Section 1.8. Key Terms, Review Questions, and Problems


[Page 25 (continued)]

1.8. Key Terms, Review Questions, and Problems

Key Terms

access control

active threat

authentication

authenticity

availability

data confidentiality

data integrity

denial of service

encryption

integrity

intruder

masquerade

nonrepudiation

OSI security architecture

passive threat

replay

security attacks

security mechanisms

security services

traffic analysis

Review Questions

1.1

What is the OSI security architecture?

1.2

What is the difference between passive and active security threats?

1.3

List and briefly define categories of passive and active security attacks.

1.4

List and briefly define categories of security services.

1.5

List and briefly define categories of security mechanisms.

Problems

1.1

Draw a matrix similar to Table 1.4 that shows the relationship between security services and attacks.

1.2

Draw a matrix similar to Table 1.4 that shows the relationship between security mechanisms and attacks.




Cryptography and Network Security Principles and Practices
Cryptography and Network Security (4th Edition)
ISBN: 0131873164
EAN: 2147483647
Year: 2005
Pages: 209

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net