study_security_l2


"/home/yossef/notes/Su/security/study_security_l2.md"

path: Su/security/study_security_l2.md

- **fileName**: study_security_l2
- **Created on**: 2025-03-07 16:54:59

what are is computer security challenges?

consider the three aspects for information security? - security attacks

explain threats ,vulnerabilities ,security risk and security control?

threat:

vulnerabilities:

security risk:

security control:

what is passive attack (interception, traffic anaylsis)?

a passive attack attempts to learn or make use of information of system
but not change any thing in the information

what is passive attack (interruption)?

a passive attack attempts to learn or make use of information of system
and interupt information between sender and recevier

what is passive attack (fabrication, replay)?

a passive attack attempts to learn or make use of information of system
and fabracate the information and send it ot recevier

what is passive attack (modification)?

a passive attack attempts to learn or make use of information of system
and change content of message from send and recever and send it again

compere between passive and active attack?

passive:

active:

what is security serivce?

is enhance security of data processing system and information transfers of
an organization

what is X.800?

a service provided by a protocol layer of communicating open systems which
ensure the security of the systems data that transfer

what is RFC 2828?

a processing or communication service provided by a system to give a
specific kind of protection to system resources

what is Authentication ?

assurance that the communicating entity is the one claimed

what is access control??

preventation unauthorized people from using resources

what is data confidentiality??

protection of data from unauthorizathed disclosure

what is data intergrity?

assurance that data recevided is sent by an authorized entity

what is Availability ?

resource accessible/usable

what is the econmy of mechansim?

mean that the desgin the design of security measure in both hardware and
software should be simple and imposable

what is complete mediation?

means that every access must check against access contorl mechanism

Review Questions - Answers

1. Difference between Cryptography and Cryptanalysis

2. Difference between Symmetric and Asymmetric Encryption

3. 5 Challenges of Computer Security

  1. not easy and not simple
  2. must consider all potential risks and attacks
  3. Requires continuous monitoring.
  4. must descide where to applay a mechanism
  5. battle wits between admin and hacker
  6. involes algorhtim and secret key

4. 3 Aspects of Information Security

5. Active vs. Passive Attacks (Examples & Handling)

6. explain the basic security service?

it's a processing or communcation service that enhance the security of
data processing in the system and information tarnsfer in organization

7. Select five principles of fundamental security design and explain each one.

  1. complete mediation: means that every access that must checked against the
    access control mechanism
  2. open design: mean the mechanism and design of security should be public
    not secret
  3. Least common mechanism means that the design should minimize the
    functions shared by different users.
  4. encapsulation: protection is provide my encapsulating a collection of data
    and objects
  5. Least astonishment means that a program or user interface
    should always respond in the way that is least likely to astonish
    the user.
  6. layering: refers to use multiple, overlapping protection layer

continue:./study_security_l3.md
before:./study_security_l1.md