Professional Documents
Culture Documents
1.
What are the names of three most important goals of network security?
(1) Confidentiality
(2) Integrity
(3) Availability
2.
3.
What are the names of 6 other lesser, but still important goals of network
security?
(1) Entity Authentication
(2) Message Origin Authentication
(3) Timeliness
(4) Non Repudiation (origin)
(5) Non Repudiation (destination)
(6) Authorization
(7) Access Control
4.
cannot be watched by a third party who can use the record of the conversation
to masquerade as one of parties and replay the prior conversation. To put it
another way, each session where 2 hosts on a network exchange a set of
messages is unique and cannot be replicated later.
(4) Non Repudiation (origin) : This means that a host or other entity on a
network cannot deny having sent a message.
(5) Non Repudiation (destination) : This means that a host or other entity on a
network cannot deny having received a message.
(6) Authorization : This refers to the legitimate granting of access to
computing resources to a human being or a host on a network.
(7) Access Control : This is ability to restrict access to certain computing
resources.
5.
6.
7.
9.
Here is a list of security techniques. Try and match the techniques with
particular security goals outlined in the earlier questions. Some of the
techniques may be unfamiliar to you. Do some research on the net to find out
the meaning of unfamiliar terms if necessary. Some techniques may match
more than one security goal.
Passwords
Timestamps
Firewalls
Encryption
Digital Signature
Trusted Third Parties
Hash Functions
Message Authentication Code (MAC) aka keyed Hash Function
Use of Trusted Third Party
Unix File Permissions
Unix Access Control Lists
Backup Servers at a different IP address
Nonce
Confirmation
Security Goal
Technique
Confidentiality
Encryption
Integrity
Availability
Entity
Authentication
Passwords, nonce
Message Origin
Authentication
Digital Signatures
Timeliness
Timestamp
Non-repudiation
(origin)
Non-repudiation
(destination)
Authorization
Passwords
Access Control