Ch12 - Ch14 Flashcards
(62 cards)
standards‐based mechanism for providing encryption for point‐to‐point TCP/IP traffic; operates at the Network layer (layer 3)
IPSec
needed to allow an outside entity to initiate communications with an internal system behind a NAT proxy
static mode NAT
the least important aspect of security systems for Internet‐delivered email.
Availability, but yet in general availability is important
use of email as an attack mechanism by flooding a system with messages causing a denial of service
Mail-Bombing
Why is it difficult to stop spam
because source of messages are usually spoofed
encryption tool used to protect sessionless datagram protocols; was designed to integrate with IPSec. replaced by IKE
Simple Key Management for Intenet Protocol (SKIP)
provides authentication, integrity, and confdentiality using an encapsulation protocol.
Software IP Encryption (SWIPE)
authentication service and is simply a means to prevent unauthorized execution of code on remote systems.
Secure Remote Procedure Call (S-RPC)
encryption protocol developed by Netscape to protect the communications between a web server and a web browser; used to secure web, email, FTP, or even Telnet traffc. deployed using a 40-bit key or a 128-bit key
Secure Sockets Layer (SSL)
security protocol for the transmission of transactions over the Internet; based on RSA encryption and DES; not been widely accepted by the Internet in general; instead, SSL/TLS encrypted sessions are the preferred mechanism for secure e-commerce.
Secure Electronic Transaction (SET)
What tool is used to crack LEAP protocol
asLEAP
used to manipulate line voltages to steal long-distance services. They are often just custom-built circuit boards with a battery and wire clips
Black Boxes
used to simulate tones of coins being deposited into a pay phone. They are usually just small tape recorders
Red Boxes
used to simulate 2600 Hz tones to interact directly with telephone network trunk systems (that is, backbones). This could be a whistle, a tape recorder, or a digital tone generator
Blue Boxes
used to control the phone system. can use a dual-tone multifrequency (DTMF) generator (that is, a keypad). It can be a custom-built device or one of
the pieces of equipment that most telephone repair personnel use.
White Boxes
SMTP server that does not authenticate senders before accepting and relaying mail.
open relay agent
what standard is used standard for email addressing and message handling.
X.400
email security standard that offers authentication and confidentiality to email through public key encryption and digital signatures.
Secure Multipurpose Internet Mail Extensions (S/MIME)
can provide authentication, confidentiality, integrity, and nonrepudiation for email messages; employs MD2, MD5 algorithms; RSA public key; and DES to provide authentication and encryption services.
MIME Object Security Services (MOSS)
email encryption mechanism that provides authentication, integrity, confdentiality, and nonrepudiation. uses RSA, DES, and X.509.
Privacy Enhanced Mail (PEM)
assert that valid mail is sent by an organization through verifcation of domain name identity
DomainKeys Identified Mail (DKIM)
another name for dial-up connectivity
Remote Node Operation
what security border devices support NAT
firewalls, routers, proxies & gateways
Most WAN technologies require a “WAN switch”
channel service unit/data service unit CSU/DSU