Domain 3 Flashcards
(181 cards)
Shared Responsibility Model
On-Prem
(How Responsibility is delegated)
You 100%
- Apps
- Data
- Runtime
- Middleware
- OS
- Virtualization
- Servers
- Storage
- Networking
Shared Responsibility Model
IaaS
(How Responsibility is delegated)
You 50%
- Apps
- Data
- Runtime
- Middleware
- OS
Cloud Service Provider 50%
- Virtualization
- Servers
- Storage
- Networking
Shared Responsibility Model
PaaS
(How Responsibility is delegated)
You 25%
- Apps
- Data
Cloud Service Provider 75%
- Runtime
- Middleware
- OS
- Virtualization
- Servers
- Storage
- Networking
Shared Responsibility Model
SaaS
(How Responsibility is delegated)
Cloud Service Provider 100%
- Apps
- Data
- Runtime
- Middleware
- OS
- Virtualization
- Servers
- Storage
- Networking
Public Cloud
(Name the Pros)
Everything runs on CSP hardware
Scalable, Agile, pay-as-you-go, no maintenance, low skill
Private Cloud
(Name the Pros)
A cloud env in your own data center
legacy support, control, compliance
Hybrid Cloud
(Name the Pros)
Combines both Public / Private, allows you to run your apps in the right location
flexibility in legacy / compliance / scalability
Cloud Access Security Broker (CASB)
Security policy enforcement solution that may be install On-prem or in the cloud
Shadow IT Prevention
Post-Quantum Cryptography
Developing new cryptographic approaches developed by normal computers to be resilient to Quantum computers
How well do current encryption hold up to Quant?
Post-Quantum Cryptography
Symmetric Encryption
- Does better
-
Grovers Algorithm: Shows Quant computer halve key length
- 256 bit key is as strong as a 128 bit to a normal computer
Post-Quantum Cryptography
Asymmetric Encryption
- Does worse
-
Shor’s Algorithm: can easily break public key algos
- RSA & Elliptic Curve is vulnerable
- Lattice offers resilience
Post-Quantum Cryptography
Lattice Algorithms
Based on shortest vector problem and closest vector problem
- potential to replace all current endangered schemes
- Lattice based schemes make up most publications on post-quant crypto
TIP:
If a ?’s ask ab a “asymmetric encryption” that is “quant resilient”, answer is Lattice
Cryptography
Code
Crypto system of symbols that operate on words or phrases and are sometimes secret but do NOT
ensure confidentiality
Cryptography
Cypher
Always meant to hide true meaning
Types of Cyphers
Stream
Symmetric key, plaintext combined with cypher digit stream ( key stream ) . Each plaintext digit is encrypted one at a time with the corresponding digit on keystream to produce cipher text stream
Types of Cyphers
Block
encrypts plain text in blocks at a time, like 64- bits
Types of Cyphers
Substitution
replace each character with a different one. Ex ceasar cipher
Types of Cyphers
Transposition
Shuffle each digit
Initialization Vector (IV)
( Random Number ) a random string ( nonce ) that is XORed with message
used by ceasar, Vigenere, One time Pad
- main diff bt them is key length
- 1 char > word / sentence > one time pad
One Time Pad
Type of substitution cypher where key stream is at least as long as the message.
Success needs:
- generated randomly
- at least as long as message
- protected from disclosure
- Pad used once then deleted
Zero Knowledge Proof
specific info is exchanged but no real data transferred, only with digital signatures and certs
Prove knowledge of a fact without revealing the fact
Split knowledge
The privilege required to do operation is divided among multiple users
- no single person can comprimise security
Work Function (Work Factor)
Way to measure strength of crypto function by cost / time to decrypt message
Nonrepudiation
provide undeniable proof that sender actually authored it.
- prevents sender from denying it