SelfLearningAssessment 2
SelfLearningAssessment 2
IT SECURITY
Name: Ankit Patel
Student Id: 42799
Review Questions
1. What are the three issues OSI security architecture focuses on?
Ans: The three issues on which the OSI security architecture focuses on are:
i. Security Attacks
ii. Security Mechanisms
iii.Security Services
2. What are the differences between passive attack and active attack?
Ans:
Passive attacks:
It is an attempt to learn or make the use of information from the system that
does not affect system resources.
Passive attack does not includes modification of the message.
Passive attack do not cause any damage to the system.
The entity is unaware of the attack.
Active attacks:
It is an attempt to alter system resources or affect their operation.
Active attack includes modification of the message.
Active attack always causes damage to the system.
The entity is notified about the attack.
5. What are the six main security services defined by OSI security
architecture?
Briefly describe each of them.
Ans: The six main security services defined by OSI security architecture are:
I. Confidentiality: It protects the data from any unauthorized discloses.
II. Authentication: It assures that the communication is authentic.
III. Integrity: Integrity means no alteration of data.
IV. Non-Repudiation: It helps in preventing sender or receiver from receiving or
denying the message.
V. Access Control: It limits the access and controls access to the system and
applications.
VI. Availability: It assures that the service is available to legimate users.
Ans: 1. Encipherment
2. Digital signatures
3. Access controls
4. Data Integrity
5. Authentication exchange
6. Security audit trails
7. Describe a model for network security. What are the components it should
have?
What are the basic tasks that such a model should perform?
Ans:
There should be five components in the network security model:
1. Sender (Plain Text): This is the original message send by the sender that is fed
into the algorithm.
2. Encryption Algorithm: The encryption algorithm performs various
substitutions and transformation on the plain text.
3. Secret Key: Secret keys are generated for the algorithm to encrypt or decrypt
the data.
4. Cipher text: This is the scrambled message produced as output.
5. Receiver ( Decryption) : This is essential encryption algorithm run in reverse.
It uses cipher text and the secret key and produces the original plain text.
Problems
Ans: The system must keep personal identification numbers confidential, both in
the host system and during transmission for a transaction.
Importance of this requirement is too high.
The system must protect the integrity of account records and of individual
transactions.
Importance of this requirement is too high
Availability of the host system is important to the
economic well being of the bank, but not to its fiduciary responsibility. The
availability of individual teller machines is of less concern.
Importance of this requirement is Medium.