Securing TCP/IP Flashcards

1
Q

Integrity

A

Process that Guarantees that the data received is the same as originally sent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Nonrepudiation

A

A person cannot deny he or she took a specific action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Authentication

A

Verify that whoever is trying to access the data is the person you want accessing it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Authorization

A

What an authenticated person can do with the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ciphertext

A

When you run cleartext through a cipher algorithm using a key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Symmetric Key Algorithm

A

When you use the same key to encrypt and decrypt the encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Asymmetric Key Algorithm

A

When you use different keys for encrypting and decrypting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Block Ciphers

A

Encrypt data in chunks of a certain length at a time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DES

A

Data Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DES Definition

A

used 64 bit block and 56 bit key. Outdated form of block cipher.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Stream Sipher

A

Takes a single bit at a time and encrypts on the fly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

RC4

A

Rivest Cipher 4 - very fast stream cipher that was used mostly in wireless. Stopped being used around 2013 due to weakness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

AES

A

Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

AES definition

A

Used by almost all TCP/IP applications and is a block cipher that uses 128bit block size and 128, 192, or 256 bit key size.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Public Key Cryptography

A

Primary Asymmetric implementation of security, most common in RSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Integrity Hash Function

A

mathematical function that you ru n on a string of binary digits of any length that results in a value of some fixed length.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

File Hashing

A

Hashing the contents of a file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

MD5

A

Message Digest Algorithm version 5, creates a 128 bit message digest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

SHA

A

Secure Has Algorithm is the primary family of cryptographic hash functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

SHA 224

A

SHA-2 with a 224 bit message digest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

SHA-256

A

SHA-2 with a 256 bit message digest

22
Q

SHA-384

A

SHA-2 with a 384 bit message digest

23
Q

SHA-512

A

SHA-2 with a 512 bit message digest

24
Q

CRAM-MD5

A

Challenge-Response Authentication Mechanism Message Digest, which is used in SMTP servers as a tool for authentication.

25
Digital Signature for Nonrepudation
A hash of the public key encrypted by the private key.
26
PKI
Public Key infrastructure
27
ACL
Access Control list; Clearly defined list of permissions that specifies what an authenticated user may perform on a shared resource.
28
MAC
Mandatory Access Control; Every resource is assigned a label that defines its security level.
29
DAC
Discretionary Access Control; based on the idea that a resource has an owner who may at his or her discretion assign access to that resource.
30
RBAC
Role based access Control; Defines a users access to a resource based on the roles the user plays in the network environment.
31
PPP
Point to Point protocol; enables 2 endpoints to connect, authenticate with a user name and password and negotiate the network protocl the two devices will use.
32
PAP
Password Authentication Protocol; simply transmits username and password in cleartext
33
CHAP
Challenge Handshake Authentication Protocol; Relies on hashes based on a shared secret, usually a password that both end of the connection know
34
MS-CHAPv2
The most common auth method for the few of using dial up connections
35
AAA Protocol
Authentication, Authorization and Accounting; designed for the idea of port authentication
36
Authentication from AAA
A computer first needs to provide some form of credential for access to the network.
37
Authorization from AAA
Once Authenticated against a database the computer determines what it can or cannot do on the network.
38
Accounting from AAA
The authenticating server should do some form of auditing such as logging data traffic, session action and so on.
39
Two Standards of AAA
RADIUS and TACACS+
40
RADIUS
Remote Authentication Dial-In Services; was created to support ISPs with hundreds if not thousands of modems in hundreds of computer to connect to a single central database.
41
What 3 devices does radius consist of?
1. Radius Server that has access to database of user names and password 2. NAS (Network Access Servers) 3. and a group of systems that in some way connect to the network
42
IAS
Internet Authentication Service; Microsoft version of Radius that come pre-installed on windows server
43
Ports that Radius uses
UDP ports 1812 and 1813 or 1645 and 1646
44
TACACS+
Terminal Access Controller Access Control System Plus; used in a system with many routers and switches and it stores the ACL for all devices in a single location.
45
Kerberos
An Authentication protocol that has no connection to PPP. Auth protocol for TCP/IP networks with many clients all connected to a single authenticating server. Microsoft adopted it as the authentication protocol for all windows networks using a domain controller.
46
KDC (Kerberos)
Key distribution Center which has two processes 1. Authentication Server 2. Ticket Granting service
47
IPsec
Internet Protocol Security is an authentication and encryption protocol suite that works at the internet/network layer.
48
2 Modes of IPsec
1. Transport Mode | 2. Tunnel Mode
49
SCP
Secure Copy Protocol; one of the first protocols used to transfer data securely between 2 hosts.
50
SNMP
Simple Network Management Protocol; can tell you a number of settings on SNMP capable devices, such as CPU usage, network utilization, and detailed firewall hits.
51
MIB
Management Information Base; an agent used to collect network infromation.
52
LDAP
Lightweight Directory Access Protocol; tool that programs use to query and change a database used by the network.