chapter 8 - Security in computer networks Flashcards
(34 cards)
What are the main goals of network security?
confidentiality
authentication
message integrity,
What are common attacks in network security?
Eavesdropping
impersonation
message injection
hijacking, denial of service
What is symmetric key encryption?
Sender and receiver share the same secret key for encryption/decryption
what is DES
older symmetric encryption standard with a 56-bit key
what replaced DES
AES - more secure, uses 128 bit blocks
What is public key encryption?
Uses a public key to encrypt and a private key to decrypt
no shared secret needed
What is RSA?
public key encryption algorithm
What is a digital signature?
sender “signs” a message using their private key so others can verify authenticity
What does non-repudiation mean?
The sender can’t deny they sent the message
What is a message digest?
fixed-size fingerprint of a message created by a hash function
What are MD5 and SHA-1?
Popular hash functions that create 128-bit and 160-bit digests, respectively
What is a certification authorities (CA)?
rusted third party that issues digital certificates to verify the identity of websites
How does Alice get Bob’s public key using CA?
She verifies Bob’s certificate signed by a trusted CA
eavesdropping
Intercepting and reading private messages
What is impersonation?
Pretending to be someone else by faking an identity or IP/MAC address
What is message injection?
Inserting fake messages into a data stream
What is hijacking?
Taking over an active connection by replacing a sender or receiver
What is a DoS attack?
Flooding a service so that legitimate users can’t access it
How is e-mail encrypted for confidentiality?
encrypted with a symmetric key -> then encrypted with the recipient’s public key
How is e-mail authenticated and protected for integrity?
Sender -> signs the message hash with private key
receiver -> verifies with sender’s public key
What happens in a TLS handshake?
client - hallo + TLS versjon
server - hallo + sertifikat
client - sjekker sertifikatet med CA
begge - lager felles hemmelig key
begge - sender finished msg kryptert med felles key
Why does TLS break data into records?
So each chunk can be encrypted, MAC-checked, and processed immediately
what is a VPN
encrypted tunnel over the public Internet for private traffic between sites
What does Internet Protocol Security (IPsec) provide?
Encryption, authentication, and integrity at the network layer