Week 2 - Cryptography Aplications Flashcards

(51 cards)

1
Q

What is PKI (Public Key Infrastructure)?

A

a system that defines the creation, storage, and distribution of digital certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a digital signature?

A

a file that proves an entity owns a certain public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What 3 things does a certificate contain?

A
  1. Info on Public Key
  2. Registered Owner
  3. Digital Signature
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does CA stand for?

A

Certificate Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a CA responsible for?

A

storing, issuing, and signing certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does RA stand for?

A

Registration Authority
verifying the identities of any entities requesting certificates to be signed and stored with the CA (certificate authority)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does CRL stand for?

A

Certificate revocation list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does a CRL list provide?

A

a list of certificates that are no longer valid (certificate revocation list)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does the X.509 standard define?

A

defines the format of digital certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the fields are defined in a X.509 standard?

A

defines the format of digital certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the fields are defined in a X.509 standard?

A
  1. Version
  2. Serial number
  3. Certificate signature algorithm
  4. Issuer name
  5. Validity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the 9 fields defined in a X.509 certificate?

A
  1. Version
  2. Serial number
  3. Certificate signature algorithm
  4. Issuer name
  5. Validity
  6. Subject
  7. Subject public key info
  8. Certificate signature algorithm
  9. Certificate signature value
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does CRL stand for?

A

Certificate Revocation List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a certificate revocation list (CRL)?

A

distributes a list of certificates that are no longer valid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does the X.509 standard define?

A

defines the format of digital certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does HTTPS protect us on the internet?

A

encapsulates the HTTP traffic over an encrypted secure channel using TLS or SSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does HTTPS stand for?

A

HyperText Transport Protocol (Secure)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is HTTPS also called?

A

HTTP over SSL or TLS (what it uses to encapsulate traffic)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

When was SSL 3.0 deprecated?

A

2015

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is TLS?

A

Provides a secure channel for an application to communicate with the service

(that’s independent of HTTPS but is used with it)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are some examples that use TLS to secure communications? (4)

A

secure web browsing (HTTPS), email (SMTP/POP3 over TLS), online banking logins, and secure file transfers (FTPS) - any sensitive information

22
Q

What is a session key?

A

a temporary, randomly generated cryptographic key used to encrypt and decrypt data during a single communication session

23
Q

What is the session key derived from?

A

a master key using cryptographic algorithms

24
Q

How do you defend against having your session key compromised?

A

use HTTPS across their entire website and strengthen session management

25
What does SSH stand for
Secure Shell
26
What is SSH?
a network protocol that allows users to securely communicate and share data between two computers over an unsecured network
27
What protocol is most commonly used for remote login to command-line-based system?
SSH (Secure Shell), which provides a secure way to access a remote computer's shell and execute commands
28
What key does SSH use to authenticate the remote machine the client is connecting to?
the remote machine's public key
29
What is PGP?
Pretty Good Privacy, a data encryption program that allows users to securely send and receive messages and files
30
What does PGP do?
encrypts and decrypts messages, authenticates messages with digital signatures, and encrypts files
31
What is PGP commonly used in?
Email encryption, File encryption, Digital signatures, Software signing
32
How secure is PGP?
extremely safe, if used correctly and securely - uses algorithms that are considered unbreakable
33
What does VPN stand for?
Virtual private network
34
What does a VPN allow you to do?
Hide your identity, Encrypt your data, Protect your privacy, Protect business communications, Avoid surveillance, Manage your online bank accounts
35
VPN is like an ____ ____ where…
encrypted tunnel" where your internet traffic is securely channeled through a remote server
36
What is a point-to-point VPN connection?
a secure connection between two devices or networks over the internet that encrypts data to prevent it from being intercepted
37
What does IPsec stand for?
Internet Protocol Security
38
What is IPsec?
a group of protocols that encrypts and authenticates IP packets to secure communications over networks
39
What 2 modes of operations does IPsec support?
transport mode and tunnel mode
40
How does IPsec work? (the process, where is it sent)
creating a secure "tunnel" between two devices, encrypting data packets before sending them across a network
41
What’s the difference between transport mode and tunnel mode for IPsec?
Tunnel Mode provides end-to-end security by encrypting the entire IP packet, Transport Mode only encrypts the payload of the packet; Tunnel Mode is used for connecting entire networks, Transport Mode is used for host-to-host communication.
42
OpenVPN operates over either ____ or ____
UDP (User Datagram Protocol) or TCP (Transmission Control Protocol)
43
OpenVPN operates over port….?
UDP port 1194 by default, but can also use TCP port 443
44
Where is a Trusted Platform Module located?
on a computer's motherboard as a separate chip, but it can also be built into the chipset
45
How does a TPM work?
A Trusted Platform Module (TPM) is a security chip that protects a computer or mobile device by storing and using cryptographic keys, and confirming the authenticity of the device's software and firmware
46
What is remote attestation?
a security mechanism that allows a remote device to prove its identity and integrity to a remote party
47
What is data binding and sealing for TPM?
"data binding" refers to the process of encrypting data using a key generated by the TPM, essentially linking the data to that specific device, while "sealing" takes this a step further by only allowing decryption of the data if the system is in a specific configuration (like a certain set of platform measurements) at the time of decryption, effectively preventing access to the data if the system state has changed
48
What is a secure element?
a microprocessor chip that protects and stores sensitive data in a device
49
What is TEE?
Trusted Execution Environment (TEE) is a method of protecting sensitive data and operations in a device by isolating them in a secure area
50
TPMs are most commonly used to: (3)
to help protect encryption keys, user credentials, and other sensitive data.
51
What does FTE encrypt? [Full disk encryption]
all data on a disk drive, including the operating system, applications, and user data