Week 07 - Secure Data Transmission (L17-L20) Flashcards

1
Q

What is encryption?

A

Modify data in a way that only the correct recepient can read the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which three things are recquired for encryption?

A

Data, key, encryption algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Cryptography?

A

Is the science of data encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is VPN?

A

Virtual Private Network. Allows secure communication over an insecure network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Explain what is meant by a social engineering attack on a password.

A

Psychological manipulation / Technique to bring a person to a point to tell sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the two main encryption methods? Explain Adv/Disadv?

A
  • Secrect key
  • Public Key
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a VPN concentrator?

A

Dedicated device for a VPN endpoint. Isolates encryption/decryption method to this device. Very CPU intense.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why is encrpytion used (4 reasons)?

A

Confidentiality: data can only be read by correct person

Integrity: data has not been changed

Authentication: Recipient can verify that messages is from correct sender

Nonrepudiation: Sender cannot deny sending the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are two authentication methods for VPN?

A

IPSec, SSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Point to Point link?

A

A connection between to single network nodes. Can be computers or routers. Used for example with VPN to create a secured encrypted channel between to routers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Name some VPN protocols

A

IPSec, SSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is TLS and How does key establishment works in TLS?

A

Transport Layer Security, used for https traffic. Public key is used to exchange secret key. Different secret key for each session => Session key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How do digital signatures work? What is the main risk and how is it solved?

A

Sender creates hash with his private key, Recepient can create hash with public key of sender.; Risk: man-in-the-middle; Solution: Trusted third party to ensure authenticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Describe encoding, encryption and hashing?

A

Encoding: Encoding data is a processing of transform data from one form to another. E.g. convert ASCII to unicode or hex numbers.

Encryption: Data protection by applying a mathematical algorithm.

Hashing: Creation of a checksum.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly