Page 230 - DCAP403_Operating System
P. 230

Unit 11: System Security




          11.13 Self Assessment                                                                 Notes

          State whether the following statements are true or false:

          1.   Physical computer security involves tangible protection devices, such as locks, cables,
               fences, safes, or vaults.

          2.   Confidentiality is also known as secrecy or privacy.

          3.   Resource attacks are the first category of network security threats.
          4.   DoS (Denial-of-Service) attacks are probably the nastiest, and most difficult to address.

          5.   Websites that use an encrypted connection use something called SSL (Secure Sockets Layer)
               to secure the information going back and forth.

          Fill in the blanks:
          6.   ......................... authentication systems authenticate a user based on the knowledge or
               possession of a cryptographic key.

          7.   Encryption and ......................... generally require the use of some secret information,
               referred to as a key.
          8.   ......................... can be used to sign or encrypt e-mail messages with the mere click of the
               mouse.
          9.   Hash functions, also called ......................... and one-way encryption
          10.   Intrusion Prevention Systems (IPSs) evolved in the late ......................... .

          11.14 Review Questions

          1.   What do you mean by system security?

          2.   Explain security problem.
          3.   Describe program threats.
          4.   Write short note on “denial of service” attack.
          5.   What do you mean by hashing?

          6.   Describe “Pretty Good Privacy” concept.
          7.   Explain user authentication process in detail.
          8.   How will you implement security defenses? Explain
          9.   Describe fi rewall concept.
          10.   Describe various types of intrusion prevention system.

          Answers: Self Assessment

          1.   True                 2.  True             3. False           4. True

          5.   True                 6.  Cryptographic    7. decryption      8. PGP
          9.   message digests     10.  1990s









                                           LOVELY PROFESSIONAL UNIVERSITY                                   223
   225   226   227   228   229   230   231   232   233   234   235