chapter 8 - Security in computer networks Flashcards

(34 cards)

1
Q

What are the main goals of network security?

A

confidentiality
authentication
message integrity,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are common attacks in network security?

A

Eavesdropping
impersonation
message injection
hijacking, denial of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is symmetric key encryption?

A

Sender and receiver share the same secret key for encryption/decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is DES

A

older symmetric encryption standard with a 56-bit key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what replaced DES

A

AES - more secure, uses 128 bit blocks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is public key encryption?

A

Uses a public key to encrypt and a private key to decrypt
no shared secret needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is RSA?

A

public key encryption algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a digital signature?

A

sender “signs” a message using their private key so others can verify authenticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does non-repudiation mean?

A

The sender can’t deny they sent the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a message digest?

A

fixed-size fingerprint of a message created by a hash function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are MD5 and SHA-1?

A

Popular hash functions that create 128-bit and 160-bit digests, respectively

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a certification authorities (CA)?

A

rusted third party that issues digital certificates to verify the identity of websites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does Alice get Bob’s public key using CA?

A

She verifies Bob’s certificate signed by a trusted CA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

eavesdropping

A

Intercepting and reading private messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is impersonation?

A

Pretending to be someone else by faking an identity or IP/MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is message injection?

A

Inserting fake messages into a data stream

16
Q

What is hijacking?

A

Taking over an active connection by replacing a sender or receiver

17
Q

What is a DoS attack?

A

Flooding a service so that legitimate users can’t access it

18
Q

How is e-mail encrypted for confidentiality?

A

encrypted with a symmetric key -> then encrypted with the recipient’s public key

19
Q

How is e-mail authenticated and protected for integrity?

A

Sender -> signs the message hash with private key
receiver -> verifies with sender’s public key

20
Q

What happens in a TLS handshake?

A

client - hallo + TLS versjon
server - hallo + sertifikat
client - sjekker sertifikatet med CA
begge - lager felles hemmelig key
begge - sender finished msg kryptert med felles key

20
Q

Why does TLS break data into records?

A

So each chunk can be encrypted, MAC-checked, and processed immediately

21
Q

what is a VPN

A

encrypted tunnel over the public Internet for private traffic between sites

22
Q

What does Internet Protocol Security (IPsec) provide?

A

Encryption, authentication, and integrity at the network layer

23
How is a mobile authenticated in 4G LTE?
MME sends the IMSI (identity) to HSS HSS creates * A random challenge (RAND) * An expected response (XRES) * A session key (KASME) UE uses session key -> computes a response MME compares response
23
What are the two IPsec protocols?
AH: Authenticates source and checks integrity ESP: Adds confidentiality (encryption) too
24
What’s the difference between transport and tunnel mode in IPsec?
Transport mode: encrypts only the payload Tunnel mode: encrypts the entire datagram
25
How does 802.11 authentication work? 4steps
* **discovery** The access point (AP) advertises its capabilities * **Mutual Authentication & Key Derivation** device and external Authentication Server authenticate each other using a shared secret + both compute same shared symmetric session key * **Key Distribution to the AP** AS securely tells AP the session key so it can encrypt/decrypt frames for this device * **Encrypted Communication Begins** its encrypted
26
How is 5G authentication different from 4G?
5G uses public key crypto to protect IMSI and shifts control to the home network
27
What is the purpose of a firewall?
isolates a private network and controls which packets can enter or leave
28
What does a stateless firewall check?
Packet headers only: IP addresses, ports, flags (e.g. SYN)
29
What does a stateful firewall do?
Tracks TCP connection state and blocks unexpected or inactive packets
30
What is an application gateway?
A firewall that filters based on application-layer data
31
What is an AS (Authentication Server)?
network server that handles user authentication by verifying credentials and helping derive session key