Size: 1769
Comment:
|
Size: 2061
Comment:
|
Deletions are marked like this. | Additions are marked like this. |
Line 30: | Line 30: |
what are two types of attacks? 1. Active Attacks: try to directly affect resources 1. Passive Attacks: gain information by evesdropping. 1. '''Release of message contents''' allows reading of the message. 1. '''Traffice analysis''' to gain information about the message |
|
Line 37: | Line 43: |
Chapter 1 Notes
Terms
computer security |
The generic name for the collection of tools designed to protect data and to thwart hackers. |
|
network security (often Internet Security) |
Tools that protect data in transit |
|
X.800 Security Architecture for OSI |
defines a security service as a service provided by a protocol layer of communicating open systems, which ensures adequate security of the systems data transfers |
Questions
What are three aspects of information security?
- Security Attack: Any action that compromises the security of information.
- Security Mechanism: A mechanism that is designed to detect, prevent, or recover from a security attack.
- Security Service: A service that enhances the security of the data processing systems and the information transfers of an organization. Services make use of one or more security mechanisms.
Name three challenges faced by electronic documents not faced by paper documents.
- Digital copies are identical.
- Alterations are not evident
- Proof of authenticity must be provided as a function of the content instead of seals or physical signatures.
What 5 categories does X.800 divide services into?
- Authentication (entity is the one it claims to be)
- Access Control (Prevention of unauthorized use of a resource)
- Data Confidentiality (Protection from unauthorized disclosure)
- Data Integrity (Data is received as sent)
- Nonrepudiation (Protection against denial by one of the entities involved in a communication of having participated in all or part of the communication.)
what are two types of attacks?
- Active Attacks: try to directly affect resources
- Passive Attacks: gain information by evesdropping.
Release of message contents allows reading of the message.
Traffice analysis to gain information about the message
Resources
[http://www.faqs.org/rfcs/rfc2828.html Internet Security Glossary RFC 2828]