|
Term
| What are nodes capable of? |
|
Definition
| Processing, storing, transmitting information |
|
|
Term
|
Definition
| edge where two nodes can transfer information through medium, usually with security protection |
|
|
Term
| What are 5 OSI model for computer networking? |
|
Definition
| from top to bottom: application, transport, network, data link, physical |
|
|
Term
| What's the purpose of physical layer? |
|
Definition
| transfer signals(bit by bit) |
|
|
Term
| what's the purpose of data link layer? |
|
Definition
| transfer signals between two nodes(packet by packet) |
|
|
Term
| what's the purpose of network layer? |
|
Definition
| transfer signal from 1 node to another node in a network (e.g IP which transfers packet to another node in a network) |
|
|
Term
| what's the purpose of transport layer? |
|
Definition
| a file as a whole rather than packet, makes sure reliability and security of the file (e.g TCP which makes sure all the data are transferred properly) |
|
|
Term
| How to make a key unpredictable? |
|
Definition
| probability of every possible data are same and also run is distributed correctly |
|
|
Term
| What are 5 things you can do with crypto algorithm? |
|
Definition
| 1. confidentiality 2. integrity and authentication 3. digital signature 4. non-repudiation 5. access control |
|
|
Term
| what is a problem with public key encryption? |
|
Definition
| need to authenticate the public key is from correct person |
|
|
Term
| What is one solution for public-key's problem? |
|
Definition
| public-key infrastructure where certified authorities will authorize the public-key to ensure it's from correct person |
|
|
Term
|
Definition
| protect information accessed from non-eligible parties by using encryption |
|
|
Term
|
Definition
| the data received is same as the data sent |
|
|
Term
| Why is authentication needed? |
|
Definition
| to verify the sender of information is the actual sender |
|
|
Term
| describe how symmetric key encryption works |
|
Definition
|
|
Term
| describe how public-key encryption works |
|
Definition
|
|
Term
| what are two methods that will provide integrity and authentication? |
|
Definition
| MAC and digital signature |
|
|
Term
|
Definition
|
|
Term
| describe how digital signature works |
|
Definition
|
|
Term
|
Definition
| define trust relationships among nodes |
|
|
Term
| what are two ways trust relationship is established? |
|
Definition
1. assumed trust 2. applied trust |
|
|
Term
| what does security infrastructure supposed to do? |
|
Definition
provide certain service to establish trust for other parties (public key infrastructure)
This is important because when a person is applying for trust, how can I make sure that person is a trust worthy person? |
|
|
Term
| What is side-channel attacks? |
|
Definition
| break into the nodes and by looking at power consumption, timing, temperature, etc to find key |
|
|
Term
| if you were to choose to break into a system for wired and for wireless, which one do you prefer? |
|
Definition
|
|
Term
| describe man-in-the-middle attack |
|
Definition
| third person intercepts the communication in two ways: change the information sent(active) or listen to the information(passive) |
|
|
Term
| what is the difficulty with man-in-the-middle attack? |
|
Definition
| middle man must be able to fake message or digital signature in real time, so basically timing is important in man-in-the-middle attack |
|
|
Term
| what are two things a trusted platform(node) should do? |
|
Definition
1. cannot bypass encryption and transmit if supposed to 2. cannot issue access to a file if process is not entitled to |
|
|
Term
| what are 4 classes of threats? |
|
Definition
| 1. break into algorithms and protocols 2. physical attack 3. wireless attack 4. MITM attack |
|
|
Term
| what are two main focus on communication system security? |
|
Definition
1. trusted nodes 2. protected edges |
|
|
Term
| What are five requirements of a trusted platform? |
|
Definition
1. robust from physical attacks 2. validated system software 3. authenticated applications
4. cannot bypass encryption and transmit if supposed to 5. cannot issue access to a file if process is not entitled to |
|
|
Term
| How to protect a communication? |
|
Definition
1. confidentiality 2. integrity 3. authenticity |
|
|
Term
| What are 4 requirements of establish and protect communications? |
|
Definition
1. mutual authentication 2. key establishment 3. protected negotiation 4. failure detection
e.g sending mail |
|
|
Term
| In digital signature, who uses private key? |
|
Definition
|
|
Term
| what's the fundamental difference between MAC and Digital Signature? |
|
Definition
1. MAC is symmetric key 2. Digital Signature is public-key |
|
|
Term
| public-key infrastructure is related to digital signature? |
|
Definition
| Yes, a infrastructure is needed to say this is correct digital signature (challenge-response based auth) |
|
|
Term
| Security infrastructure is related to what? |
|
Definition
|
|
Term
| What's run for 1001011 counts wrap of 1s? |
|
Definition
| run 1 of length 3 = 1 because of wrap |
|
|