Threats and protection mechanisms
31 Questions
5 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is peer entity authentication?

Used in a logical connection to provide confidence in the identities connected

What is data origin authentication?

In a connectionless transfer, provides assurance that the source of data is as claimed

What is access control?

The prevention of unauthorised use of resource.

What is connection confidentiality?

<p>The protection of all user data on a connection.</p> Signup and view all the answers

What is connectionless confidentiality?

<p>The protection of all user data on a single block.</p> Signup and view all the answers

What is selective field confidentiality ?

<p>The confidentiality of selected fields within the user data on a connection or in a single data block</p> Signup and view all the answers

What is traffic flow confidentiality?

<p>The protection of the information that might be derived from observation of traffic flows</p> Signup and view all the answers

What is data integrity?

<p>The assurance that the data received is exactly as sent by the authorised entity</p> Signup and view all the answers

What is connection integrity with recovery?

<p>Provides for the integrity of all users on a connection and detects any modification, insertion, deletion, or replay of any data within an entire data sequence, with recovery attempted.</p> Signup and view all the answers

What is connection integrity without recovery?

<p>Like connection integrity with recovery, but provides only detection</p> Signup and view all the answers

What is selective field connection integrity?

<p>Provides for the integrity of selected fields within user data of a data block transferred over a connection and takes the form of determination of whether the selected fields have been modified, inserted, deleted or replayed.</p> Signup and view all the answers

What is connectionless integrity?

<p>Provides for the integrity of a single connectionless data block and may take the form of detection of data modification. Additionally, a limited form of replay detection may be provided.</p> Signup and view all the answers

What is selective field connectionless integrity?

<p>Provides for the integrity of selected fields within a single connectionless data block. Takes the form of determination whether the selective fields have been modified.</p> Signup and view all the answers

What is non repudiation?

<p>Protection against denial by one of the entities involved in a communication of having participated in all or part of the communication</p> Signup and view all the answers

What is nonrepudiation origin?

<p>Proof that the message was SENT by the specified party.</p> Signup and view all the answers

What is nonrepudiation destination?

<p>Proof that the message was RECEIVED by the specified party.</p> Signup and view all the answers

What is specific security mechanisms?

<p>May be implemented into the appropriate protocol layer in order to provide some of the OSI security services.</p> Signup and view all the answers

What is encipherment?

<p>Using mathematical algorithms to transform a data into a form that is unreadable. The transformation and the reverse of the transformation depend on the algorithm being used and zero or more encryption keys</p> Signup and view all the answers

What is digital signature?

<p>Data appended to or cryptographic transformation of a data unit that allows the recipient to prove the source and intergrity of the data unit and protect against forgery</p> Signup and view all the answers

What is access control in specific security mechanisms?

<p>A variety of mechanisms that enforce access rights to resources</p> Signup and view all the answers

What is data integrity in specific security mechanism?

<p>A variety of mechanisms that is used to ensure the integrity of a data unit or a stream of data units.</p> Signup and view all the answers

What is authentication exchange?

<p>A mechanism intended to ensure the identity of an entity through information exchange.</p> Signup and view all the answers

What is traffic padding?

<p>The insertion of data bits into gaps of data streams to frustrate traffic analysis attempts.</p> Signup and view all the answers

What is routing control?

<p>Enables selection of particular physically secure routes for certain data and allows routing changes, especially when a breaching of security is suspected</p> Signup and view all the answers

What is notarization?

<p>The use of a trusted third party to assure certain properties of a data exchange.</p> Signup and view all the answers

What is pervasive security mechanisms?

<p>Mechanisms that are not specific to any OSI security service or protocol layer</p> Signup and view all the answers

What is trusted functionality?

<p>Perceived to be correct with respect to some criteria</p> Signup and view all the answers

What is security label?

<p>The marking bound to a resource that names or designates the security attributes of that resource</p> Signup and view all the answers

What is event detection?

<p>Detection of security related event</p> Signup and view all the answers

What is security audit trail?

<p>Data collected and possibly used to facilitate a security audit, which is an independent review and examination of system records and activities</p> Signup and view all the answers

What is security recovery?

<p>Deals with request from mechanisms, such as event handling and management functions and takes recovery actions</p> Signup and view all the answers

Study Notes

Authentication and Integrity

  • Peer Entity Authentication: Verifies the identity of entities (like users or devices) communicating over a network, ensuring both parties are who they claim to be.
  • Data Origin Authentication: Confirms that the source of the data is legitimate and has not been altered from its original form.
  • Access Control: Mechanisms to restrict unauthorized access to systems, applications, or data, often through authentication procedures.
  • Connection Confidentiality: Protects the data transmitted over a network connection from being intercepted by unauthorized entities.

Confidentiality Types

  • Connectionless Confidentiality: Ensures data confidentiality in communications that do not establish a dedicated connection, such as UDP (User Datagram Protocol).
  • Selective Field Confidentiality: Applies confidentiality measures to specific parts or fields of data rather than the entire dataset.
  • Traffic Flow Confidentiality: Protects information regarding the pattern and volume of transmitted data to conceal users' activities and communication flows.

Data and Connection Integrity

  • Data Integrity: Ensures that data remains accurate, consistent, and unaltered during storage, processing, and transmission.
  • Connection Integrity with Recovery: Ensures the integrity of a data connection while allowing for recovery in case of disruptions or errors during transmission.
  • Connection Integrity without Recovery: Guarantees data integrity without providing mechanisms to recover lost or corrupted data.
  • Selective Field Connection Integrity: Maintains the integrity of specific fields in a data connection, ensuring those particular areas are safeguarded.

Additional Integrity Concepts

  • Connectionless Integrity: Verifies the integrity of data sent in a connectionless manner, without establishing a dedicated path for transmission.
  • Selective Field Connectionless Integrity: Similar to connectionless integrity but focused on maintaining the integrity of designated fields.

Non-Repudiation

  • Non-Repudiation: Ensures that an entity cannot deny the authenticity of their signature or the sending of a message, providing proof of the origin and delivery.
  • Non-repudiation Origin: Protects against denial of a message being sent; assures that the message sender cannot disown their action.
  • Non-repudiation Destination: Provides assurance that the recipient of a message can confirm its reception and cannot contest receiving it.

Security Mechanisms

  • Specific Security Mechanisms: Unique tools or protocols designed to enhance security in systems by fulfilling specific security requirements.
  • Encipherment: The process of converting plaintext into ciphertext to secure data during transmission.
  • Digital Signature: A cryptographic technique used to validate the authenticity and integrity of a message, document, or digital file.

Security Mechanism Features

  • Access Control in Specific Security Mechanisms: Integrated access restrictions in security protocols to allow only authorized users access to sensitive functions.
  • Data Integrity in Specific Security Mechanisms: Measures designed to ensure data has not been altered unauthorizedly, incorporated within security protocols.

Additional Security Techniques

  • Authentication Exchange: A method for parties to verify each other’s identities during a communication exchange.
  • Traffic Padding: The practice of adding extra data to a transmission to obscure the actual amount of information being sent.
  • Routing Control: Management of the path that data packets take through a network to ensure secure transmission.

Security Awareness and Controls

  • Notarization: The process of certifying documents that adds an additional layer of security and trustworthiness.
  • Pervasive Security Mechanisms: Security measures embedded in all aspects of a system to ensure holistic protection.
  • Trusted Functionality: Components or features in a system that reliably perform security functions as intended.

Security Monitoring and Recovery

  • Security Label: Markings or metadata assigned to data that indicate its security classification and handling requirements.
  • Event Detection: The ability to identify and alert on security-related events or anomalies in system activities.
  • Security Audit Trail: A log of events and changes made within a system, facilitating accountability and forensic analysis.
  • Security Recovery: Strategies and processes put in place to restore a system’s functionality and integrity after a security incident or breach.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Description

For CNS

More Like This

X.800 Authentication Services Quiz
5 questions
Peer Support Advocacy and Ethics
16 questions
Peer Counseling 1 Exam Study Guide
15 questions
Dental School Peer Assessment Quiz
9 questions
Use Quizgecko on...
Browser
Browser