Professional Documents
Culture Documents
Eng
Eng
2
2. When has the Internet become an interconnection of millions of networks and
why? 2
3. What is security? 3
4. What is information security? 3
5. How many fundamental characteristics does information have? 3
6. Which areas does information security include? 3
7. How many critical characteristics do information have? 4
8. What is an information system? 4
9. What is the software? Which software do you know? 4
10. What is the hardware? List some hardware components you know? 4
11. Who is considered an expert hacker? 4
12. Who are hackers? Which skill levels are divided among hackers? 5
13. What is one of the most common methods of virus transmission? 5
14. What is a thief? Which type of theft in information security do you know? 5
15. Which threat is the most dangerous in information security? Why? 5
16. What is the attack? 6
17. What attack in the information security do you know? / What information
security attacks do you know? 6
18. List some attacks in the information security you know? 6
19. What is a firewall in computing? 6
20. How many types of firewall do you know? What are they? 6
22. How are firewalls classified? 7
23. List some firewalls classified by structures? 7
24. What does the word “architecture” mean? 7
25. What common architectural implementations do you know? 7
26. What does the phrase “ firewall processing mode” mean? 8
27. What firewall processing modes do you know? Give some information to
support your answers? 8
28. What powerful security tools do you know? 8
29. What does IDPS stand for? What do you know about IDPS? What is IDPS
used for? 9
30. How many IDPS methods do you know? What are they? State your
understanding about the signature- based approach, the statistical-anomaly
approach, and the stateful packet inspection approach.(unit 4 speaking 3 trang
99) 10
31. Give your understandings about NIDP and HIDS?(unit 4 speaking 2 trang 94)
11
32. What are honeypots, Honeynets, and padded Cell Systems? 12
33. What is cryptography? What is it used for? 12
34. How many goals does cryptography have? What are they? 12
35. How many parties do you think normally participate in a two -way
communication? Who are they? 13
36. What does the phrase hash function mean? What is it? 13
37. What hash functions do you know? 13
38. Why are hash functions widely used in e-commerce? 13
39. What does the word symmetric mean? 13
40. What do you know about symmetric encryption? 14
41. What is asymmetric encryption? What do you know about it? 14
42. What is PKI? What is it used for? 15
43. What components are integrated for a typical solution PKI to protect the
transmission and reception of secure information? 15
44. What is a cyberattack? 15
45. What types of attacks cryptography do you know? State your understanding
about it. 15
3. What is security?
Unit 1 - Reading 2 - Page 9 - First paragraph
Theo giáo trình: Security is “the quality or state of being secure to be free
from danger”.
Theo cô Hảo: Security is protection from potential harms caused by
others.
12. Who are hackers? Which skill levels are divided among
hackers?
Unit 2 - Reading 1 - Page 37 & 38
Page 37 - Second paragraph: Hackers are “people who use and create
computer software to gain access to information illegally.”
Page 38 - First paragraph: There are generally two skill levels among
hackers. The first is the expert hacker, or elite hacker, who develops
software scripts and program exploits used by those in the second
category, the novice or unskilled hacker.
20. How many types of firewall do you know? What are they?
Unit 3 - Reading 1 - Page 63 & 64 - The bold text
There are three types of firewalls: Packet filters, Stateful filters,
Application layer.
Đề cương không có câu 21
29. What does IDPS stand for? What do you know about
IDPS? What is IDPS used for?
IDPS stands for Intrusion Detection and Prevention Systems .
IDPS is the combination of IDS (Intrusion Detection System) and IPS
(Intrusion Prevention System). IDPS has abilities to detect and also prevent
the intruder from break into organization’s areas. It alerts the administrator
when it detects an attack. And it will record the information about the attack
such as: “How the attack occurred?”, “What did intruder do?” and “Which
methods did the attacker use?”.
IDPS is generally used to describe current anti-intrusion technologies.
30. How many IDPS methods do you know? What are they?
State your understanding about the signature- based approach,
the statistical-anomaly approach, and the stateful packet
inspection approach.(unit 4 speaking 3 trang 99)
Three methods dominate: the signature-based approach, the statistical-
anomaly approach, and the stateful packet inspection approach.
A signature-based IDPS (sometimes called a knowledge-based IDPS or a
misusedetection IDPS) examines network traffic in search of patterns that
match known signatures—that is, preconfigured, predetermined attack
patterns
The statistical anomaly-based IDPS (stat IDPS) or behavior-based IDPS
collects statistical summaries by observing traffic that is known to be normal
34. How many goals does cryptography have? What are they?
There are 4 cryptographic goals. They are confidentiality, data integrity,
authentication, non-repudiation
unit 5 - reading 1 - page 112
36. What does the phrase hash function mean? What is it?
Unit 6 - Reading 1 - Page 135 - Third paragraph (the sentences begin with
bold text)
Hash function means functions using hash algorithms that create a hash
value.
Hash functions are mathematical algorithms that generate a message
summary or digest (sometimes called a fingerprint) to confirm the identity of a
specific message and to confirm that there have not been any changes to the
content
4, What does C.I.A stand for? What is it? What does C.I.A
triangle mean in Vietnamese? Is the C.I.A. triangle model
suitable for information security now?
-C.I.A stand for confidentiality, integrity, and availability.
-C.I.A is on the three characteristics of information
-C.I.A triangle means “mô hình bảo mật thông tin”
- No longer adequately addresses the constantly changing environment.(because
of different threats appearance)
Worms Virus
29. What does IDPS stand for? What do you know about IDPS? What is IDPS
used for?
IDPS stands for intrusion detection and prevention system (IDPS).
IDPS is the combination of IDS (Intrusion Detection System) and IPS
(Intrusion Prevention System). IDPS has abilities to detect and also prevent the
intruder from breaking into the organization's areas. It alerts the administrator when
it detects an attack. And it will record the information about the attack such as: “How
the attack occurred?”, “What did the intruder do?” and “Which methods did the
attacker use?”.
Intrusion detection and prevention system (IDPS) is generally used to describe
current anti-intrusion technologies
30. How many IDPS methods do you know? What are they? State your
understanding about the signature- based approach, the statistical-anomaly
approach, and the stateful packet inspection approach.
- Three methods dominate: the signature-based approach, the statistical-
anomaly approach, and the stateful packet inspection approach.
- A signature-based IDPS (sometimes called a knowledge-based IDPS or a
misusedetection IDPS) examines network traffic in search of patterns that
match known signatures—that is, preconfigured, predetermined attack patterns
- The statistical anomaly-based IDPS (stat IDPS) or behavior-based IDPS
collects statistical summaries by observing traffic that is known to be normal
- Stateful protocol analysis (SPA) is a process of comparing predetermined
profiles of generally accepted definitions of benign activity for each protocol
state against observed events to identify deviations.