信息安全期末考试试卷.pdf





《信息安全期末考试试卷.pdf》由会员分享,可在线阅读,更多相关《信息安全期末考试试卷.pdf(15页珍藏版)》请在淘文阁 - 分享文档赚钱的网站上搜索。
1、1 What are basic components of computer security?try to give the connotation ofeach item in your list.Ans:Confidentiality:Keeping data and resources hidden.Integrity:refers to the trustworthiness of data or resources,and it is usually phrased in terms ofpreventing improper or unauthorized change.Int
2、egrity includes data integrity and origin integrity.Availability:refers to the ability to use the information or resource desired,enabling access to dataand resources.2、Whal are security policy and securily mechanism?Ans:A security policy is a statement of what is,and what is not,allowed.A security
3、mechanism is a method,tool,or procedure for enforcing a security policy.3、What are differences between MAC and DAC?Ppi|What are MAC and DACAns:MAC:identity is irrelevant,system mechanism controls access to object,and individualcannot alter that accessDAC:is based on user identity,individual user set
4、s access control mechanism to allow or denyaccess to an object,Discretionary Access Control(DAC,IBAC)-individual user sets access control mechanism to allowor deny access to an object,Mandatory Access Control(MAC)-system mechanism controls access to object,andindividual cannot alter that access4 Con
5、sider a computer system with three users:Alice,Bob and Cyndy.Alice owns the file alicerc,and Bob and Cyndy can read it.Cyndy can read and write Bobs file bobre,but Alice can onlyread it.Only Cyndy can read and write her file cyndyrc.Assume that the owner of each of thesefiles can execute it.create t
6、he corresponding access control matrix.Cyndy gives Alice permission to read cyndyrc.And Alice removes Bobs ability to readalicerc.Show the new access control matrix.(必考)Ans:(Read writeOwns execute)a l i c e i cc y n d y尸 c/I /i c eo xrR e bro xC T xzyrZ vrr wo r w xa l i c e丁 cC n c J y p-u4 l i c e
7、o xrrB o bo xU y n d yrr wo r w xAns:the Caesar cipher is a classical cipher.Sender,receiver share common keyKeys may be the same,or trivial to derive from one anotherTwo basic types:Transposition ciphers and Substitution ciphers。problem:Key is too short(Transposition ciphers:Plaintext is HELLO WORL
8、DRearrange asHLOOLELWRDCiphertext is HLOOL ELWRDSubstitution ciphers:Plaintext is HELLO WORLDChange each letter to the third letter following it(X goes to A,Y to B,Z to C)Key is 3,usually written as letterCiphertext is KHOOR ZRUOG)Vigenere Cipher Like Caesar cipher,but use a phraseExampleMessage THE
9、 BOY HAS THE BALLKey VIGEncipher using Caesar cipher for each letter:key VIGVIGVIGVIGVIGVplain THEBOYHASTHEBALLcipher OPKWWECIYOPKWIRG6、What are definitions of object and subject?(很有可能会考)Ans:The set of all protected entities(that is,entities that are relevant to the protection state of thesystem)is
10、called the set of objects O.The set of subjects S is the set of active objects,such as processes and users.Subject can be object,And not vice versa7、Specify the algorithm of public key digital signatures(数 MAns:Sender uses hash function to compress the plaintext to generate the hash value,and thense
11、nder uses the private key to encrypt the hash value,the hash value after encryption andplaintext passed to the receiver,then the receiver uses the public key of the sender todecrypt,and the receiver uses hash function to compress the plaintext,and generate anotherhash value,finally compare two hash
12、values,if they equal,so it is the real signature,otherwise not.8、List the basic requirements of cryptographic checksum function.Ans:Cryptographic checksum h:A fB:For any x e A,h(x)is easy to computeFor any y G B,it is computationally infeasible to find x e A such that h(x)=yIt is computationally inf
13、easible to find two inputs x,xz G A such that x#x and h(x)=h(x)Alternate form(stronger):Given any x e A,it is computationally infeasible to find a different x eA such that h(x)=h(x).9、What are differences between the classical key cryptography and public key cryptography?(必号)Ans:the classical key cr
14、yptography has one key,Sender,receiver share common key,Keys may be thesame,or trivial to derive from one another.public key cryptography has Two keys,Private key known only to individual,Public key availableto anyone.I I i b i I c prime number:.点:答案可能不唯一)Ans:n=pq=91 7(|)(H)=(p-1)(-1)=72,e*d mod(|)(
15、n)=l,e=5,d=29.Public key(e,n)=(5,91)private key:d=2911、Classes of ThreatsAns:Disclosure-Snooping Deception-Modification,spoofing,repudiation of origin,denial of receipt Disruption-Modification Usurpation-Modification,spoofing,delay,denial of service12、Goals of SecurityAns:Prevention-Prevent attacker
16、s from violating security policy Detection-Detect attackers*violation of security policy Recovery-Stop attack,assess and repair damage-Continue to function correctly even if attack succeeds13、Access Control Matrix ModelAns:14、Types of Security PoliciesSubjects S=Si,sObjects O=Oi,.,OmRightsEntries As
17、h o.c RA回 oy=rx,,rymeans subject s;hasrights q,&overobject a.Ans:Military(governmental)security policy-Policy primarily protecting confidentiality Commercial security policy-Policy primarily protecting integrity Confidentiality policy-Policy protecting only confidentiality Integrity policy-Policy pr
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 信息 安全 期末考试 试卷

限制150内