Computer security
- What is OSI security architecture?
The OSI Security Architecture is a setting that gives an organized means that of shaping the wants for security and evaluating the strategies to supporting those requirements, whereas still developing security attacks, devices, and facilities, and therefore the associations among these modules.
- What is the difference between passive and active security threats?
Passive Attacks involve eavesdropping or observation of transmissions. In distinction, active attacks relate to the modification of the information stream or development of a deceitful stream; it's going to entail units like replay, masquerade, denial of service, and adjustment of messages.
- List and briefly define categories of passive and active security attacks.
The classes of active attacks are replay, masquerade, modification of messages and denial of service; Denial of service- this can be the suppression of communication services in a very network. Masquerade- a state of affairs whereby one party pretends to be another to access data. Modification of messages- this can be the alteration, rearrangement, or delay of sections or parts of a message to yield unofficial results. Replay: involves passively capturing information and retransmitting it to yield an unauthorized result. The classes of passive security attacks are the release of message contents and traffic analysis; Release of message contents- this involves unauthorized capturing, accessing, and reading of the contents of the message. Traffic analysis involves observing the pattern, frequency, and length of communication as well as determining the location and individuality of the parties communicating.
- List and briefly define categories of security services.
Access control is the inhibition of unauthorized use of a resource in terms of dominant parties accessing the resources, conditions below that the access is formed, and the authorization these parties have concerning the resource. Authentication: The guarantee that the human activity party is the one that it claims to be. Availability service: the accessibility and usefulness of a system's resource upon its demand by an authorized party as per the performance provisions of the actual system. Data confidentiality: this can be the protection of information from unofficial exposure. Data integrity: The guarantee that the information being received is strictly the manner an authorized party had sent it. Nonrepudiation is the protection against denial of access to communication by one or all parties concerned in a connection.
- List and briefly define categories of security mechanisms.
Access Control is a series of techniques that impose access privileges to resources. Authentication Exchange is an unreal mechanism to substantiate the identity of a celebration through the proof exchange. Data Integrity: a series of techniques used to make sure the integrity of information. Digital Signature is the cryptanalytic conversion of an information unit to prove the honesty of the information supply and, therefore, the data itself to safeguard against imitation or alteration. Encipherment involves the employment of a formula, principally a mathematical one, to transmute information into an incomprehensible state, whereas at the same time, it exploits a method at the side of many secret writing keys to recover the data. Notarization: this can be the employment of a reliable third-party to ensure specific properties of information exchange are met. Routing controls: this can be the choice of a well-suited route for a specific information stream and any routing changes enclose of information security breach suspicion. Traffic padding: this can be the addition of bits into openings in a very information stream to exasperate traffic analysis efforts.
- List and briefly define the fundamental security design principles.
Complete mediation: each access attempt should be evaluated against the set access management techniques. The economy of mechanism: ensures the simplicity of the protection style. Encapsulation: an exact type of seclusion engineered on object-oriented practicality Fail-safe default ensures that access to systems is permission-based. Isolation: the impression that systems, procedures, documents, and security techniques should be distinct from one different and as accessible as required. Layering: the employment of many, superimposed protections Least astonishment: the protection ought to be designed in a very manner that limits user confusion. Least common mechanism: the strategy ought to reduce the roles shared by various users to ensure system security. Least privilege: every procedure and operator should work with mistreatment for the minimum set of rights needed to complete the task. Modularity: refers to the creation of security techniques as distinct, protected units, and the employment of integrated design for security set up and employment Open design: the protection strategy shouldn't be close-lipped, however open. Psychological acceptability: security procedures shouldn't affect the operations of users; however, they should meet the wants of persons who approve access. Separation of privilege: incorporation of multiple distinct access attributes to induce access to a service within the system.
- Explain the difference between an attack surface and an attack tree.
Attack Surface consists of accessible and utile weaknesses in a system like staff, interfaces, and networks. In contrast, an attack tree could be a deviating, well-organized system that represents a collection of credible procedures for manipulating security vulnerabilities in a system.