Cryptography and Network Security Principles Key Questions and Correct Answers
What is TCP/IP? - Transmission Control Protocol/ Internet Protocol Symmetric encryption - Used to conceal the contents of blocks or stream of data of any size, including messages, files, encryption keys, and passwords Cryptographic algorithms can be grouped into what four main areas? - Symmetric encryption Asymmetric encryption Data integrity algorithms Authentication protocols Asymmetric encryption - Used to conceal small blocks of data, such as encryption keys and hash function values, which are used in digital signatures Data integrity algorithms - Used to protect blocks of data from alteration Authentication protocols - Schemes based on the use of cryptographic designed to authenticate the identity of entities The field of Network and Internet Security consists of.. - Measures to deter, prevent, detect, and correct security violations that involve the transmission of information NIST [NIST95] - National Institute of Standards and Technology Computer security - The protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability and confidentiality of information system resources What three objectives are at the heart of computer security? - Confidentiality Integrity Availability Confidentiality has two concepts. What are they? ( in relation to CIA Triad of Confidentiality) - Data confidentiality Privacy Data confidentiality ( in relation to CIA Triad of Confidentiality) - Assures that private or confidential information is not made available or disclosed to unauthorized individuals What are the four data confidentialities in the X.800? - Connection confidentiality Connectionless confidentiality Selective-field confidentiality Traffic-flow confidentiality Privacy ( in relation to CIA Triad of Confidentiality) - Assures that individuals control or influence what related to them may be collected and stored and by whom and to whom information may be disclosed Integrity covers two related concepts. What are they? ( in relation to CIA Triad of Integrity) - Data integrity System integrity Data integrity
Written for
- Institution
- Cryptography and Network Security
- Course
- Cryptography and Network Security
Document information
- Uploaded on
- February 20, 2024
- Number of pages
- 12
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
cryptography and network security principles
Also available in package deal