| Term 
 
        | With the introduction of the computer the need for automated tools for protecting files and other information stored on the computer became evident.
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | There is a natural tendency on the part of users and system managers to perceive little benefit from security investment until a security failure occurs.
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | There are clear boundaries between network security and internet security. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | The CIA triad embodies the fundamental security objectives for both data and for information and computing services.
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | In developing a particular security mechanism or algorithm one must always consider potential attacks on those security features.
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | A loss of confidentiality is the unauthorized modification or destruction of information. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Patient allergy information is an example of an asset with a moderate requirement for integrity. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | The more critical a component or service, the higher the level of availability required. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Data origin authentication provides protection against the duplication or modification of data units.
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | The emphasis in dealing with passive attacks is on prevention rather than detection. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Data integrity is the protection of data from unauthorized disclosure. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Information access threats exploit service flaws in computers to inhibit use by legitimate users. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Viruses and worms are two examples of software attacks. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | A connection-oriented integrity service deals with individual messages without regard to any larger context and generally provides protection against message modification only.
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Pervasive security mechanisms are not specific to any particular OSI security service or protocol layer
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Public-key encryption is also referred to as conventional encryption, secret-key, or single-key encryption.
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | The advantage of a block cipher is that you can reuse keys. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Ciphertext is the scrambled message produced as output. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | The security of symmetric encryption depends on the secrecy of the algorithm, not the secrecy of the key
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | The ciphertext-only attack is the easiest to defend against because the opponent has the least amount of information to work with.
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | The Feistel structure is a particular example of the more general structure used by all symmetric block ciphers.
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Smaller block sizes mean greater security but reduced encryption/decryption speed. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | The essence of a symmetric block cipher is that a single round offers inadequate security but that multiple rounds offer increasing security.
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Triple DES was first standardized for use in financial applications in ANSI standard X9.17 in 1985.
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | The most commonly used symmetric encryption algorithms are stream ciphers. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | The principal drawback of 3DES is that the algorithm is relatively sluggish in software. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | AES uses a Feistel structure. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Random numbers play an important role in the use of encryption for various network security applications.
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | The primary advantage of a stream cipher is that stream ciphers are almost always faster and use far less code than do block ciphers.
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | One desirable property of a stream cipher is that the ciphertext be longer in length than the plaintext.
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Public key algorithms are useful in the exchange of conventional encryption keys. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Private key encryption is used to produce digital signatures which provide an enhanced form of message authentication.
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | The strength of a hash function against brute-force attacks depends solely on the length of the hash code produced by the algorithm.
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | The two important aspects of encryption are to verify that the contents of the message have not been altered and that the source is authentic.
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | In the ECB mode of encryption if an attacker reorders the blocks of ciphertext then each block will still decrypt successfully, however, the reordering may alter the meaning of the overall data
 sequence.
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Message encryption alone provides a secure form of authentication. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Because of the mathematical properties of the message authentication code function it is less vulnerable to being broken than encryption.
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | In addition to providing authentication, a message digest also provides data integrity and performs the same function as a frame check sequence.
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Cryptographic hash functions generally execute slower in software than conventional encryption algorithms such as DES.
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | The main advantage of HMAC over other proposed hash based schemes is that HMAC can be proven secure, provided that the embedded hash function has some reasonable cryptographic
 strengths.
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Public key algorithms are based on mathematical functions rather than on simple operations on bit patterns.
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | The private key is known only to its owner. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | The security of the Diffie-Hellman key exchange lies in the fact that, while it is relatively easy to calculate exponentials modulo a prime, it is very easy to calculate discrete logarithms.
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | The key exchange protocol is vulnerable to a man-in-the-middle attack because it does not authenticate the participants.
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Even in the case of complete encryption there is no protection of confidentiality because any observer can decrypt the message by using the sender's public key.
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | For symmetric encryption to work the two parties to an exchange must share the same key, and that key must be protected from access by others.
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | It is not necessary for a certification authority to maintain a list of certificates issued by that CA that were not expired but were revoked.
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | A session key is destroyed at the end of a session. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Kerberos relies exclusively on asymmetric encryption and makes use of public key encryption. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | The automated key distribution approach provides the flexibility and dynamic characteristics needed to allow a number of users to access a number of servers and for the servers to exchange
 data with each other.
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | If an opponent captures an unexpired service granting ticket and tries to use it they will be denied access to the corresponding service.
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | The ticket-granting ticket is encrypted with a secret key known only to the authentication server and the ticket granting server.
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | If the lifetime stamped on a ticket is very short (e.g., minutes) an opponent has a greater opportunity for replay.
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Kerberos version 4 did not fully address the need to be of general purpose. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | One of the major roles of public-key encryption is to address the problem of key distribution. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | It is not required for two parties to share a secret key in order to communicate securely with conventional encryption.
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | X.509 is based on the use of public-key cryptography and digital signatures. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | User certificates generated by a CA need special efforts made by the directory to protect them from being forged.
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | The principal underlying standard for federated identity is the Security Assertion Markup Language (SAML) which defines the exchange of security information between online business
 partners.
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Federated identity management is a concept dealing with the use of a common identity management scheme across multiple enterprises and numerous applications and supporting
 many thousands, even millions, of users.
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | SSl/TLS includes protocol mechanisms to enable two TCP users to determine the security mechanisms and services they will use.
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Unlike traditional publishing environments, the Internet is three-way and vulnerable to attacks on the Web servers.
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Sessions are used to avoid the expensive negotiation of new security parameters for each connection that shares security parameters.
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Microsoft Explorer originated SSL. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets.
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | One way to classify Web security threats is in terms of the location of the threat: Web server, Web browser, and network traffic between browser and server.
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | The encryption of the compressed message plus the MAC must increase the content length by more than 1024 bytes.
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | The Change Cipher Spec Protocol is one of the three SSL-specific protocols that use the SSL Record Protocol.
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | The SSL Record Protocol is used before any application data is transmitted. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | The first element of the CipherSuite parameter is the key exchange method. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | The certificate message is required for any agreed on key exchange method except fixed Diffie-Hellman.
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Phase 3 completes the setting up of a secure connection of the Handshake Protocol. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | The shared master secret is a one-time 48-byte value generated for a session by means of secure key exchange.
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | The TLS Record Format is the same as that of the SSL Record Format. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Server authentication occurs at the transport layer, based on the server possessing a public/private key pair
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | _________ security consists of measures to deter, prevent, detect, and correct security violations that involve the transmission of information.
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Verifying that users are who they say they are and that each input arriving at the system came from a trusted source is _________ .
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | __________ assures that systems work promptly and service is not denied to authorized users. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | __________ assures that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system.
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | The security goal that generates the requirement for actions of an entity to be traced uniquely to that entity is _________ .
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | __________ attacks attempt to alter system resources or affect their operation. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | A __________ takes place when one entity pretends to be a different entity. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | X.800 defines _________ as a service that is provided by a protocol layer of communicating open systems and that ensures adequate security of the systems or of data transfers.
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | _________ is a professional membership society with worldwide organizational and individual membership that provides leadership in addressing issues that confront the future of the Internet
 and is the organization home for the groups responsible for Internet infrastructure standards,
 including the IETF and the IAB.
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | The protection of data from unauthorized disclosure is _________ . |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | __________ is a U.S. federal agency that deals with measurement science, standards, and technology related to U.S. government use and to the promotion of U.S. private sector
 innovation.
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | The prevention of unauthorized use of a resource is __________ . |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | The __________ service addresses the security concerns raised by denial-of-service attacks. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | _________ is the insertion of bits into gaps in a data stream to frustrate traffic analysis attempts. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | _________ is a variety of mechanisms used to assure the integrity of a data unit or stream of data units.
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | A symmetric encryption scheme has _________ ingredients. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | _________ is the original message or data that is fed into the algorithm as input. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | _________ mode requires only the implementation of the encryption algorithm and not the decryption algorithm.
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | A __________ processes the input elements continuously, producing output one element at a time, as it goes along.
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | If both sender and receiver use the same key the system is referred to as _________ encryption. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | If the sender and receiver each use a different key the system is referred to as __________ encryption. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | A _________ approach involves trying every possible key until an intelligible translation of the ciphertext into plaintext is obtained.
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | With the ________ mode if there is an error in a block of the transmitted ciphertext only the corresponding plaintext block is affected.
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | The most common key length in modern algorithms is ________ . |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | A ________ takes as input a source that is effectively random and is often referred to as an entropy source.
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | A symmetric block cipher processes _________ of data at a time. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | In _________ mode a counter equal to the plaintext block size is used. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | The _________ algorithm performs various substitutions and transformations on the plaintext. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | If the analyst is able to get the source system to insert into the system a message chosen by the analyst, a _________ attack is possible.
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | The _________ key size is used with the Data Encryption Standard algorithm. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | A _________ is a key used between entities for the purpose of distributing session keys. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | The __________ knows the passwords of all users and stores these in a centralized database and also shares a unique secret key with each server. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Once the authentication server accepts the user as authentic it creates an encrypted _________ which is sent back to the client. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | In order to solve the problem of minimizing the number of times that a user has to enter a password and the problem of a plaintext transmission of the password a __________ server is
 used.
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | In order to prevent an opponent from capturing the login ticket and reusing it to spoof the TGS, the ticket includes a __________ indicating the date and time at which the ticket was issued.
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | A ___________ is a service or user that is known to the Kerberos system and is identified by its principal name. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Kerberos version 4 requires the use of ____________ . |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Encryption in version 4 makes use of a nonstandard mode of DES known as ___________ . |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | A random value to be repeated to assure that the response is fresh and has not been replayed by an opponent is the __________ .
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Used in most network security applications the __________ standard has become universally accepted for formatting public-key certificates.
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Containing the hash code of the other fields encrypted with the CA's private key, the __________ covers all of the other fields of the certificate and includes the signature algorithm identifier.
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | The _________ extension lists policies that the certificate is recognized as supporting, together with optional qualifier information.
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | _________ are entities that obtain and employ data maintained and provided by identity and attribute providers, which are often used to support authorization decisions and to collect audit
 information.
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | An __________ manages the creation and maintenance of attributes such as passwords and biometric information. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | __________ is a centralized, automated approach to provide enterprise wide access to resources by employees and other authorized individuals, with a focus of defining an identity for each
 user, associating attributes with the identity, and enforcing a means by which a user can verify identity.
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | ________ protects against passive attack (eavesdropping). |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | The most important hash function is ________ . |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | __________ is a procedure that allows communicating parties to verify that received messages are authentic. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | If the message includes a _________ the receiver is assured that the message has not been delayed beyond that normally expected for network transit.
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | The purpose of a ___________ is to produce a "fingerprint" of a file, message, or other block of data. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | It is computationally infeasible to find any pair (x, y) such that H(x) = H(y). A hash function with this property is referred to as __________ .
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | "It is easy to generate a code given a message, but virtually impossible to generate a message given a code" describes the __________ hash function property.
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | The __________ property protects against a sophisticated class of attack known as the birthday attack.
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Secure Hash Algorithms with hash value lengths of 256, 384, and 512 bits are collectively known as _________ .
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Public key cryptography is __________. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | The readable message or data that is fed into the algorithm as input is the __________ . |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | The key used in conventional encryption is typically referred to as a _________ key. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | The most widely accepted and implemented approach to public-key encryption, _________ is a block cipher in which the plaintext and ciphertext are integers between 0 and n - 1 for some n.
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | The purpose of the _________ algorithm is to enable two users to exchange a secret key securely that then can be used for subsequent encryption of messages and depends on the
 difficulty of computing discrete logarithms for its effectiveness.
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Based on the use of a mathematical construct known as the elliptic curve and offering equal security for a far smaller bit size, __________ has begun to challenge RSA.
 |  | Definition 
 | 
        |  |