availability
accessible to authorized users at appropriate times
aspects of security
security attack, security service, security mechanism
threat
something that can damage or destroy an asset
vulnerability
a weakness or gap in your protection
risk
where assets, threats, and vulnerabilities intersect
authentication
assurance that communicating entity is the one claimed
access control
prevention of unauthorized use
data confidentiality
protection of data from unauthorized disclosure
data integrity
data received is as sent by an authorized entity
non-repudiation
protection against denial by one of the parties in a communication
security mechanism
feature designed to detect, prevent, or recover from a security attack
no single mechanism that will support all services required
however one particular element underlies many of the security mechanisms in use:
cryptographic techniques
symmetric key encryption
plaintext-> encryption algorith with secret key shasred by sender and recepient, transmitted cipher text-> decryption using shared key
Kerckhoff’s principle
System security should depend only on the secrecy of the key, not the algorithm.
Caesar Cipher
A substitution cipher that shifts each letter by a fixed number
𝑘
E(k,p)=(p+k)mod26,
D(k,c)=(c−k)mod26.
can be broken By brute-force testing all 25 possible shifts.
keyspace for cryptosystem
For the Caesar cipher, any value from the set {1, 2, …, 25} can be a key
The set of usable keys is referred to as a cryptosystem’s keyspace
Cryptosystems with a small keyspace are vulnerable to a brute-force search for the proper key
What are passive vs. active attacks?
Passive = eavesdropping or monitoring; Active = modifying, disrupting, or injecting data.
What is a monoalphabetic cipher?
A substitution cipher where any permutation of 26 letters forms the key
What is the size of the monoalphabetic cipher keyspace?
26! ≈ 4×10²⁶ keys
What is frequency analysis?
Cryptanalysis method using letter frequency patterns in the ciphertext
What is a transposition cipher
A: A cipher that rearranges (permutes) letters of plaintext without altering them.
How does the Rail Fence cipher work?
Write letters diagonally across multiple rows, then read row by row.
meet me after the toga party = MEMATRHTGPRYETEFETEOAAT
What is the Pigpen cipher?
A symbol-substitution cipher mapping letters to grid symbols—easy to memorize, vulnerable to pattern matching.
What are the three pillars of information security?
Confidentiality, Integrity, Availability.
What is confidentiality?
Ensures computer assets are accessed only by authorized parties.