Chapter 1 - Questions
Chapter 1 - Questions
Review Questions
1. What are the three issues OSI security architecture focuses on?
Ans: OSI Security Architecture focuses on three aspects of information security : security
attacks, security mechanisms, security services
2. What are the differences between passive attack and active attack?
Ans: Passive attack has the nature of eavesdropping on, or monitoring of, transmission of
information between the communicating parties, but does not modify of temper the
message. It captures the message and may read the content. It can be used for traffic
analysis e.g., who is a particular person communicating with and the frequency of
communication.
Active attack modifies a message stream or creates a false message. It is used to launch
more severe form of attack.
Page 1 of 1
FIT3031:Tut1_sol
5. What are the six main security services defined by OSI security architecture? Briefly
describe each of them.
Ans: They can be one of those list in lecture slide#31, e.g., encipherment, digital
signatures, access controls, data integrity, authentication exchange, security audit trails
etc.
7. Describe the model for network security as shown in Figure 1.4 below. What are the
components it should have? What are the basic tasks that such a model should perform?
:%04(,3;(+)%3;8'%(1
<,=6=>;'%?)(,%>;3)4(%)?0(,%
$#;4,/%,(;)"#$%&'()$"@
.,"3,% 7,/)8),"(
.,/0%)(12%,-'(,3
!"#$%&'()$" .,/0%)(12%,-'(,3
(%'"4#$%&'()$" *+'"",- (%'"4#$%&'()$"
5,44'6,
5,44'6,
&,44'6,
&,44'6,
.,/0%,
.,/0%,
.,/%,( .,/%,(
)"#$%&'()$" )"#$%&'()$"
988$","(
A)60%,;B=C;;5$3,-;#$%;D,(E$%F;.,/0%)(1
Page 2 of 2
FIT3031:Tut1_sol
Ans: The model in Figure 1.4 has a few components: sender (originating a message),
encryption algorithm, secret key, decryption algorithm and the recipient (receiving the
message). This model requires the following tasks to be done.
i. design a suitable algorithm for the security transformation
ii. generate the secret information (keys) used by the algorithm
iii. develop methods to distribute and share the secret information
iv. specify a protocol enabling the principals to use the transformation and secret
information for a security service
Problems
Ans: The system must keep personal identification numbers confidential, both in the host
system and during transmission for a transaction. It must protect the integrity of account
records and of individual transactions. Availability of the host system is important to the
economic well being of the bank, but not to its fiduciary responsibility. The availability
of individual teller machines is of less concern.
3. Consider a telephone switching system that routes calls through a switching network
based on the telephone number requested by the caller. Give examples of
confidentiality, integrity and availability requirements associated with the system. In
each case, indicate the degree of importance of the requirement.
Page 3 of 3
FIT3031:Tut1_sol
Ans:
• The system does not have high requirements for integrity on individual
transactions, as lasting damage will not be incurred by occasionally losing a
call or billing record.
• The integrity of control programs and configuration records,
however, is critical. Without these, the switching function would be defeated
and
• the most important attribute of all - availability - would be compromised. A
telephone switching system must also preserve the confidentiality of individual
calls, preventing one caller from overhearing another.
4. For each of the following assets, assign a low, moderate or high impact level for the
loss of confidentiality, availability and integrity, respectively. Justify your answers.
a. An organization managing public information on its Web server.
Ans: An organization managing public information on its web server
determines that there is no potential impact from a loss of confidentiality
(i.e., confidentiality requirements are not applicable), a moderate potential
impact from a loss of integrity, and a moderate potential impact from a
loss of availability.
Page 4 of 4
FIT3031:Tut1_sol
Page 5 of 5