Protecting Data and Systems Flashcards

(28 cards)

1
Q

PKI Components

A
  1. Public and private encryption keys
  2. Digital certificates
  3. Certificate authorities
  4. Digital signatures
  5. Key management protocols
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Non-Repudiation

A

Assurance that the sender of information is provided with proof of delivery and the recipient is provided with proof of the sender’s identity, so neither can later deny having processed the information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cryptology

A

The study of both creating and breaking ciphers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cryptanalysts

A

Someone who breaks ciphers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cryptographers

A

Someone who creates ciphers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

All ciphers are considered breakable unless they have the following:

A

Key is sufficiently random
Key is as long as the message
Key is never reused (this is why you shouldn’t use the same password for multiple accounts)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

PFS

A

Perfect Forward Secrecy (if the key is compromised, no other key or message is compromised because the key is only ever used once)

Ex. Vernam cipher or one-time pad created in 1917 by Gilbert Vernam.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Kerchkhoff’s principle

A

A cryptosystem should be secure even if everything about the system, except the key, is public knowledge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CSR

A

Certificate Signing Request

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CRL

A

Certificate Revocation List (CRL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

PGP

A

Pretty Good Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Secure Mime (S/MIME)

A

uses digital certificates to encrypt all emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

TPM

A

Trusted Platform Module (standard for a secure cryptoprocessor)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Asymmetric encryption

A

Public-key cryptography, or asymmetric cryptography, is a cryptographic system that uses pairs of keys. Each pair consists of a public key and a private key.

ex. Diffie Hellman Key Exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Symmetric encryption

A

Symmetric encryption uses a single key to encrypt and decrypt. If you encrypt a zip file, then decrypt with the same key, you are using symmetric encryption. Symmetric encryption is also called “secret key” encryption because the key must be kept secret from third parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Monoalphabetic cipher

A

one key encrypts one letter at a time

ex. ~50 BC - Julius Caesar

17
Q

Polyalphabetic cipher

A

multiple keys encrypt the message

ex. 1467 Leon Alberti, 1585 Blaise de Vigenere

18
Q

Vernam cipher / one-time pad

A

The combination of this cipher with a key that does not repeat and is not reused. Also known as Perfect Forward Secrecy (PFS). Developed in 1917 by Gilbert Vernam.

19
Q

RC4 cipher

A

RC4 is an example of a stream cipher and tries to emulate the one-time pad where the same key is never used twice; initialization vector adds randomness.

Ex. WEP, WPA and is still available (although not recommended) in SSL and TLS

20
Q

DES

A

Data Encryption Standard. US Federal standard in January 1977. Symmetric key, 64-bit block cipher.

ex. Lucifer cipher (IBM)

21
Q

AES

A

Advanced Encryption Standard. Supports key sizes of 128, 192, and 256 bits. Based on the Rijndael algorithm. Supersedes the DES algorithm.

22
Q

Distributive Bargaining

A

Win-Lose
Assumes the pie is fixed
My gains are equal to your losses
Based on BATNA (“my walk away point”)

23
Q

Integrative Bargaining

A

Win-Win

Cooperate to increase each other’s gains

24
Q

What is the importance of security awareness?

A

1) Meet compliance and business goals
2) change and instill positive behaviors
3) Build a security and risk-aware culture

25
3 different states of the learning continuum
1) Education (e.g., attending a class - theories & concepts) 2) Training (e.g., teaching specific skills) 3) Awareness (e.g., build corresponding behaviors)
26
5-Tiered Security Awareness Maturity Model
1. Nonexistent 2. Compliance Focused 3. Promoting Awareness & Behavior Change 4. Long-Term Sustainment & Culture Change 5. Robust Metrics Framework
27
Are people the weakest link in a cybersecurity program? No
People are not the weakest link - they are the primary attack vector
28
What is the Fogg Behavior Model?
Motivation vs Ability vs Prompts x/y chart to determine your Action Line