Security Architecture Domain 3 Flashcards
Functions such as MDS, SHA-256, and the new SHA-3 are used for
integrity to protect against unauthorised modification of data
The four fundamental goals of cryptography
Confidentiality
Integrity
Authentication
Non-repudiation
ISO/IEC 18033-2:2006 specifies
encryption systems
(ciphers) for the purpose of data confidentiality
ISO/IEC 11770-1:2010 defines
a general model of key management that is independent of the use of any particular cryptographic algorithm
ISO 11568 series specifies
the principles for the management of keys used in cryptosystems implemented within the retail-banking environment
ISO/IEC 13888 is applicable when
non-repudiation is required for key management
Messaging security standards include:
Secure Multi-Purpose Internet Mail Extensions (S/MIME):
Privacy-Enhanced Mail (PEM) PEM was never widely used for securing e-mail
Only PEM’s definition of header field format (PEM format) has
found use as a common means of representing digital certificates
in ASCII form.
Pretty Good Privacy (PGP)
Secure Multi-Purpose Internet Mail Extensions (S/MIME):
This extension of the MIME standards that specify e-mail formatting and encapsulation adds encryption of message content. S/MIME also uses a hashing algorithm for message integrity, public key certificates for message authentication, and digital signatures to
provide non-repudiation of origin”.
PGP provides message authentication
by binding a public key to an e-mail address where the public
key is
distributed to a community of users who trust each other, commonly known as a web of trust.
IPSec includes two protocols
Authentication Header (AH) and Encapsulating Security Protocol (ESP).
AH: Authentication Header provides data origin authentication and data integrity but does not provide
confidentiality for the IP payload and header that it protects.
ESP Encapsulating security policy, provides data origin authentication and data integrity, and it offers …
confidentiality for the payload it protects
Secure TCP/IP communication is not limited to IPSec. What else are additional cryptographic protocols that provide communications security for TCPIP
Transport Layer
Security (TLS) and its predecessor, Secure Sockets Layer (SSL)
VPNs are implemented in the following architectures:
- Remote Access VPN
- Site-to-Site VPN:
- Extranet VPN: when one or more
separate organizations are connecting to that organization over IP.
By default, PPP does not provide any security or rely on any cryptographic controls. However, PPP does include
an optional authentication phase and an optional encryption feature, PPP Encryption Control Protocol (ECP)
SSH operates at the _____ layer of the OSI model
application layer
The most commonly used family of standards for Wireless Local Area
Networks (WLANs) is Institute of Electrical and Electronics Engineers (IEEE)
802.11’7. 802.11 originally relied on the ___________1________ security method to provide confidentiality and integrity. _____1_________
insecure due to the way it implements its ______2_________ algorithm
1 Wired Equivalent Privacy (WEP)
2 RC4 stream cipher
Prior to the introduction of
802.1li, the Wi-Fi Alliance, a global nonprofit industry association, created
a protocol and certification program for wireless network components known
as _____1________, based on ___________
Wi-Fi Protected Access (WPA)
a draft of IEEE 802.11i,
The biggest difference between WPA and the 802.11i draft is that
WPA does not require support for the Advanced Encryption Standard (AES)
strong encryption algorithm. WPA allows many existing IEEE 802.11 hardware components that cannot support the computationally intensive AES encryption.
WPA2 certification is based on
the mandatory elements of the IEEE 802.11i standard, but there are some
differences. WPA2 extends its certification program to include
interoperability with a set of common Extensible Authentication Protocol (EAP) methods.
Bluetooth optionally encrypts, but does not provide
integrity protection for the transmitted data.
True or false, it is easy to modify a transmitted bluetooth packet without being detected
True because only a simple CRC is added to each packet
In version 2.0 and earlier of
the Bluetooth specification, pairing is performed over a non-encrypted channel,
allowing
a passive eavesdropper to compute the link key used for encryption.
Version 2.1 of bluetooth introduced the use of
Elliptic Curve Diffie-Hellman (ECDH) public
key cryptography, which can be utilized by Bluetooth device developers for
protection against a passive eavesdropping attack