Complete Solutions
2 basic functions used in encryption algorithms? ✔️Ans - substitution
transposition
access control ✔️Ans - prevention of unauthorized use of resources.
accountability ✔️Ans - security goal that generates the requirements
for actions of an entity to be traced uniquely to that entity (to trace securiy
attack to a responsible party)
active attacks ✔️Ans - modification of data stream or creation of false
stream and is divided into Masquerad, Reply, Modification of messages,
Denial of service
Attacks Types (not active and passive) ✔️Ans - cryptanalysis
brute-force attack
authentication ✔️Ans - the assurance that the communicating entity is
the one that it claims to be
authentication protocols ✔️Ans - uses cryptographic algorithms to
authenticate the idnetity of entities (sender and receiver)
authenticity ✔️Ans - the ability of being verified and trusted source.
autokey vigenere cipher ✔️Ans - write the key then the same plaintext
along the plaintext then do the equation (p+k)mod26 and - for decryption
availability ✔️Ans - assures that systems work promptly and services
are not denied.
CIA triad ✔️Ans - confidentiality, integrity and availabilty
Computer security ✔️Ans - is the protection provided (afforded) to
automated info. systems to achive (attain) the aplicable objectives of
preserving the integrity, availabily and confidentiality of system resources.
, confidentiality ✔️Ans - protection of data from an unathuraized
disclosure.
connection confidentiality ✔️Ans - protection of user data on a
connection
connection integrity with recovery ✔️Ans - provide integriy to user
data on a connection, and detects and modification.., with recovery
attempted.
connection integrity without recovery ✔️Ans - provide integrity to user
data on a connection, and detects modification, without providing recovery.
connectionless confidentialiy ✔️Ans - protection of user data in a
single data block
connectionless integrity ✔️Ans - integrity of a single data block, and
detects for data modification.
cryptanalysis ✔️Ans - is based on the cryptanalyst known info. about
the pt/ct/ algorithms used or key.
cryptography systems depends on 3 things: ✔️Ans - 1. type of
operation used for encryption.
2. no. of keys used.
3. plaintext processing method
Data Encryption Standard ✔️Ans - encryption algorithm that exihbits
the feistel structure. uses 64bit block and 56bit key.
data-origin authentication ✔️Ans - in connection transfer
(connectionless) provides the confidence that the source of data arrived is
as claimed
Denial of service ✔️Ans - preventing the normal use of communicaton
facilities. by doing: suppressing all messages that is sent to server, or
diabling the network of server, or by overloading it with messages.