信息安全期末考试试卷抢先版.doc_第1页
信息安全期末考试试卷抢先版.doc_第2页
信息安全期末考试试卷抢先版.doc_第3页
信息安全期末考试试卷抢先版.doc_第4页
信息安全期末考试试卷抢先版.doc_第5页
已阅读5页,还剩10页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

蝎子作品1、 What are basic components of computer security ? try to give the connotation of each item in your list.Ans: Confidentiality: Keeping data and resources hidden.Integrity : refers to the trustworthiness of data or resources, and it is usually phrased in terms of preventing improper or unauthorized change. Integrity includes data integrity and origin integrity.Availability: refers to the ability to use the information or resource desired,enabling access to data and resources.2、What are security policy and security mechanism ?Ans: A security policy is a statement of what is, and what is not, allowed.A security mechanism is a method, tool, or procedure for enforcing a security policy.3、 What are differences between MAC and DAC ? Ppt上是What are MAC and DAC Ans:MAC: identity is irrelevant. system mechanism controls access to object, and individual cannot alter that accessDAC: is based on user identity. individual user sets access control mechanism to allow or deny access to an object4、Consider a computer system with three users: Alice, Bob and Cyndy. Alice owns the file alicerc , and Bob and Cyndy can read it .Cyndy can read and write Bobs file bobrc , but Alice can only read it. Only Cyndy can read and write her file cyndyrc. Assume that the owner of each of these files can execute it.l create the corresponding access control matrix.l Cyndy gives Alice permission to read cyndyrc. And Alice removes Bobs ability to read alicerc. Show the new access control matrix.l (必考)Ans: (Read、write、Owns、execute)5、Csar cipher & Vignere Cipher & DES (必考)Ans:the Caesar cipher is a classical cipher. Sender, receiver share common keyKeys may be the same, or trivial to derive from one anotherTwo basic types :Transposition ciphers and Substitution ciphers 。problem:Key is too short(Transposition ciphers :Plaintext is HELLO WORLD Rearrange asHLOOLELWRDCiphertext is HLOOL ELWRDSubstitution ciphers:Plaintext is HELLO WORLDChange each letter to the third letter following it (X goes to A, Y to B, Z to C)Key is 3, usually written as letter DCiphertext is KHOOR ZRUOG)Vignere Cipher Like Csar cipher, but use a phraseExampleMessage THE BOY HAS THE BALLKey VIGEncipher using Csar cipher for each letter:key VIGVIGVIGVIGVIGVplain THEBOYHASTHEBALLcipher OPKWWECIYOPKWIRG6、What are definitions of object and subject ?(很有可能会考)Ans: The set of all protected entities (that is, entities that are relevant to the protection state of the system) is called the set of objects O. The set of subjects S is the set of active objects, such as processes and users. Subject can be object,And not vice versa7、Specify the algorithm of public key digital signatures(数字签名).Ans:Sender uses hash function to compress the plaintext to generate the hash value, and then sender uses the private key to encrypt the hash value, the hash value after encryption and plaintext passed to the receiver, then the receiver uses the public key of the sender to decrypt , and the receiver uses hash function to compress the plaintext, and generate another hash value, finally compare two hash values, if they equal, so it is the real signature, otherwise not.8、List the basic requirements of cryptographic checksum function.(重点)Ans: Cryptographic checksum h: AB:For any x A, h(x) is easy to computeFor any y B, it is computationally infeasible to find x A such that h(x) = yIt is computationally infeasible to find two inputs x, x A such that x x and h(x) = h(x)Alternate form (stronger): Given any x A, it is computationally infeasible to find a different x A such that h(x) = h(x).9、What are differences between the classical key cryptography and public key cryptography ?(必考)Ans: the classical key cryptography has one key,Sender, receiver share common key,Keys may be the same, or trivial to derive from one another.public key cryptography has Two keys,Private key known only to individual,Public key available to anyone.10、For RSA, take prime numbers p=7,q=13, try to calculate the public key and private key . (注意点:答案可能不唯一)Ans:n=pq=91, f(n) = (p1)(q1)=72, e*d mod f(n)=1, e=5,d=29.Public key (e, n)=(5,91)private key: d=2911、Classes of ThreatsAns: Disclosure Snooping Deception Modification, spoofing, repudiation of origin, denial of receipt Disruption Modification Usurpation Modification, spoofing, delay, denial of service12、Goals of SecurityAns: Prevention Prevent attackers from violating security policy Detection Detect attackers violation of security policy Recovery Stop attack, assess and repair damage Continue to function correctly even if attack succeeds13、Access Control Matrix Model Ans:14、Types of Security PoliciesAns:15、Integrity and TransactionsAns:16、Security levelsAns :17、Levels and LatticesAns:18、Bibas ModelAns:19、Operational IssuesAns : Cost-Benefit Analysis Is it cheaper to prevent or recover? Risk Analysis Should we protect something? How much should we protect this thing? Laws an

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论