Cryptography and Network Security (4th Edition)

[Page 25 (continued)]

1.8. Key Terms, Review Questions, and Problems

Key Terms

access control

active threat

authentication

authenticity

availability

data confidentiality

data integrity

denial of service

encryption

integrity

intruder

masquerade

nonrepudiation

OSI security architecture

passive threat

replay

security attacks

security mechanisms

security services

traffic analysis

Review Questions

1.1

What is the OSI security architecture?

1.2

What is the difference between passive and active security threats?

1.3

List and briefly define categories of passive and active security attacks.

1.4

List and briefly define categories of security services.

1.5

List and briefly define categories of security mechanisms.

Problems

1.1

Draw a matrix similar to Table 1.4 that shows the relationship between security services and attacks.

1.2

Draw a matrix similar to Table 1.4 that shows the relationship between security mechanisms and attacks.

Категории