Podcast
Questions and Answers
What is peer entity authentication?
What is peer entity authentication?
Used in a logical connection to provide confidence in the identities connected
What is data origin authentication?
What is data origin authentication?
In a connectionless transfer, provides assurance that the source of data is as claimed
What is access control?
What is access control?
The prevention of unauthorised use of resource.
What is connection confidentiality?
What is connection confidentiality?
Signup and view all the answers
What is connectionless confidentiality?
What is connectionless confidentiality?
Signup and view all the answers
What is selective field confidentiality ?
What is selective field confidentiality ?
Signup and view all the answers
What is traffic flow confidentiality?
What is traffic flow confidentiality?
Signup and view all the answers
What is data integrity?
What is data integrity?
Signup and view all the answers
What is connection integrity with recovery?
What is connection integrity with recovery?
Signup and view all the answers
What is connection integrity without recovery?
What is connection integrity without recovery?
Signup and view all the answers
What is selective field connection integrity?
What is selective field connection integrity?
Signup and view all the answers
What is connectionless integrity?
What is connectionless integrity?
Signup and view all the answers
What is selective field connectionless integrity?
What is selective field connectionless integrity?
Signup and view all the answers
What is non repudiation?
What is non repudiation?
Signup and view all the answers
What is nonrepudiation origin?
What is nonrepudiation origin?
Signup and view all the answers
What is nonrepudiation destination?
What is nonrepudiation destination?
Signup and view all the answers
What is specific security mechanisms?
What is specific security mechanisms?
Signup and view all the answers
What is encipherment?
What is encipherment?
Signup and view all the answers
What is digital signature?
What is digital signature?
Signup and view all the answers
What is access control in specific security mechanisms?
What is access control in specific security mechanisms?
Signup and view all the answers
What is data integrity in specific security mechanism?
What is data integrity in specific security mechanism?
Signup and view all the answers
What is authentication exchange?
What is authentication exchange?
Signup and view all the answers
What is traffic padding?
What is traffic padding?
Signup and view all the answers
What is routing control?
What is routing control?
Signup and view all the answers
What is notarization?
What is notarization?
Signup and view all the answers
What is pervasive security mechanisms?
What is pervasive security mechanisms?
Signup and view all the answers
What is trusted functionality?
What is trusted functionality?
Signup and view all the answers
What is security label?
What is security label?
Signup and view all the answers
What is event detection?
What is event detection?
Signup and view all the answers
What is security audit trail?
What is security audit trail?
Signup and view all the answers
What is security recovery?
What is security recovery?
Signup and view all the answers
Study Notes
Authentication and Integrity
- Peer Entity Authentication: Verifies the identity of entities (like users or devices) communicating over a network, ensuring both parties are who they claim to be.
- Data Origin Authentication: Confirms that the source of the data is legitimate and has not been altered from its original form.
- Access Control: Mechanisms to restrict unauthorized access to systems, applications, or data, often through authentication procedures.
- Connection Confidentiality: Protects the data transmitted over a network connection from being intercepted by unauthorized entities.
Confidentiality Types
- Connectionless Confidentiality: Ensures data confidentiality in communications that do not establish a dedicated connection, such as UDP (User Datagram Protocol).
- Selective Field Confidentiality: Applies confidentiality measures to specific parts or fields of data rather than the entire dataset.
- Traffic Flow Confidentiality: Protects information regarding the pattern and volume of transmitted data to conceal users' activities and communication flows.
Data and Connection Integrity
- Data Integrity: Ensures that data remains accurate, consistent, and unaltered during storage, processing, and transmission.
- Connection Integrity with Recovery: Ensures the integrity of a data connection while allowing for recovery in case of disruptions or errors during transmission.
- Connection Integrity without Recovery: Guarantees data integrity without providing mechanisms to recover lost or corrupted data.
- Selective Field Connection Integrity: Maintains the integrity of specific fields in a data connection, ensuring those particular areas are safeguarded.
Additional Integrity Concepts
- Connectionless Integrity: Verifies the integrity of data sent in a connectionless manner, without establishing a dedicated path for transmission.
- Selective Field Connectionless Integrity: Similar to connectionless integrity but focused on maintaining the integrity of designated fields.
Non-Repudiation
- Non-Repudiation: Ensures that an entity cannot deny the authenticity of their signature or the sending of a message, providing proof of the origin and delivery.
- Non-repudiation Origin: Protects against denial of a message being sent; assures that the message sender cannot disown their action.
- Non-repudiation Destination: Provides assurance that the recipient of a message can confirm its reception and cannot contest receiving it.
Security Mechanisms
- Specific Security Mechanisms: Unique tools or protocols designed to enhance security in systems by fulfilling specific security requirements.
- Encipherment: The process of converting plaintext into ciphertext to secure data during transmission.
- Digital Signature: A cryptographic technique used to validate the authenticity and integrity of a message, document, or digital file.
Security Mechanism Features
- Access Control in Specific Security Mechanisms: Integrated access restrictions in security protocols to allow only authorized users access to sensitive functions.
- Data Integrity in Specific Security Mechanisms: Measures designed to ensure data has not been altered unauthorizedly, incorporated within security protocols.
Additional Security Techniques
- Authentication Exchange: A method for parties to verify each other’s identities during a communication exchange.
- Traffic Padding: The practice of adding extra data to a transmission to obscure the actual amount of information being sent.
- Routing Control: Management of the path that data packets take through a network to ensure secure transmission.
Security Awareness and Controls
- Notarization: The process of certifying documents that adds an additional layer of security and trustworthiness.
- Pervasive Security Mechanisms: Security measures embedded in all aspects of a system to ensure holistic protection.
- Trusted Functionality: Components or features in a system that reliably perform security functions as intended.
Security Monitoring and Recovery
- Security Label: Markings or metadata assigned to data that indicate its security classification and handling requirements.
- Event Detection: The ability to identify and alert on security-related events or anomalies in system activities.
- Security Audit Trail: A log of events and changes made within a system, facilitating accountability and forensic analysis.
- Security Recovery: Strategies and processes put in place to restore a system’s functionality and integrity after a security incident or breach.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
For CNS