Lesson 22: Protecting Data Moving through the Internet Flashcards

(41 cards)

1
Q

Glossary: 3DES

A

A block cipher encryption algorithm that employs symmetric keys. It applies the DES algorithm three times to each block.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Glossary: AAA Protocol

A

A protocol for authentication, authorization, and accounting that uses different link layer protocols such as PPP and authenticates using PAP or CHAP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Glossary: Algorithm

A

a code used to alter a message so that unauthorized people cannot read it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Glossary: Assymetric Key

A

A key that used the encryption algorithm. It is defined by two keys: One used for encryption and one for decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Glossary: Asymmetrical (out-of-band) virtualization

A

A type of virtualization where the virtualization device is installed outside the actual data path between the network and the storage system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Glossary: Authentication Server (AS)

A

A server whose function is to provide network users with authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Glossary: block cipher

A

a cipher that applies an algorithm to a block of data, rather than a single bit at a time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Glossary: blowfish

A

A block-level encryption algorithm that uses symmetric-key encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Glossary: brute-force attack

A

An attack where the attacker systematically guesses the key based on a known list or a predictive mathematical scheme. Can involve 100s-1000s of attempts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Glossary: caching web proxy

A

a local server that cacher (store) web resources for quicker access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Glossary: Certificate Chain

A

the list of certificates starting with the root certificate, followed bu each subsequent certificate, where the issuer or signer of one certificate is the subject of the next

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Glossary: Cipher

A

An algorithm used to encrypt data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Glossary: Cipher Lock

A

A lock that operates by unlocking magnetic door locks when the correct programmed code is entered by the user on the cipher lock keypad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Glossary: Ciphertext

A

the text of any data after it has been encoded by a cryptographic key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Glossary: Cleartext

A

the stored or transmitted data, which has not been encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Glossary: Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA)

A

A form of input request for a word, phrase, random characters and numbers, or a simple request to perform a simple test that cannot easily be automated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Glossary: CRAM-MD5

A

An email authentication system that transfers passwords in a hased form

18
Q

Glossary: cryptography

A

the procedures, processes, and techniques used to convert data into secret code

19
Q

Glossary: cryptology

A

the study of cryptography

20
Q

Glossary: data in motion

A

the process, in which data is being transmitted through a wired or wireless network

21
Q

Glossary: decrypt

A

an act of using the relevant key to unlock the scrambled ciphertext into plaintext so that it might be understood

22
Q

Glossary: decryption

A

the process of converting previously encrypted data back to its original form

23
Q

Glossary: decryption key

A

the key used to decrypt a secret code

24
Q

Glossary: digital certificate

A

a certificate that digitally verifies that the sender of an encrypted message is who they claim to be

25
Glossary: entropy
any lack of predictability and order, leading to a degree of uncertainty.
26
Glossary: EV certificate
a cert that requires verification of an individual by a Cert Authority. Typically used on sites that are using SLL/TLS.
27
Glossary: hash table
A lookup table that maps keys to values using a hash function that converts the keys to hash values
28
Glossary: honeypot
A decoy server, network device, or network segment designed to attract attackers away from the real network. accomplished by providing attackers with relatively easy access to decoy systems on the network and hiding truly critical systems
29
Glossary: identity proofing
the process in which a particular individual is associated and verified with an existing identity
30
Glossary: key
a variable value applied using an algo to a string or block of unencrypted text to produce encrypted text, or to decrypt encrypted text. Having ownership of a key signifies that the entity either possesses or knows the information required to gain access to a specific asset.
31
Glossary: keys
In cryptography: data strings used to encrypt or decrypt information; encryption keys can be based on a secret string that is known only to the software that encrypts and decrypts data or may be randomly generated, or any combination of known or random factors.
32
Glossary: OAuth
An authentication protocol that allows apps to act on the behalf of a user without sharing passwords
33
Glossary: password attack
any password attempt that successfully authenticates through a password prompt without originally knowing the correct password
34
Glossary: Password-Authenticated Key Agreement (PAKE)
an interactive method for two or more entities to establish cryptographic keys based on one entity's knowledge of a password
35
Glossary: Password Authentication Protocol
An auth protocol that utilizes passwords
36
Glossary: Password Management Policy
A policy put into place to manage the passwords of users in a networked environment
37
Glossary: Password Management Policy
A policy put into place to manage the passwords of users in a networked environment
38
Glossary: Password Manager
A software application that stores and manages the user's passwords
39
Glossary: Public Key
a cryptographic key that can be obtained and used by anyone to encrypt messages intended for a particular user
39
Glossary: Public Key
a cryptographic key that can be obtained and used by anyone to encrypt messages intended for a particular user
39
Glossary: Public Key
a cryptographic key that can be obtained and used by anyone to encrypt messages intended for a particular user