100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Computer Security Principles | Exam Questions With Complete Solutions 100% Verified Newest 2025

Rating
-
Sold
-
Pages
16
Grade
A+
Uploaded on
24-01-2025
Written in
2024/2025

Computer Security Principles | Exam Questions With Complete Solutions 100% Verified Newest 2025

Institution
Computer Security
Course
Computer Security










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Computer Security
Course
Computer Security

Document information

Uploaded on
January 24, 2025
Number of pages
16
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Computer Security Principles | Exam Questions
With Complete Solutions 100% Verified Newest
2025
Security Policy - ANSWER What assets are we protecting and what properties are we
enforcing? (CIA, AAA)


Answers these question to determine where security needs to focused in an
organization


CIA - ANSWER Confidentiality, Integrity, Availability


Integrity - ANSWER Ensuring that a message sent across a network is not altered along
the way


Threat Model - ANSWER Who are the attackers and what are they capable of
Determining what type of attack to expect


Risk Assesment - ANSWER What are our weaknesses, what would the cost of a
successful attack, how likely is the attack


Confidentiality - ANSWER Ensure only trusted parties view the message


Availability - ANSWER Make sure trusted users can access the message at all times


AAA - ANSWER Authenticity, Anonymity, Accountability

,Authenticity - ANSWER Ability to determine if data issued by a user is genuine


Anonymity - ANSWER Transactions being unattributable to any certain origin


Accountability - ANSWER Requirement for actions of an entity to be traced uniquely to
that individual


Cheating on the final example


Bob needs to send a message to Alice and ensure the integrity of the message. They
don't know if Mallory will alter the message. - ANSWER Bob sends the plaintext message
along with the result of a f(m) to create v. Alice can use f to decode v and if it doesn't
match v Alice knows the message is incorrect.


f(m) properties - ANSWER We want a function that can alter m in a way that Mallory
cannot predict so they can't replicate v. It also needs to be reversible so Alice can
correctly decode it on reception


Generate consistent output
One to one mapping
Must be unknown to Mallort


Random Function f() - ANSWER Takes an input of any large size and returns a fixed
output. Maps each input to a possible output. Uses giant lookup table to pair inputs and
outputs


Is random function f() practical? - ANSWER No,

, The lookup table has to be huge and exchanged beforehand


PRF - ANSWER Pseudorandom Function (alternative to random function)


Function that looks random but isn't (therefore more practical)
This function is computable rather than needing a lookup table.


Using a PRF - ANSWER Start with a family of functions that can be known to Mallory (f0
... fn). Use fk where k is a secret key known to Alice and Bob.


Depends on secrecy of the key not the system


Kerchoff's Principles - ANSWER A system must be practically indecipherable
It shouldn't matter if the attacker has the function


Cheating example using a PRF - ANSWER Alice and Bob have exchanged a key k, Alice
sends Bob the message as well as the result of fk(m). Mallory knows all the functions but
doesn't know k so doesn't know which function was used to make v. If Mallory alters the
message they can't ensure v is altered correctly and Bob will notice the difference


Replay Attack - ANSWER Mallory can delay messages or send old ones the confuse Bob


Protection from Replay and Reordering attacks - ANSWER Use a different key each
message (needs to be communicated each time)


Do PRFs exists - ANSWER maybe

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
QUINTER New York College Of Dentistry
View profile
Follow You need to be logged in order to follow users or courses
Sold
339
Member since
2 year
Number of followers
104
Documents
38211
Last sold
5 hours ago

3.4

57 reviews

5
25
4
8
3
7
2
1
1
16

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions