Securing TCP/IP Flashcards

1
Q

5 areas of TCP/IP Security

A

Encryption - scramble, mix up or change data
Integrity - data is received is the same as data sent
nonrepudiation - person can not deny they took a specific action
authentication - verify person accessing data
authroization - what can authorized person do with data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

symmetric-key algorithm

A

same key for both encryption and decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

asymmetric-key algorithm

A

different key for encryption and decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

block cipehers

A

name of most symmetric key algorithms

- encrypt chunks of data of a certain length at a time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

DES

A

Data Encryption Standard
64 bit block
56 bit key
susceptible to brute-force attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

stream ciphers

A

takes a single bit and encrypts it on the fly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

RC4

A

Rivest Cipher 4

  • fast easy to use and free
  • stream cipher
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AES

A

Advanced Encryption Standards

  • block cipher
  • 128, 192 or 256 bit key size
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

public-key cryptography

A

primary asymmetric key algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

encryption at each layer

A

1 - no encryption at this layer except bigger WAN tech like SONET
2 - no encryption done at this layer
3 - only IPSec, typically software that encrypts the IP packet, new outer layer encapsulates and encrypts inner packet
4 - neither TCP or UDP offers any encryption
5, 6, 7 - important encryption standards such as SSL and TSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

hash

A

mathmatical function that you run on a string of binary digits of any length that results in a value of some fixed length (often called a checksum or message digest)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

cyptographic hash

A
  • one way function
  • hash is irreversible
  • can be used to verify file integrity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

md5

A

message-digest algorithm version 5

- 128-bit message digest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SHA

A

secure hash algorithm

  • includes sha-1, sha-2, and sha-3
  • sha-1 produces 160-bit message digest
  • sha-2 has four variants
    • sha-224 (224 bit message digest)
    • sha-256
    • sha-384
    • sha-512
  • sha-3 comes in 4 variants
    • sha3-224
    • sha3-256
    • sha3-384
    • sha3-512
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CRAM-MD5

A

tool for server authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

digital signature

A

a hash of the public key encrypted by the private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

certificate

A

standardized type of file that includes a public key with a digital signatuure, and the digital signature of a trusted 3rd party

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

NAC

A

Network Access Control

  • usually prevents computers lacking anti-malware and patches from accessing the network
  • creates policies that define what individiual systems can do on the network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

ACL

A

Access Control List

  • clearly defined list of permissions that specifies what an authenticated user may perform on a shared resource
  • three ACL models: mandatory, discretionary and role based
20
Q

Mandatory Access Control

A

MAC

  • every resource is assigned a label that defines it security level
  • if user lacks level, they don’t get access
  • used in OS to determine what programs have access to other programs stored in RAM
21
Q

Discretionary Access Control

A

DAC

- resource owner controls access

22
Q

Role-based Access Control

A

RBAC

- managed by groups

23
Q

PPP

A

Point-to-Point Protocol

  • enables to PPP devices to connnect, authenticate with a user/pass and netgotiate network protocol to use
  • two methods of authentication, PAP and CHAP
24
Q

PAP

A

Password Authentication Protocol

- PPP protocol that simply transmits the user/pass in plaintext

25
CHAP
Challenge Handshake Authentication Protocol - PPP protocol relies on a shared secret, usually a password that both ends of the connection knows - client creates a hash of password, sends to host - host compares has to password - periodically repeats the entire process to prevent man-in-the-middle attacks
26
Microsft CHAP
MS-CHAPv2 - most common authentication method for dialup connections - offers most security
27
AAA
Authentication, Authorization, and Accounting - port authentication - alooows remote users authentication to a particular point of entry (port) to another network
28
RADIUS
Remote Authentication Dial-In User Service - created to support ISPs with thousands of modems to connect to a central database - consists of 3 devices - server that has access to a database of usernames and passwords - number of Network Access Servers (NASs) that control themodems - and a group of systems that in some way connect ot the network
29
RADIUS server programs
IAS - Internet Authentication Service for MS Server | FreeRADIUS - Unix/Linux
30
RADIUS ports
UDP port 1812 and 1813 | UDP 1645 and 1646
31
TACACS+
Terminal Access Controller Access Control SYstem Plus - created by cisco to support AAA in a network with many routers and switches - very similar to RADIUS but uses port 49 by default - separates AAA into 3 parts - uses PAP, CHAP and MD5, but can use Kerberos
32
Kerberos
an authentication protocol for TCP/IP networks with many clients all connected to a single authenticating server, no PPP - used in MS domains - uses UDP or TCP port 88 - KDC (key distribution center) has two process - Authentication Server (AS) - Ticket-granting Service (TGS) - token includes Security Identifier (SID) plus SIDs for groups the user is a member of - uses timestamps - if KDC goes down, no one has access - timestamps require everyones clocks are synced
33
Single-sign On
ability to log in only one time and use the same token to access any resource
34
SSH
Secure Shell | - use PKI in the form of an RSA key
35
tunnel
secure links between tow programs on separate computers
36
SSL
Secure Sockets LAyer - requires server with certificate - uses symmetic-key cipher - creates encrypted tunnel between SSL server and client
37
TLS
Transport Layer Security - upgrade to SSL - works with almost any application
38
IPsec
internet Protocol Security - works at internet/network layer - dominant encryption suite - works in transport mode and tunnel mode - transport - only payload of packet is encrypted - tunnel - entire packet is encrypted and placed inside another packet
39
CRLs
Certificate Revocation Lists | - third party that tracks if certs have been revoked
40
SCP
Secure Copy Protocol | - transfer data securely between two hosts using SSH
41
SFTP
replacement for FTP - uses FTP over SSH - TCP port 23
42
SNMP
Simple Network Management Protocol - queries state of SNMP capable devices - uses agents (special client programs) to collect network information from a management information base (MIB) - v1 & v2 unencrypted - v3 encrypted
43
LDAP
Lightweight Directory Access Protocol - tool that programs use to query aqnd change a database used by the network - can talk to Active Directory and other directory service providers to query and change items uses TCP and UDP port 389
44
LDAPS
- secure version of LDAP - now depricated used TCP port 636
45
NTP
Network Time Protocol | - gives current time
46
In PKI wihch key encrypts the data
public
47
In order to have PKI, you must have
root authority