Securing TCP/IP Flashcards
(42 cards)
regarding security what is : CIA
Confidentiality
Integrity
Availability
these uses keys to encrypt cleartext into cyphertext
Algorithms
An algorithm that uses the same key to encrpyt and decrypt is
Symmetric Encryption
This is any unencrypted data:
cleartext
this type of encryption uses a public and a private key:
asymmetric encyption
For 2 people to communicate, they must exchange:
Public keys
A ________ creates a fixed-size hash value
hash algorithm
You see a lot of Hash algorithms when:
downloading stuff
Examples of Hashes:
MD and SHA-1
These are used for verifying data, not for encryption:
Hashes
Hash values are always fixed:
in size
Authentication is first and uses
Identification or what or which user are you like your, user name
After you are identified as a valid user you then need to be
Authorized
What are the 3 parts to any form of authentication
identify yours self
a password
authorization - defines what exactly you can do
Authentication Attributes
Something you do
Something you exhibit
Someone you know
Somewhere you are
____________ is actually proving that or your identity
authentication
Radius network basically has a supplicant, or EU, Client ( mediator ), Server ( handles the authentication), possible Database ( has all the user id’s and passwords) and they use Ports:
UDP ports 1812-1813
UDP ports 1645-1646
___________ provides AAA or ( authentication, authorization, and accounting. It is used a lot in wireless networks.
Radius
This is a version of Radius that’s a proprietary system because of Cisco to handle a large network of routers and switches. This is rarely used in wireless networks.
TACACS+
TACACS+ uses what port?
TCP port 49
This authenication protocol is mainly designed for LAN’s. It is a Microsoft proprietary technology that is used in Windows Server. Designed for wired networks.
Kerberos
Kerberos using Key Distribution Server (KDS)
Authenticating Server
Ticket Granting Service
In Kerberos this is sent back to a client to authenticate but doesn’t authorize. The client then stamps the ticket and send it back. Finally the KDC send a time-stamped Token back granting authorization which is normally 8 hours.
Ticket Granting Token (TGT)
Windows networks, especially running Kerberos requires that the ________ be set the same on all machines.
time