Securing TCP/IP Flashcards

1
Q

Integrity

A

Process that Guarantees that the data received is the same as originally sent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Nonrepudiation

A

A person cannot deny he or she took a specific action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Authentication

A

Verify that whoever is trying to access the data is the person you want accessing it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Authorization

A

What an authenticated person can do with the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ciphertext

A

When you run cleartext through a cipher algorithm using a key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Symmetric Key Algorithm

A

When you use the same key to encrypt and decrypt the encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Asymmetric Key Algorithm

A

When you use different keys for encrypting and decrypting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Block Ciphers

A

Encrypt data in chunks of a certain length at a time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DES

A

Data Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DES Definition

A

used 64 bit block and 56 bit key. Outdated form of block cipher.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Stream Sipher

A

Takes a single bit at a time and encrypts on the fly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

RC4

A

Rivest Cipher 4 - very fast stream cipher that was used mostly in wireless. Stopped being used around 2013 due to weakness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

AES

A

Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

AES definition

A

Used by almost all TCP/IP applications and is a block cipher that uses 128bit block size and 128, 192, or 256 bit key size.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Public Key Cryptography

A

Primary Asymmetric implementation of security, most common in RSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Integrity Hash Function

A

mathematical function that you ru n on a string of binary digits of any length that results in a value of some fixed length.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

File Hashing

A

Hashing the contents of a file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

MD5

A

Message Digest Algorithm version 5, creates a 128 bit message digest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

SHA

A

Secure Has Algorithm is the primary family of cryptographic hash functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

SHA 224

A

SHA-2 with a 224 bit message digest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

SHA-256

A

SHA-2 with a 256 bit message digest

22
Q

SHA-384

A

SHA-2 with a 384 bit message digest

23
Q

SHA-512

A

SHA-2 with a 512 bit message digest

24
Q

CRAM-MD5

A

Challenge-Response Authentication Mechanism Message Digest, which is used in SMTP servers as a tool for authentication.

25
Q

Digital Signature for Nonrepudation

A

A hash of the public key encrypted by the private key.

26
Q

PKI

A

Public Key infrastructure

27
Q

ACL

A

Access Control list; Clearly defined list of permissions that specifies what an authenticated user may perform on a shared resource.

28
Q

MAC

A

Mandatory Access Control; Every resource is assigned a label that defines its security level.

29
Q

DAC

A

Discretionary Access Control; based on the idea that a resource has an owner who may at his or her discretion assign access to that resource.

30
Q

RBAC

A

Role based access Control; Defines a users access to a resource based on the roles the user plays in the network environment.

31
Q

PPP

A

Point to Point protocol; enables 2 endpoints to connect, authenticate with a user name and password and negotiate the network protocl the two devices will use.

32
Q

PAP

A

Password Authentication Protocol; simply transmits username and password in cleartext

33
Q

CHAP

A

Challenge Handshake Authentication Protocol; Relies on hashes based on a shared secret, usually a password that both end of the connection know

34
Q

MS-CHAPv2

A

The most common auth method for the few of using dial up connections

35
Q

AAA Protocol

A

Authentication, Authorization and Accounting; designed for the idea of port authentication

36
Q

Authentication from AAA

A

A computer first needs to provide some form of credential for access to the network.

37
Q

Authorization from AAA

A

Once Authenticated against a database the computer determines what it can or cannot do on the network.

38
Q

Accounting from AAA

A

The authenticating server should do some form of auditing such as logging data traffic, session action and so on.

39
Q

Two Standards of AAA

A

RADIUS and TACACS+

40
Q

RADIUS

A

Remote Authentication Dial-In Services; was created to support ISPs with hundreds if not thousands of modems in hundreds of computer to connect to a single central database.

41
Q

What 3 devices does radius consist of?

A
  1. Radius Server that has access to database of user names and password
  2. NAS (Network Access Servers)
  3. and a group of systems that in some way connect to the network
42
Q

IAS

A

Internet Authentication Service; Microsoft version of Radius that come pre-installed on windows server

43
Q

Ports that Radius uses

A

UDP ports 1812 and 1813 or 1645 and 1646

44
Q

TACACS+

A

Terminal Access Controller Access Control System Plus; used in a system with many routers and switches and it stores the ACL for all devices in a single location.

45
Q

Kerberos

A

An Authentication protocol that has no connection to PPP. Auth protocol for TCP/IP networks with many clients all connected to a single authenticating server. Microsoft adopted it as the authentication protocol for all windows networks using a domain controller.

46
Q

KDC (Kerberos)

A

Key distribution Center which has two processes

  1. Authentication Server
  2. Ticket Granting service
47
Q

IPsec

A

Internet Protocol Security is an authentication and encryption protocol suite that works at the internet/network layer.

48
Q

2 Modes of IPsec

A
  1. Transport Mode

2. Tunnel Mode

49
Q

SCP

A

Secure Copy Protocol; one of the first protocols used to transfer data securely between 2 hosts.

50
Q

SNMP

A

Simple Network Management Protocol; can tell you a number of settings on SNMP capable devices, such as CPU usage, network utilization, and detailed firewall hits.

51
Q

MIB

A

Management Information Base; an agent used to collect network infromation.

52
Q

LDAP

A

Lightweight Directory Access Protocol; tool that programs use to query and change a database used by the network.