0% found this document useful (0 votes)
109 views4 pages

CSCL 1 Marks

1. S/MIME is a standard for public key encryption and signing of MIME data. An active attack interrupts the attacked entity, while a passive attack observes without the entity's awareness. A direct digital signature only requires the two entities - sender and receiver. 2. Security services ensure adequate security of systems or data transfers. Message digest functions produce a different digest for each unique document using a mathematical formula. A logic bomb is code that triggers a malicious function when conditions are met. 3. Software vulnerabilities allow unauthorized access, execution of commands, access to restricted data, or impersonation. A replay attack fraudulently repeats or delays a valid data transmission. Authentication protocols authenticate entities wishing secure communication.

Uploaded by

Surendra Dawadi
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
109 views4 pages

CSCL 1 Marks

1. S/MIME is a standard for public key encryption and signing of MIME data. An active attack interrupts the attacked entity, while a passive attack observes without the entity's awareness. A direct digital signature only requires the two entities - sender and receiver. 2. Security services ensure adequate security of systems or data transfers. Message digest functions produce a different digest for each unique document using a mathematical formula. A logic bomb is code that triggers a malicious function when conditions are met. 3. Software vulnerabilities allow unauthorized access, execution of commands, access to restricted data, or impersonation. A replay attack fraudulently repeats or delays a valid data transmission. Authentication protocols authenticate entities wishing secure communication.

Uploaded by

Surendra Dawadi
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Cs & cl all important questions: Short Questions 1 marks

1.

What is s/mime? Ans) S/MIME (Secure/Multipurpose Internet Mail Extensions) is a standard for public key encryption and signing of MIME data. a. Differentiate between active and passive attacks. Ans: Active attack: is an attack which the attacked entity gets aware of when attacked. That is the interruption from the attacker is of such kind that he gets aware of the attack, hence called active attack. For example trying to steal some info. Passive Attack: when the attacked entity is unaware of the attack, hence called PASSIVE e.g. the attacker is just trying to listen or observer you. b. What do you mean by direct digital signature? two parties involved in the passing of the signed information: the sender and the receiver. Direct digital signatures only require these two entities because the receiver of the data (digital signature) knows the public key used by the sender c. What are the security services? Ans) Security service is a service, provided by a layer of communicating open systems, which ensures adequate security of the systems or of data transfers d. How is message digest generated? Ans) Message digest functions are mathematical functions that process information to produce a different message digest for each unique document. 128 bits to 160 bits in length and provide a digital identifier for each digital file or document. e. What do you mean by logic bomb? A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met

What do you mean by software vulnerabilities? allows an attacker to execute commands as another user allows an attacker to access data that is contrary to the specified access restrictions for that data allows an attacker to pose as another entity allows an attacker to conduct a denial of service What is reply attack? A replay attack is a form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed What do you mean by authentication protocols? An authentication protocol is a type of cryptographic protocol with the purpose of authenticating entities wishing to communicate securely.

2. What is disruption? A circumstance or event that interrupts or prevents the correct operation of system services and functions 3. What is message digest? The representation of text in the form of a single string of digits, created using a formula called a one-way hash function. 4. What is stream cipher? In cryptography, a stream cipher is a symmetric key cipher where plaintext digits are combined with a pseudorandom cipher digit stream (keystream) 5. What is symmetric key? A class of algorithms for cryptography that use the same cryptographic keys for both encryption of plaintext and decryption of ciphertext. 6. What is spoofing? A spoofing attack is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining an illegitimate advantage, 7. What is cryptanalysis? is the art and science of analyzing information systems in order to study the hidden aspects of the systems, used to breach cryptographic security systems and gain access to the contents of encrypted messages, even if the cryptographic key is unknown. 8. digital certificate Method to verify that a user sending a message is who he or she claims to be, and to provide the receiver with the means to encode a reply. 9. biba integrity model Is a formal state transition system of computer security policy that describes a set of access control rules designed to ensure data integrity 10. cipher text Is the result of encryption performed on plaintext using an algorithm, called a cipher 11. hash function A hash function is any algorithm that maps data of variable length to data of a fixed length. The values returned by a hash function are called hash values, hash codes, hash sums, checksums or simply hashes. 12. trusted system Atrusted system is a system that is relied upon to a specified extent to enforce a specified security policy. As such, a trusted system is one whose failure may break a specified security policy. 13. cyber crime Cybercrime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cybercrime also includes traditional crimes conducted through the Internet.

14. block cipher Deterministic algorithm operating on fixed-length groups of bits, called blocks, with an unvarying transformation that is specified by a symmetric key. 15. What do you mean by Trojan horse? Hacking program that is a non-self-replicating type of malware which gains privileged access to the operating system while appearing to perform a desirable function but instead drops a malicious payload, often including a backdoor allowing unauthorized access to the target's computer

16. What is Bastion host? A bastion host is a special purpose computer on a network specifically designed and configured to withstand attacks. 17. What is the use of message authentication code? Creating a message authentication code ensures only that the original message was not altered and, by using a shared secret key, that the message hash was signed by someone with access to that private key. 18. List features of open source software. Free, modifiable etc. 19. Define data access control Data access control is the selective restriction of access to a place or other resource. 20. Define IPS Network security appliances that monitor network and/or system activities for malicious activity. The main functions of intrusion prevention systems are to identify malicious activity, log information about this activity, attempt to block/stop it, and report it 21. What is open source concept? The source code is included with the compiled version and modification or customization is possible. 22. Mutual authentication? it refers to a client or user authenticating themselves to a server and that server authenticating itself to the user in such a way that both parties are assured of the others' identity 23. Purpose of HTTPS protocol? Hypertext Transfer Protocol Secure (HTTPS) is a communications protocol for secure communication over a computer network, with especially wide deployment on the Internet. 24. Define masquerading A threat action whereby an unauthorized entity gains access to a system or performs a malicious act by posing as an authorized entity. 25. What is virtual machine A virtual machine (VM) is a software based, fictive computer. Virtual machines may be based on specifications of a hypothetical computer or emulate the computer architecture and functions of a real world computer

26. What is cryptography? Cryptography is the practice and study of techniques for secure communication in the presence of third parties. 27. Define the operational issues on computer security. user support, software support, configuration management, backups, media controls, documentation, maintenance. 28. What is link encryption? Link encryption is an approach to communications security that encrypts and decrypts all traffic at each end of a communications line 29. Define the term session key. A session key is a single-use symmetric key used for encrypting all messages in one communication session 30. Define MD5. The MD5 message-digest algorithm is a widely used cryptographic hash function that produces a 128-bit (16byte) hash value 31. Define worms. standalone malware computer program that replicates itself in order to spread to other computers 32. What is spoofing? Attempt by an unauthorized entity to gain access to a system by posing as an authorized user. 33. What do you mean by Network security ? Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources 34. Define security policies. Security policy is a definition of what it means to be secure for a system, organization or other entity 35. Define DOS and Phishing. Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication 36. What is VPN ? A virtual private network (VPN) extends a private network across a public network, such as the Internet. It enables a computer to send and receive data across shared or public networks as if it were directly connected to the private network, while benefitting from the functionality, security and management policies of the private network. 37. Define the term link to link Link encryption is an approach to communications security that encrypts and decrypts all traffic at each end of a communications line encryption.

You might also like