Memorize-y stuff! Flashcards
(128 cards)
STRIDE
Spoofing (authenticity), Tampering (integrity), Repudiation (accountability), Info Disclosure (confidentiality), escalation of privilege (authorization)
ACL
Access Capability List: answers the question: “what SUBJECTS have access to a specific object” (think: VIP list)
Capability
A row in Access control matrix. Answers the question: “What OBJECTS does a singular subject have access to” (think: what is in my backpack)
What are the 3 reference monitor requirements?
1) Always-invoked
2) Tamper-proof
3) verifiable (simple design + easy to analyze)
RC4
Ron’s Cipher 4. Created in 1987- INSECURE
ChaCha20
Standard cipher algorithm used. SECURE
HMAC-SHA2
Standard SECURE MAC function used
AES-CBC-MAC
Somewhat standard MAC funciton used, but bug prone.
AES (what are its 3 main modes)
Advanced Encryption Standard (a block-cipher). It has 3 modes: GCM= authenticated encyrption (gold standard). ECB= broken mode, CTR&CBC= not broken, but no integrity
MD5
Very broken Hash function
SHA-1
Another very broken hash function (not as broken as MD5)
SHA2, SHA3
standard hash functions! SECURE
RSA
Way to generate PK and SK (uses a lot of special math!)
MAC Address
48 bits, permenantly installed in hardware, used to network on L2 (datalink layer), made for local networks to be addressable
IP Address
32-bits, operates on layer3 (network layer). Prefix = network, suffix = host
Private vs Public IP Address
Private is used for local network communication (starts with 192 or 176), can be duplicated if they are in different local networks. Public is for outside of local network. They cannot be duplicated
CIDR
Classless InterDomain Routing: standard for IP address to have a custom prefix length for their network. Depending on how many hosts are using that network, it might be good to have a larger or smaller mask. Denoted with IPadd xx.xx/26 <- /number = network mask
WEP
Broken form of Wi-Fi encryption (due to reusing nonces). Not used anymore
WPA
Vulnerable form of wi-fi encryption. Not the standard anymore
WPA2 or WPA3
Both secure forms of wifi encryption
Hierarchy of IP Address allocation
Starts with ICANN -> regional internet registeries (like ARIN) -> Large institutions (ISPs, like Qwest) -> smaller institutions (like UChicago) -> individuals
DHCP
Dynamic Host Configuration Protocol: THe way to connect to network to get an IP address
What important components are contained in the IP header?
length in bytes, TTL, protocol, source address, destination address
What is contained in the IP datagram?
IP header - TCP/UDP header - TCP/UDP payload