study_security_l2
"/home/yossef/notes/Su/security/study_security_l2.md"
path: Su/security/study_security_l2.md
- **fileName**: study_security_l2
- **Created on**: 2025-03-07 16:54:59
what are is computer security challenges?
- not easy and not simple
- must consider or potential attacks and risks
- involved algorthim and secret info
- must consider where ot applay a mechanisms
- require regular montinering
- battle of wits between admin and attacker
- unstable security is not secure
consider the three aspects for information security? - security attacks
- security attack
- security mechanisms(control) => design to prevent and detect and recovery
from security attacks - security service authentcation
explain threats ,vulnerabilities ,security risk and security control?
threat:
- threat actor(hacker): an active entity that can execute the scenario
- threat scenario: a set of steps that can execute a cyper attack
vulnerabilities:
- weaknesses allowing scenario to be exectued
security risk:
- successfuly attack
security control:
- a method for removing a risks and vulnerabilities that can case damage
to system and reducing security risk
what is passive attack (interception, traffic anaylsis)?
a passive attack attempts to learn or make use of information of system
but not change any thing in the information
what is passive attack (interruption)?
a passive attack attempts to learn or make use of information of system
and interupt information between sender and recevier
what is passive attack (fabrication, replay)?
a passive attack attempts to learn or make use of information of system
and fabracate the information and send it ot recevier
what is passive attack (modification)?
a passive attack attempts to learn or make use of information of system
and change content of message from send and recever and send it again
compere between passive and active attack?
passive:
- easy to stop
- hard to detect
active:
- hard to stop
- easy to detect
what is security serivce?
is enhance security of data processing system and information transfers of
an organization
what is X.800?
a service provided by a protocol layer of communicating open systems which
ensure the security of the systems data that transfer
what is RFC 2828?
a processing or communication service provided by a system to give a
specific kind of protection to system resources
what is Authentication ?
assurance that the communicating entity is the one claimed
what is access control??
preventation unauthorized people from using resources
what is data confidentiality??
protection of data from unauthorizathed disclosure
what is data intergrity?
assurance that data recevided is sent by an authorized entity
what is Availability ?
resource accessible/usable
what is the econmy of mechansim?
mean that the desgin the design of security measure in both hardware and
software should be simple and imposable
what is complete mediation?
means that every access must check against access contorl mechanism
Review Questions - Answers
1. Difference between Cryptography and Cryptanalysis
- Cryptography: Creating secure communication methods.
- Cryptanalysis: Breaking or analyzing cryptographic methods.
2. Difference between Symmetric and Asymmetric Encryption
- Symmetric: One key for encryption and decryption (fast).
- Asymmetric: Two keys (public & private), used for secure key exchange.
3. 5 Challenges of Computer Security
- not easy and not simple
- must consider all potential risks and attacks
- Requires continuous monitoring.
- must descide where to applay a mechanism
- battle wits between admin and hacker
- involes algorhtim and secret key
4. 3 Aspects of Information Security
- Security Attack: Any action that compromises security.
- Security Mechanism: Tools to prevent or detect attacks.
- Security Service: Protection measures for data.
5. Active vs. Passive Attacks (Examples & Handling)
- Passive Attack: Eavesdropping on data (e.g., traffic analysis).
- 🛡 Prevention: Use encryption.
- Active Attack: Modifying data (e.g
6. explain the basic security service?
it's a processing or communcation service that enhance the security of
data processing in the system and information tarnsfer in organization
7. Select five principles of fundamental security design and explain each one.
- complete mediation: means that every access that must checked against the
access control mechanism - open design: mean the mechanism and design of security should be public
not secret - Least common mechanism means that the design should minimize the
functions shared by different users. - encapsulation: protection is provide my encapsulating a collection of data
and objects - Least astonishment means that a program or user interface
should always respond in the way that is least likely to astonish
the user. - layering: refers to use multiple, overlapping protection layer
continue:./study_security_l3.md
before:./study_security_l1.md