Final Revision Flashcards
(77 cards)
Biometrics: CER/ERR =?
Crossover Error Rate, also = ERR
Equal Error Rate, also = CER
Where FRR = FAR
The lower the CER/ERR the more accurate the system.
Biometrics: Type 1 error
false rejection rate (FRR)
Biometrics: Type 2 error
false acceptance rate (FAR)
What does Kerberos address?
SSO for Confidentiality and integrity and availability
What form of cryptology is kerberos based on?
Symmetric Key cryptology
How does Kerberos exchange passwords?
Hashes
Kerberos:
KDC = AS = TGS = TGT = TP =
KDC = Key Distribution Center AS = Authentication Server TGS =Ticket Granting Service TGT =Ticket Granting Ticket TP = Trust Principle (Resource)
IPSEC:
Transport mode =
Tunnel Mode =
End to End encryption= Transport = Only payload encrypted
Link Encryption = Tunnel = All headers encrypted and payload
SSL/TLS
Use =
Purpose =
Cryptographic components =
Use = securing web protocols
Purpose = Confidentiality, Authentication, Integrity
Cryptographic components = Encryption, HMAC
HTTPS
Use =
Purpose =
Cryptographic components =
Use = ssl/tls on top of http
Purpose = Confidentiality, Authentication, Integrity
Cryptographic components = Encryption, HMAC
FTPS
Use =
Purpose =
Cryptographic components =
Use = ssl/tls on FTP
Purpose = Confidentiality,
Cryptographic components = Encryption,
SSH
Use =
Purpose =
Cryptographic components =
Use = secure channel
Purpose = Confidentiality, Integrity
Cryptographic components = Encryption, HMAC
SFTP
Use =
Purpose =
Cryptographic components =
Use = HHS on FTP
Purpose = Confidentiality,
Cryptographic components = Encryption,
S/MIME
Use =
Purpose =
Cryptographic components =
Use = secure email
Purpose = Confidentiality, Integrity, Non repudiation
Cryptographic components = Encryption, HMAC
IPSEC Components, name their functions.
AH = ESP = IKE = SA = SPI =
AH = Authentication Header (Function: Integrity, Origin authentication, replay attack protection (HMAC)
ESP = Encapsulating Security Payload (Function: Integrity Origin authentication, replay attack protection,
confidentiality (HMAC & Symmetric Encrption)
IKE = Internet Key Exchange (Function: Device Authentication and Establishing Security Association)
SA = Security Association (Function: negotiation that includes the algorithms that will be used (Hashing and encryyption), key length, key information.
SPI = Security Parameter Index (Function: Security association Identifier)
Cipher attacks: order of usefulness?
chosen cipher text
known plain text
chosen plain text
cipher text only
1 - cipher text only
2 - known plain text
3 - chosen plain text
4 - chosen cipher text
Cryptography
name 3 algorithms
Diffie-Helman-Merke
RSA (Rivest, Shamir-alderman)
ECC (Elyptic Curve Cryptography) *current standard
digital signatures require 2 algorithms:
Hashing Algorithm (e.g. SHA-x) digital signature function (RSA, DSA (digital signature algorithm)
digital signature provide:?
non-repudiation and integrity.
SESAME, what is it?
Secure European Systems for Applications in a multi-vendor environment
public key cryptography, like kerberos. but used for applications not operating systems.
federated identity:
an arrangement among enterprises for authentication
federated identity
1 - SAML
2 - OAuth 2.0
3 - OpenID ,
4 - OpenID Connect
1 - SAML (Security Assertion Markup Language)
2 - OAuth 2.0 (Authorisation, think facebook game asking for access)
3 - OpenID ,
4 - OpenID Connect( provides authentication for OAuth 2.0, replacement for SAML)
SAML =
IdP =
SP =
Principle =
SAML = Security Assertion Markup Language IdP = Identity Provider SP = Service Provider Principle = User
Network Attack:
SMURF
ICMP spoofs packet header to appear attack originated on the victim and send to a broadcast, all machines respond to the victim DOS