Part 2 Of Exam 1 Flashcards
(36 cards)
Plaintext encryptionciphertextdecryptionplaintext
*one key for encryption and decryption
Encryption and decryption
Plaintextencryption[public key]ciphertextdecryption[private key]plaintext
Public key cryptography
Original textsigning[private key]signed text verifying[public key]verified text
Digital signatures
Has public key value
Then: holder’s unique name (DN), issue’s unique name, version of cert. format, certificate serial number, signature algorithm identifier (for certificate issuer’s signature), certificate issuer’s name (the certification authority), validity period (start/expiration dates/times) and extensions
Certification Authority’s digital signature from certification authority’s private key/root of CA certificate
Digital certificates
is an anonymous, decentralized virtual currency
Online drug market where bitcoin is the standard currency
______ is exchanged peer-to-peer
Bitcoin
a data file containing private crypto keys to the attacker
Wallet
______ on the standard file location for a Bitcoin wallet
Trojan
Client computer [browser, HTML, JavaScript]HTTPWeb Server [Apache, HTML, PHP and SQL]
Client server
WOT
Web of trust
Fake MP3 _____ Detected on 27% of PCs
The malicious media files appear to be either MP3 audio files or MPEG video files and can be found on file-sharing services McAfee believes they were placed there by cybercriminals
Prompted to download a file called PLAY MP3.exe
In the end you’re left with a fake MP3 file taking up space, a worthless MP3 player adware that claims not only to display popups, but also to block them, and more adware that successfully displays popup and popular ads.
Trojan
nodes are encrypted and are routed through other nodes to make it extremely difficult to determine who is requesting the info and what its content is.
Users contribute to the network by giving bandwidth and a portion of their hard drive… for storing files
Files are encrypted, so generally the user cannot easily discover what is in his datastore, and hopefully can’t be held accountable for it
Chat forums, websites, and search functionality, are all built on top of this distributed data store.
Freenet
Without app sandbox all user data, the app and all system resources have unrestricted access to each other
With app sandbox: the app is quarantined so it does not have access to user data and system resources.
Sand boxing
File is divided into segments called pieces. Each peer receives a new piece of the file it becomes a source of that piece for other peers. So the original piece doesn’t have to send itself to every computer who wants it. The task of distributing the file is shared by those who want it
BitTorrent
a special software that interfaces the major hardware components of your computer with the operating system
BIOS
a technique of loading a program into a computer by means of a few initial instructions that enable the introduction of the rest of the program from an input device
Bootstrap
BIOS #1
Is configuration data read by BIOS
CMOS (complementary metal oxide semiconductor) Setup
BIOS #2
POST
power-on self test
BIOS steps #3
Determine which devices are bootable (USB vs. hard drive)
BIOS checks information and stores it in
tiny (64 bytes) amount of RAM on a complementary metal oxide semiconductor (CMOS)
translators between the hardware components and the operating system
Interrupt handlers
this certification is for people just getting into the field
Security+
for serious, dedicated information security professionals who intend to stay in the field and grow
$110,342
For security managers and professionals who develop policies and procedures in information security. Gold standard in information security certifications
CISSP (Certified Information Systems Security Professional)
-$80,066
Network security, compliance and operational security, threats and vulnerabilities, access control and identity management, cryptography and application, and data and host security. Candidates will also be tested on their knowledge of security concepts, tools, and procedures to react to security incidents
CompTIA Security+
True
Information security (protection of info and info systems from unauthorized access, use, disclosure, disruption, modification or destruction in order to provide confidentiality, integrity and availability) is a bubble inside of information assurance (measures that protect and defend information and info systems by ensuring their availability, integrity, authentication, confidentiality and on-repudiation).
T