Podcast
Questions and Answers
What are the three key objectives of information and network security?
What are the three key objectives of information and network security?
- Data integrity, Access control, Authentication
- System integrity, Encryption, Decryption
- Confidentiality, Integrity, Availability (correct)
- Traffic padding, Routing control, Nonrepudiation
Which of these is NOT a primary security concern for network devices?
Which of these is NOT a primary security concern for network devices?
- Overwhelming system resources
- Ensuring user satisfaction with network performance (correct)
- Malware injection
- Intruders gaining unauthorized access
What are the two types of passive attacks?
What are the two types of passive attacks?
- Denial of service and Data modification
- Authentication exchange and Key exchange
- Masquerade and Replay
- Release of message contents and Traffic analysis (correct)
Active attacks involve modifying the data stream or creating a false stream.
Active attacks involve modifying the data stream or creating a false stream.
What is the purpose of authentication in communication?
What is the purpose of authentication in communication?
What is the goal of access control?
What is the goal of access control?
What are two ways to protect data confidentiality?
What are two ways to protect data confidentiality?
What kind of service ensures that data is received as sent, without any modifications or reordering?
What kind of service ensures that data is received as sent, without any modifications or reordering?
What is the purpose of nonrepudiation in communication?
What is the purpose of nonrepudiation in communication?
What is the main function of an availability service?
What is the main function of an availability service?
Which cryptographic mechanism is used to ensure the identity of an entity through an information exchange?
Which cryptographic mechanism is used to ensure the identity of an entity through an information exchange?
Which type of cryptographic algorithm uses a single key for both encryption and decryption?
Which type of cryptographic algorithm uses a single key for both encryption and decryption?
Which of the following is NOT a key element of network security?
Which of the following is NOT a key element of network security?
Communications security can be implemented using network protocols.
Communications security can be implemented using network protocols.
What are the three main types of device security?
What are the three main types of device security?
What is the key concept underlying a trust model?
What is the key concept underlying a trust model?
What are the three related concepts within a trust model?
What are the three related concepts within a trust model?
Trust is a complex concept that can be restricted to specific functions or behaviors.
Trust is a complex concept that can be restricted to specific functions or behaviors.
What are the two main areas where organizations develop a level of trust in internal users?
What are the two main areas where organizations develop a level of trust in internal users?
What are the three types of trust relationships that organizations can establish?
What are the three types of trust relationships that organizations can establish?
Which organization is a U.S. federal agency that deals with measurement science, standards, and technology?
Which organization is a U.S. federal agency that deals with measurement science, standards, and technology?
Which organization is a professional membership society that addresses issues related to the future of the Internet?
Which organization is a professional membership society that addresses issues related to the future of the Internet?
Flashcards
Cybersecurity
Cybersecurity
The collection of tools, policies, concepts, safeguards, guidelines, risk management approaches, actions, training, best practices, assurance, and technologies to protect cyberspace and organizational assets.
Information Security
Information Security
Preserving confidentiality, integrity, and availability of information.
Network Security
Network Security
Protecting networks from unauthorized modification, destruction, or disclosure, ensuring proper function without harm.
Confidentiality
Confidentiality
Signup and view all the flashcards
Data Confidentiality
Data Confidentiality
Signup and view all the flashcards
Privacy
Privacy
Signup and view all the flashcards
Integrity
Integrity
Signup and view all the flashcards
Data Integrity
Data Integrity
Signup and view all the flashcards
Data Authenticity
Data Authenticity
Signup and view all the flashcards
Nonrepudiation
Nonrepudiation
Signup and view all the flashcards
System Integrity
System Integrity
Signup and view all the flashcards
Availability
Availability
Signup and view all the flashcards
Security Objectives
Security Objectives
Signup and view all the flashcards
Study Notes
Introduction/Course Overview
- Book title: Cryptography and Network Security, Eighth Edition
- Author: William Stallings
- Copyright: 2020 Pearson Education, Inc.
Chapter 1: Information and Network Security Concepts
- Cybersecurity is a collection of tools, policies, security concepts, safeguards, guidelines, risk management approaches, actions, training, and technologies to protect cyberspace environments and users' assets.
- Cyber assets include connected devices, personnel, infrastructure, applications, services, and telecommunications systems
- Cybersecurity aims to maintain security properties of organizational and user assets against cyber threats.
- Key security objectives are: Availability, Integrity (including data authenticity and nonrepudiation), and Confidentiality.
Cybersecurity
- Cybersecurity involves tools, policies, and security concepts to safeguard cyberspace environments
- Cybersecurity helps protect organizational and user assets, which include both connected devices and personnel
- Cybersecurity also covers the entirety of information transmitted or stored within the cyberspace environment
- It ensures that security properties are maintained and attained.
Information Security
- Preserves confidentiality, integrity, and availability of information as well as other factors like authenticity, accountability, nonrepudiation, and reliability
Network Security
- Protects networks and services from unauthorized modification, destruction, or disclosure
- It ensures that network performance is correct with no harmful side effects
Security Objectives
- Confidentiality: Two key concepts are Data confidentiality, which protects private/confidential information from unauthorized disclosure and Privacy, which assures individuals control over their data and who has access to it.
- Integrity: Two related concepts are Data integrity (ensuring data and programs are only changed in specified/authorized ways) and System integrity (ensuring a system performs intended functions without unauthorized manipulation)
- Availability: Protects systems to ensure prompt availability and service for authorized users
Security Objectives (Diagram)
- Key objectives include Confidentiality (plus privacy), Integrity (plus authenticity and non-repudiation), Availability and Accountability.
Computer Security Challenges
- Security is not simple, needs proactive procedures
- Potential attacks on security features need to be considered
- Security procedures can be counter-intuitive, requiring careful design
- Security mechanisms are complex, involving more than a single algorithm
- Security is a battle of wits between perpetrators and designers
- Security investment may not be immediately apparent, but failures can cause significant damage.
- Strong security can sometimes appear to impede efficient operation
OSI Security Architecture
- Security Attack: An action that compromises information security of an organization
- Security Mechanism: A process (or device) designed to detect, prevent or recover from a security attack
- Security Service: A communication/processing service that enhances security
Threats and Attacks
- Threat: A potential for violating security due to a circumstance, capability, action or event
- Attack: A deliberate attempt to evade security policies and violate system security
Passive Attacks
- Message Contents: Release of message contents
- Traffic Analysis: Monitoring transmissions, but not altering the content
Active Attacks
- Masquerade: One entity pretending to be a different entity
- Replay: Capturing and retransmitting data units for unauthorized use
- Modification of data: Altering data
- Denial of service: Preventing or inhibiting use of communications facilities
Authentication
- Single message: Verifying the sender of a single message
- Ongoing interaction: Assuring that communicating entities are authentic and the connection isn't compromised
- Peer entity authentication: Verifying the identity of interacting entities in an association.
- Data origin authentication: Verifying the source and integrity of a data unit.
Access Control
- Limiting and controlling access to host systems and applications through communication links
Data Confidentiality
- Protects transmitted data from passive attacks.
- Broadest service: Protecting all user data transmitted over a period.
- Narrower service: Protecting specific messages or fields.
- Protecting traffic flow from analysis.
Data Integrity
- Protecting a stream of messages, a single message, or specific fields in a message for assurance they haven't been altered
- Connection-oriented services confirm message integrity, preventing duplication, alteration, and reordering.
- Connectionless integrity services assure integrity of single messages
Nonrepudiation
- Prevents sender or receiver from denying a transmitted message
- Proving that a message was sent/received
Availability Service
- Protects system availability, addressing denial-of-service attacks
- Dependent on proper management and control of system resources/access control service
Security Mechanisms
- Cryptographic Algorithms: Reversible, irreversible (hash, message authentication codes) mechanisms for encryption, decryption.
- Digital Signatures: Data appended/transformed to prove source and data integrity and prevent forgery
- Authentication Exchange: Mechanisms for verifying entity identity
- Traffic Padding: Inserting bits into gaps in the data stream
- Routing Control: Selecting security routes, especially in suspected breaches
- Notarization: Use of a trusted third party to assure data properties.
- Access Control: Mechanisms managing access rights
Cryptographic Algorithms (Types)
- Keyless: Cryptographic hash functions, pseudo-random number generators
- Single-Key: Block ciphers, stream ciphers, Message Authentication Codes (MACs)
- Two-Key: Asymmetric encryption, digital signatures, key exchange, user authentication
Keyless Algorithms
- Deterministic functions with cryptographic properties (hash functions, pseudo-random number generators)
Single-Key Algorithms
- Depends on a single key used for both encryption and decryption, using symmetric encryption algorithms (block ciphers and stream ciphers)
- Examples include message authentication codes (MACs)
Asymmetric Algorithms
- Uses two separate keys (public and private) for encryption and decryption, used primarily for digital signatures, key exchange, and user authentication.
Network Protocols
- Includes protocols like IPsec, TLS, HTTPS, SSH, IEEE 802.11i, S/MIME for communication security.
Communications Security
- Deals with protecting communication through the network, including passive and active attacks
Device Security
- Focuses on securing network devices (routers, switches, client systems etc)
- Primary concerns are intrusions, malicious software, and resource overloads
Firewall
- Limits network access based on security policies and filters data traffic
Intrusion Detection
- Systems that detect and monitor activity for attempts to access/alter resources without authorization
Intrusion Prevention
- Systems that detect and stop intrusive activities before reaching the target
Trust Model
- Willingness of one party to be vulnerable based on the actions of another party.
- Related concepts include: Trustworthiness: deservability of trust Propensity to trust: a tendency to trust others Risk: Measure of threat
Trustworthiness of an Individual
- Policies implemented regarding security during employment
Trustworthiness of an Organization
- Establishing trust relationships with external organizations.
- Documenting agreements, such as contracts and service level agreements, and establishing trust across multiple organizations
Trustworthiness of Information Systems
- Addresses degree that information systems maintain confidentiality, integrity, and availability.
- Security functionality: security features implemented
- Security assurances: confidence security functionality is effective.
Establishing Trust Relationships
- Validated trust: Relies on evidence about the trusted entity
- Direct historical trust: Relies on the organization's past security record.
- Mediated trust: Third-party mediates the trust between parties.
- Mandated trust: Trust established by a superior entity.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.