Shared Flashcard Set

Details

ECE 419 Topic 1
ECE 419 Topic 1
38
Computer Networking
Undergraduate 4
05/01/2012

Additional Computer Networking Flashcards

 


 

Cards

Term
What does security architecture define?
Definition
Defines trust relationship among nodes and protection mechanism of information processed, stored, and transmitted
Term
What are nodes capable of?
Definition
Processing, storing, transmitting information
Term
What is a link(edge)
Definition
edge where two nodes can transfer information through medium, usually with security protection
Term
What are 5 OSI model for computer networking?
Definition
from top to bottom: application, transport, network, data link, physical
Term
What's the purpose of physical layer?
Definition
transfer signals(bit by bit)
Term
what's the purpose of data link layer?
Definition
transfer signals between two nodes(packet by packet)
Term
what's the purpose of network layer?
Definition
transfer signal from 1 node to another node in a network (e.g IP which transfers packet to another node in a network)
Term
what's the purpose of transport layer?
Definition
a file as a whole rather than packet, makes sure reliability and security of the file (e.g TCP which makes sure all the data are transferred properly)
Term
How to make a key unpredictable?
Definition
probability of every possible data are same and also run is distributed correctly
Term
What are 5 things you can do with crypto algorithm?
Definition
1. confidentiality 2. integrity and authentication 3. digital signature 4. non-repudiation 5. access control
Term
what is a problem with public key encryption?
Definition
need to authenticate the public key is from correct person
Term
What is one solution for public-key's problem?
Definition
public-key infrastructure where certified authorities will authorize the public-key to ensure it's from correct person
Term
what is confidentiality?
Definition
protect information accessed from non-eligible parties by using encryption
Term
what is data integrity?
Definition
the data received is same as the data sent
Term
Why is authentication needed?
Definition
to verify the sender of information is the actual sender
Term
describe how symmetric key encryption works
Definition
see lecture notes
Term
describe how public-key encryption works
Definition
see lecture notes
Term
what are two methods that will provide integrity and authentication?
Definition
MAC and digital signature
Term
describe how MAC works
Definition
see lecture notes
Term
describe how digital signature works
Definition
see lecture notes
Term
what is a trust model
Definition
define trust relationships among nodes
Term
what are two ways trust relationship is established?
Definition
1. assumed trust
2. applied trust
Term
what does security infrastructure supposed to do?
Definition

provide certain service to establish trust for other parties (public key infrastructure)

This is important because when a person is applying for trust, how can I make sure that person is a trust worthy person?

Term
What is side-channel attacks?
Definition
break into the nodes and by looking at power consumption, timing, temperature, etc to find key
Term
if you were to choose to break into a system for wired and for wireless, which one do you prefer?
Definition
wireless
Term
describe man-in-the-middle attack
Definition
third person intercepts the communication in two ways: change the information sent(active) or listen to the information(passive)
Term
what is the difficulty with man-in-the-middle attack?
Definition
middle man must be able to fake message or digital signature in real time, so basically timing is important in man-in-the-middle attack
Term
what are two things a trusted platform(node) should do?
Definition
1. cannot bypass encryption and transmit if supposed to
2. cannot issue access to a file if process is not entitled to
Term
what are 4 classes of threats?
Definition
1. break into algorithms and protocols 2. physical attack 3. wireless attack 4. MITM attack
Term
what are two main focus on communication system security?
Definition
1. trusted nodes
2. protected edges
Term
What are five requirements of a trusted platform?
Definition

1. robust from physical attacks 2. validated system software 3. authenticated applications

4. cannot bypass encryption and transmit if supposed to 5. cannot issue access to a file if process is not entitled to

Term
How to protect a communication?
Definition
1. confidentiality
2. integrity
3. authenticity
Term
What are 4 requirements of establish and protect communications?
Definition

1. mutual authentication 2. key establishment 3. protected negotiation 4. failure detection

e.g sending mail

Term
In digital signature, who uses private key?
Definition
sender
Term
what's the fundamental difference between MAC and Digital Signature?
Definition
1. MAC is symmetric key
2. Digital Signature is public-key
Term
public-key infrastructure is related to digital signature?
Definition
Yes, a infrastructure is needed to say this is correct digital signature (challenge-response based auth)
Term
Security infrastructure is related to what?
Definition
trust
Term
What's run for 1001011 counts wrap of 1s?
Definition
run 1 of length 3 = 1 because of wrap
Supporting users have an ad free experience!