Security Fundamentals Flashcards

1
Q

What does AAA stand for?

A

Authentication, Authorization, Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does CIA stand for?

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Explain Confidentiality

A

Information NOT available or disclosed to unauthorized parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Explain integrity

A

Information NOT modified by unauthorized parties or in an unauthorized manner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Explain Availability

A

Information available when needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Explain Authentication

A

Assurance of identity claim.
Ex login, digital certificates, location, token/phone, ID cards

Something you know, something you have, something you are, somewhere you are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explain Authorization

A

Grant or deny access to resource operations over resources (once authenticated)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Explain Accounting

A

Keeping track of information, users or data. (Building & storing log data)

Important for auditing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Explain ”Cryptography” and ”Encryption”

A

Cryptography is the science of concealing messages with a secret code

Encryption (method) is the way to encrypt and decrypt data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Explain Symmetric encryption

A

Uses the same key for encryption and decryption

Amount of keys formula:
(n^2 - n)/2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Explain Asymmetric encryption

A

Uses a public key for encryption and a private key for decryption

Amount of keys formula:
2n

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Explain Symmetric authenticated encryption

A

The same as symmetric encryption but also an extra private one to sign

Amount of keys formula:
(n^2-n)/2 + n

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is digital certificates

A

A file or electronical password that proves the authenticity of a device, server or user through the use of cryptography and public key infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What do authenticated encryption provide:

A

Confidentiality & integrity

(& authentication ofc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Types of digital certificates

A

Domain validation -> least secure
Organization validation
Extended validation -> most secure, most requrenments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the problem with digital certificates

A

Everyone can get a certificate. But people think that it is authentication. It is only to secure connection, not act as authentication. People will think that a sketchy site is a good site because of the lock

17
Q

Explain Pretty Good Privacy

A

When a user wants to send a message, PGP generates a random symmetric key, often referred to as a session key. This symmetric key is used to encrypt the actual message using a symmetric encryption algorithm. Next, PGP uses the recipient’s public key to encrypt the symmetric key. Both the encrypted message and the encrypted symmetric key are then sent to the recipient.

Upon receiving the message, the recipient uses their private key to decrypt the symmetric key. Once the symmetric key is decrypted, it is used to decrypt the actual message. This combination of symmetric and asymmetric encryption in PGP provides a secure and efficient way to transmit private messages

18
Q

Explain Authenticated symmetric encryption

A

Bob and Alice agree upon two shared keys. First one is used to encrypt and the second one is used to provide authentication (hash the encrypted message)

When Bob receives the encrypted message and digest from Alice, he also uses the second key to hash the encrypted message and compares his digest with the received digest from Alice. If they match Bob knows the message is from Alice.