Securing TCP/IP Chapter 10 Flashcards

1
Q

Define Remote Authentication Dial-in User Service (RADIUS)

A

System that enables remote users to connect to a network services (dialup)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define Kerberos

A

Open authentication standard best known for serving as the authentication protocol in Windows domains

Authentication Protocol for TCP/IP networks with many clients all connected to a single authenticating server. Has no connection to PPP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define Encryption

A

Process that attempts to make some data unreadable to anyone but the owner or intended recipients. Generally the data is scrambled and unscrambled with cryptographic keys. Encryption plays a critical role in securing traffic set across open networks such as the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define Integrety

A

Protecting data from being changed or deleted without authorization. In networks integrity is mainly verified with checks that ensure data sent to a recipient is unchanged when it its received at the destination host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define Nonrepediation

A

Not being able to deny having sent a message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define Authentication

A

Process of verifying credentials of user attempting to access a system. Most common set of credentials are user name and password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define Authorization

A

A step in the AAA philosophy during which clients permissions are decided upon. Having access to only what you need access to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define Symmetric Key Encryption

A

Any encryption method that uses the same key for both encryption and decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define Asymmetric Key Encryption

A

Encryption method in which the key used to encrypt a message and the key used to decrypt it are different or Asymmetrical.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define Hash

A

Fix length value that a hash function computes from its input. Hashes have many important jobs in computing but in networking they are primarily used for authentication and ensuring data integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define Digital Signature

A

A hash of a message which has been encrypted and attached to the message. The hash is encrypted with the signers private key. The recipient can decrypt the hash and use with he signers public key and use the hash to confirm the message was not altered. Verifies senders identity and integrity of the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define Certificate

A

Digitally sign electronic document issues by a trusted third party, a certificate authority (CA), attesting to the identity of the holder of a specific cryptographic public key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define Public Key Infrastructure (PKI)

A

System for creating and distributing digital digital certificates issues by trusted third parties such as DigiCert GoDaddy or Sectigo

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are Network Access Controls (NAC) used for?

A

Usually prevents computers lacking antimalware and patches from accessing the network. Also creates policy which are separate from windows policy’s that define what individual systems can do on the network. Including network access, segregation of portions of the network, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What makes up AAA ?

A

Authentication, Authorization and Accounting

Security philosophy where in a user trying to connect to a network must first present some form of credential in order to be authenticated and then must have limitable permissions within the network. The authenticating server should also record session information bout the client.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define Accounting

A

Accounting keeps track of user activity while users are logged in to a network by tracking information such as how long they were logged in, the data they sent or received, their Internet Protocol (IP) address, the and the different services they accessed.

17
Q

Define Point-to-Point Protocol (PPP)

A

A protocol that enables two devices to connect, authenticate with the user name and password, and negotiate the network protocol the two devices will use

18
Q

Define MS-CHAP V2

A

Microsoft’s dominants variation of the CHAP protocol, uses a slightly more advanced encryption protocol. Most security in regards to PAP, CHAP and MS-CHAP

19
Q

Define Challenge Handshake Authentication protocol (CHAP)

A

A remote access authentication protocol. Has the serving system challenge the remote client, which must provide an encrypted password.

20
Q

Define Password Authentication Protocol (PAP)

A

The oldest and most basic form of authentication and also the least safe because it sends passwords in clear text.

21
Q

Define a Network Access Server (NAS)

A

System that controls the modems in a RADIUS network.

22
Q

Define Terminal Access Controller Access Control System + (TACACS+)

A

Cisco protocol to support AAA in a network with many routers and switches. It is similar to RADIUS in function, but uses TCP Port 49 by default and separates AAA into different parts.

23
Q

Define Key Distribution Center (KDC)

A

System for granting authentication in Kerberos. The KDC stores secret keys for users and services

24
Q

Define Authentication Server

A

In Kerberos the system that authenticates but does not authorize the client after verifying the submitted credentials, the server gives the client ticket-granting ticket.

25
Q

Define Ticket-Granting Ticket (TGT)

A

Sent by an authentication server in a Kerberos setup, if the credentials match sent by the client match those in its database, the client uses the TGT to request authorization for network resources from the Ticket Granting Server

26
Q

Define Secure Shell (SSH)

A

Terminal emulation program that looks like Telnet but encrypts the data. SSH has replaceed Telnet on the internet.

27
Q

Define SSH Tunnel

A

Encrypted link between SSH Processes on two sepereate computers. Once an SSH link between a server and a client is established, anything you enter into the client application is encrypted sent to the server decrypted and then acted upon.

28
Q

Define Tunnel

A

Encrypted link between two programs from two separate computers

29
Q

Define Secure Sockets Layer and Transport Layer Security SSL/TLS

A

SSL is a protocol developed by Netscape for securing websites. Final version was 3.0 before the name was changed to TLS.

TLS hosts used public key cryptography to secure securely negotiate a cypher and symmetric key over an unsecure network, and symmetric key to encrypt the rest of the session.

30
Q

Define Internet Protocol security (IPsec)

A

Network layer encryption protocol

31
Q

Define Secure Copy Protocol (SCP)

A

One of the first programs to use SSH to send encrypted data, might have replaced FTP if it didnt have some flaws

32
Q

Define SSH File Transfer Protocol (SFTP)

A

Replacement for FTP released after many of the inadequacies of SCP such as inability to see files on other computer.

AKA Secure STP

33
Q

Define Simple Network Managment Protocol (SNMP)

A

Set of standards for communications with network devices such as switchs, routers, waps connected to TCP/IP Network. Used for network management.

34
Q

Define Lightweight Directory Access Protocol (LDAP)

A

Protocol used to query and change a database used by the network. Uses TCP Port 389 by default