Network Security Flashcards

(10 cards)

1
Q

What are the 5 objectives of network security?

A

Confidentiality
Integrity
Availability
Authenticity
Accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is mutual authentication?

A

When 2 communicating parties both confirm their identity to the other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A protocol has forward secrecy if it keeps the message secret from an attacker who has what?

A

A recording of the protocol run
The long term keys of the principals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the 2 requirements for a good key?

A

Freshness - the key is new
Exclusivity - the key is only known to the principals in the protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the 2 requirements for entity authentication?

A

Far-end operative - A knows that B is currently active
Once authentication - A knows that B wishes to communicate with A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the 3 requirements for a protocol to provide mutual belief in a key?

A

The key is a good key
A knows that B wishes to communicate with A using the key
A knows that B believes that the key is a good key for B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is EAP?

A

Extensible Authentication Protocol
It is a framework for network access and authentication control. A client has to authenticate themselves to a authentication server before they get access to the rest of the network. It is extensible because it supports many authentication methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In IEEE 802.1X what is the difference between an uncontrolled port and a controlled port?

A

An uncontrolled port allows the exchange of data regardless of the authentication state of the client (so new clients can authenticate themselves). A controlled port only allows the exchange of data if the client is authenticated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why is the Wired Equivalent Privacy protocol insecure?

A

Same key for every user.
Uses RC4 stream cipher with a 24 bit IV. The same seed must not be used twice but 50% chance of IV reuse after 5,000 packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why is WPA/WPA2 insecure?

A

Anyone with the network password can decrypt the encrypted packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly