Domain 3 - Security Architecture and Engineering Flashcards

1
Q

Caesar Cipher

A

Simple substitution cipher – Moved character 3 spaces

Subject to package analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Symmetric Vs Asymmetric

A

Symmetric - same key to encrypt and decrypt

Asymmetric - different keys to encrypt and decrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Vignere cipher

A

First polyalphabetic cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Enigma machine

A

used by Japan during WWII

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

PAIN of cryptography

A
PAIN 
Privacy
Authenticity
Integrity
Non-repudiation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Initialization vector

A

Random bit string added that is the same length as the block size. XOR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Name a stream cipher

A

RC4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Symmetric

A

Relies on the use of a shared secret key

Pros
-Fast 
-Good strong privacy 
Cons
-out of band key distribution
-doesn't scale well
-does not provide non-repudiation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Symmetric cipher types

A

Stream

Block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Asymmetric cryptography

A

Every user has a key pair - private and public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Asymmetric Algorithms

A

SA’s
E’s
DH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Asymmetric Algorithms

A
SA's
RSA & DSA 
ECC & El Gamal
DH (Dougie Houseer has a backpack)
Diffie Hellman & Knapsack
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Standard for digital signatures

A

RSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What algorithm uses factorization

A

RSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

First asymmetric algorithm

A

Diffie Hellman

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ECC

A

Elliptical Curve Cryptography

Based on points on a curve
Very efficient but only for key agreement (digital signatures)
Used on handheld devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Usually the standard and answer for any Symmetric questions….

A

AES

Unless PGP then its IDEA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What keys are mathematically related

A

Asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Birthday attack

A

attempts to find collisions in hash functions

20
Q

MD-5 how many bits

21
Q

SHA-1 how many bits

22
Q

SHA-2 how many bits

A

256, 384, 512….

23
Q

Transposition cipher

A

uses an encryption algorithm to rearrange the letters of a plaintext message

24
Q

Stream ciphers

A

Caesar - one
Vignere - word or sentence
One-time pad - key as long as the message itself

25
zero - knowledge proof
enables one to prove knowledge of a fact without revealing the fact itself
26
split knowledge
ensures that no single person has sufficient privileges to compromise the security of an environment
27
Work function/Work factor
Time and effort required to break a protective mechanism
28
DES and 3DES modes
Electronic Codebook Mode (ECB). Simplest and least secure Cipher Block Chaining (CBC). Cipher Feedback (CFB) .. uses chaining so error propagate
29
XOR Cipher
Flipping of bits binary values match = 0 don't match = 1
30
IPSEC two modes
Transport Mode Tunnel Model Protocols - Authentication Header (AH) Encapsulating Security Protocol (ESP)
31
Replay attack
an attempt to reuse authentication requests
32
Security Models
Integrity (focus) - Biba (State machine model) - Clark-Wilson - access control triple---question is about lattice - Goguen-Meseguer Confidentiality -Bell-LaPadula - no read up, no read down-state machine that enforces confidentiality..uses MAC to enforce security policy - Brewer and Nash - Take Grant
33
Bell LaPadula security model
Enforces confidentiality Uses MAC to enforce DoD multilevel security policy (Gov) Cannot read up Cannot write down
34
Biba security model
Integrity No read down No write up
35
Clark-Wilson
Integrity No read down No write down
36
Take Grant model
confidentiality based | supports four basic operations - take, grant, create, and revoke
37
Brewer and Nash (Chinese Wall)
Confidentiality based | developed to prevent conflict of interest
38
Graham-Denning model
Focused on the secure creation and deletion of both data and subjects
39
Trusted Platform Module
Chip that resides on the motherboard chip
40
Access control types
Mandatory (MAC) - enforces policy that is determined by the system, not the object owner. Relies on classification labels.
41
Discretionary Access Control (DAC)
Permits the owner or creator of an object to control and define its accessibility
42
Non-discretionary access control
Enables the enforcement of system-wide restrictions that override object-specific access control.
43
Rule based access control
Usually found in firewalls
44
Role-Based Access Control
Uses well-defined collection of named job-roles that have specific permissions.
45
Techniques for ensuring CIA.
Confinement - restricts a process to reading from and writing to certain memory locations. Bounds - limits of memory a process cannot exceed when reading or writing. Isolation - the mode a process runs in when it is confined through the use of memory bounds.