2018 Midterm Review, built from previous quizzes.
Help!
|
|
||||
---|---|---|---|---|---|
show | data integrity
🗑
|
||||
A(n) __________ is an action, device, procedure, or technique that reduces or eliminates a risk, a vulnerability, or an attack by eliminating it, preventing it, or minimizing the harm it can cause. | show 🗑
|
||||
show | Confidentiality
Integrity
Availability
🗑
|
||||
show | disruption
🗑
|
||||
A(n) _________ is an unauthorized attempt to learn information from a system such that system resources are not affected. | show 🗑
|
||||
_____________ is defined as a practice in which multiple privilege attributes are required to achieve access to a restricted or controlled resource. Under this principle, access privileges must be well classified and separated. | show 🗑
|
||||
show | Privacy
🗑
|
||||
The __________________ principle states that access privileges should be distributed across a system, in such a way as to minimize the likeliness that all privileges would be compromised or misused at once. | show 🗑
|
||||
A flaw or weakness in a system’s design, implementation, or operation and management that could be exploited to violate the system’s security policy is a(n) __________. | show 🗑
|
||||
_____________ implies that security mechanisms should not unduly interfere with the work of users | show 🗑
|
||||
In addition to the CIA basic concepts, we have the AAA concepts. Please give the answers to three of the three AAA concepts as described by the textbookauthor: | show 🗑
|
||||
show | Fail-safe default
🗑
|
||||
The __________________ principle states that the design and implementation of a secure system must minimize the amount of shared functions and interactions between system actors (such as users or processes) needed in order to implement security. | show 🗑
|
||||
show | Layering
🗑
|
||||
As categorized in the textbook, a successful masquerade attack would directly result in a threat consequence of ___________. | show 🗑
|
||||
The __________________ principle states that actors (such as users or processes) must operate at all times with the level of privilege needed (to carry on their tasks) but no more (or higher). As an | show 🗑
|
||||
show | Complete mediation
🗑
|
||||
A _________ attack would directly hamper the normal use or management of communication or data assets. | show 🗑
|
||||
show | Economy of Mechanism
🗑
|
||||
show | Unauthorized disclosure
🗑
|
||||
A loss of _________ is the unauthorized disclosure of information. | show 🗑
|
||||
The __________________ principle states that the design of security mechanisms, and the implementation whenever possible, should be open to scrutiny and verification by as many expert parties as possible | show 🗑
|
||||
show | attack
🗑
|
||||
show | Psychological acceptability
🗑
|
||||
show | usurpation
🗑
|
||||
Please write the complete and expanded name of the act passed by congress in 1974 that established fair practices to regulate the information that the federal government collects and maintains about individuals | show 🗑
|
||||
DMCA stands for: | show 🗑
|
||||
show | False
🗑
|
||||
show | HIPAA
🗑
|
||||
show | USA Patriot Act
🗑
|
||||
show | Trade Secrets
Copyrights
Trademarks
Patents
🗑
|
||||
show | FERPA
🗑
|
||||
Trade secret protection would a valid protection mechanism that organizations and individuals may use to protect software and data assets. | show 🗑
|
||||
show | False
🗑
|
||||
United States: Federal Law: Business confidentiality protection. Please write the complete name of the act passed by congress in 1996 which outlawed: | show 🗑
|
||||
show | California
🗑
|
||||
The three types of patents that can be obtained are [U] patents, [D] patents, and [P] patents. | show 🗑
|
||||
show | False
🗑
|
||||
Act passed by congress and signed by President Lyndon B. Johnson in 1966 that established the 'right to know' for individuals with respect to the information collected and kept by the federal government about them. | show 🗑
|
||||
show | False
🗑
|
||||
show | False
🗑
|
||||
show | Gramm-Leach-Bliley Act
🗑
|
||||
show | U.S. Freedom of Information
🗑
|
||||
show | False
🗑
|
||||
Patents rights are granted until the inventor deceases. | show 🗑
|
||||
_____________ attacks are one of the two categories of attacks or techniques used to break encryption. | show 🗑
|
||||
show | False
🗑
|
||||
_____________ is the act of searching for flaws in an encryption algorithm or its implementation in order to break the encryption. | show 🗑
|
||||
show | ciphertext
🗑
|
||||
Assume that Bob has a valid message m and sends this message to Alice after encrypting it using RSA with Alice's public key. Then Alice can be sure of the ____________ of the message. | show 🗑
|
||||
show | False
🗑
|
||||
We say that a hash function is strong collision resitant, or sometimes simply collision resitant, if and only if for any given message x it is computationally infeasable to find a message y, with y different than x, and such that H(x) = H(y). | show 🗑
|
||||
We say that a hash function is one-way or pre-image resistant if and only if for any given message x it is computationally infeasable to find a message y, with y different than x, and such that H(x) = H(y). | show 🗑
|
||||
show | 56
🗑
|
||||
Symmetric encryption does not necessarily require the use of a shared secret key in order to ensure Confidentiality. | show 🗑
|
||||
Assume that Bob has a valid message m and sends this message to Alice after encrypting it using RSA with Bob's private key. Then Alice can be sure that the message is ____________ and _____________ . | show 🗑
|
||||
The key sizes (in bits) that may be used used for encryption and decryption in the AES symmetric encryption algorithm are [a], [b], and [c] bits, respectively. Notes | show 🗑
|
||||
The final received message after being decrypted on the receiver side called the __________. | show 🗑
|
||||
The size of the block used for encryption and decryption for the AES symmetric encryption algorithm is _____ bits | show 🗑
|
||||
show | True
🗑
|
||||
In AES the input key is expanded into an array of 64 32-bit words | show 🗑
|
||||
How long, in bits, is the key length used by the simple DES cipher? | show 🗑
|
||||
Encryption can be classified into the following two categories: symmetric and parasymmetric. | show 🗑
|
||||
The art and science of uncovering patterns in encrypted text and/or flaws in algorithms in order to break the encryption or improve the encryption algorithms is called cryptography. | show 🗑
|
||||
show | Mix Columns
Add Round Key
Substitute Bytes
Shift Rows
🗑
|
||||
During the AES encryption stage of Shift Rows: the first row of the state block is shifted | show 🗑
|
||||
Two different basic building blocks of cryptosystems are substitution and transposition (also called permutation). | show 🗑
|
||||
In cryptography, we call ciphertext the encrypted version of a message. | show 🗑
|
||||
Question: How long, in bits, is the effective key length when using the Triple-DES cipher with K1=K3? | show 🗑
|
||||
show | False
🗑
|
||||
show | True
🗑
|
||||
show | Ciphertext only
Known Plaintext
Chosen Plaintext
Chosen Ciphertext
Chosen Text
🗑
|
||||
Cryptography and cryptanalysis are branches cryptology. | show 🗑
|
||||
we call cipher an encryption algorithm | show 🗑
|
||||
: When using substitution we move one symbol, byte, word or unit of the input into a different place within the output. | show 🗑
|
||||
show | True
🗑
|
||||
In symmetric encryption two symmetrically diffrerent keys are used: one for encryption and one for decryption. | show 🗑
|
||||
show | False
🗑
|
||||
show | True
🗑
|
||||
Two numbers are relatively prime if and only if they have no common factors (except 1 of course). | show 🗑
|
||||
show | Hash function and then asymmetric encryption with the private key of the sender to encrypt the resulting hash only.
MAC with a shared secret key.
Hash function and symmetric encryption with a shared secret key to encrypt the resulting hash only.
🗑
|
||||
What is the underlying "difficult" problem in which the RSA cryptosystem relies on, in order to avoid eavesdroppers from breaking the system? | show 🗑
|
||||
show | False
🗑
|
||||
show | Calculation of Discrete Logarithms in Modular Fields
🗑
|
||||
In the RSA cryptosystem both of the following equations are true: P = D ( k_priv , E ( k_pub , P ) ) P = D ( k_pub , E ( k_pub , P ) ) | show 🗑
|
||||
show | False
🗑
|
||||
show | False
🗑
|
||||
In the RSA cryptosystem if user A encrypts a message with the public key of user B then only user B can successfully decrypt the message by using its own private key. | show 🗑
|
||||
show | False
🗑
|
||||
In the RSA cryptosystem, as described by the textbook, the pair (e,n) is the public key, and the pair (d,n) is the private key. | show 🗑
|
||||
Assume that Bob has a valid message m and sends this message to Alice after encrypting it using RSA with Alice's public key. Then Alice can be sure of the ____________ of the message | show 🗑
|
Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Created by:
306706040061204
Popular Computers sets