This security goal ensures that data is available to authorized users when needed.
What is availability?
In this attack on integrity, Eve changes the amount of the payment before executing an electronic transaction.
What is modification?
Each letter is replaced by another fixed letter in this simple cipher.
What is a monoalphabetic or Caesar cipher?
This security goal protecting data from unauthorized access.
What is confidentiality?
In this attack, Eve impersonates Alice when communicating with Bob.
What is masquerading?
This cipher rearranges letters without changing them.
What is a transposition cipher?
This security goal ensures that only authorized changes can be made to data.
What is integrity?
This type of attack only observes data without altering it. Examples of this type includes snooping and traffic analysis.
What is a passive attack?
This cipher uses a 5×5 grid and encrypts pairs of letters. The plaintext is encrypted in pairs of two letters.
What is the Playfair cipher?
This security goal is violated when a system crashes due to overload attacks and become non-responsive.
What is availability?
DAILY DOUBLE!
In this attack, an attacker floods a server with fake requests.
This ciphers uses a matrix as a key and encrypts blocks of letters using modular arithmetic.
What is the Hill cipher?
This security service prevents Alice from denying sending a message to Bob or receiving a message from him.
What is nonrepudiation?
In this type of cryptanalysis attack, the attacker uses a plaintext-ciphertext pair to break the system.
What is a known-plaintext attack?
It is a method to break the Vigenère cipher by finding repeated substrings in the ciphertext and computing the length of the key.
What is Kasiski test?