Secure Communications Flashcards

(17 cards)

1
Q

What does TLS stand for?

A

Transport Layer Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does TLS protect?

A

Info passed between browsers and Web servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What two protocols make up TLS?

A

Handshake protocol, Record Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the Handshake protocol?

A

Use public key cryptography to establish a shared secret key between client and server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the Record Protocol?

A

Use the secret key from Handshake protocol to protect client-server conversation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

4 steps of Handshake Protocol

A

1) Client sends Hello to Server. 2) Server sends certificate, how key exchange will happen, and request for client certificate 3) Client gives certificate, agree on key exchange method and verifies server certificate 4) Once server verified, client switches to encrypting with server’s public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Kerberos?

A

Network Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does Kerberos allow?

A

Allows users to access services across a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Difference between Kerberos and TLS authentication?

A

TLS, server authenticates, Kerberos clients and servers mutually authenticate with username and password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are tickets in Kerberos?

A

Proof of user identity, shown to application servers, Issued by Authentication Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Phase 1 of Kerberos?

A

User gets Ticket Granting Ticket (TGT) from Authentication Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Phase 2 of Kerberos?

A

User uses TGT to get ticket for the service they need to access. Get this from Ticket Granting Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Phase 3 of Kerberos?

A

User accessed service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the Key Distribution Center (KDC)?

A

Model comprised of Authentication Server and Ticket Granting Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Limitations of Kerberos: What is the limitation regarding KDC? How to mitigate?

A

KDC down, no one can log in. Can implement multiple KDCs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Limitations of Kerberos: What is the limitation regarding passwords?

A

Vulnerable to password guess attacks, as password doesn’t change

17
Q

Limitations of Kerberos: What is the limitation regarding user workstation?

A

Assumes user workstation is secure