Addressing Risks Associated with Protocols and Software Flashcards

(8 cards)

1
Q

List and explain ways or restrictions that network administrators can use to strengthen security on their networks

A

Network administrators can: (1) Use encryption protocols like SSL and VPN tunneling (PPTP, L2TP) to secure data transmissions; (2) Implement firewalls to control access to and from the network; (3) Use authentication services like Kerberos to validate user identity; (4) Use PGP to encrypt and verify the authenticity of emails; (5) Require the use of HTTPS for secure web communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is encryption and what is it used for

A

how does it work and what assurances does encryption provide?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is decryption?

A

Decryption is the process of converting encrypted data back into its original, readable form using the appropriate key or algorithm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Differentiate between public and private key encryption and how they work

A

Public key encryption uses two keys: a public key to encrypt data and a private key to decrypt it. It allows secure communication without the need to share secret keys. In contrast, private key (or symmetric) encryption uses the same key for both encryption and decryption, which requires secure key exchange.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the most popular private key encryption?

A

The most popular private key encryption system for email is Pretty Good Privacy (PGP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Write short notes on Kerberos

A

Kerberos is a network authentication protocol developed at MIT that uses secret-key cryptography and a trusted third party (the KDC) to validate user identities and secure communications between clients and services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How is a client or user called in Kerberos?

A

A client or user in Kerberos is called a ‘principal’.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Write short notes on PGP

A

Pretty Good Privacy (PGP) is a public key encryption system developed by Phil Zimmerman to secure email communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly