Term
IKE
Internet Key Exchange |
|
Definition
- Internet, IPSEC, Key establishment protocol
- Partially based on OAKLEY
- Negotiate highest and fastest security between two end points
- Negotiate both hash and encryption
- key material for ISAKMP, AH and ESP
|
|
|
Term
ESP
Encapsulating Security Payload |
|
Definition
- Used to encrypt the data in the packet
- Can optionally do authentication and integrity
- Does not encrypt the headers
- Used in IPSEC transport mode.
|
|
|
Term
|
Definition
- Provides Authentication and Integrity for each packet
- Digital signature of the data
- Does not protect the data confidentuality
- Prevents replay attack
|
|
|
Term
KEA
Key Exchange Algroithm |
|
Definition
- Key agreement algrothim similer to Diffie-Hellman
- Uses 1024 bit asymetric keys
- Developed by the NSA
|
|
|
Term
SKIP
Simple Key-management for
Internet Protocols |
|
Definition
- Key distribution protocol
- Uses hybrid encryption to convey session keus that are used to encrypt data in IP packets
|
|
|
Term
|
Definition
Key clustering happens when a plaintext message generates identical ciphertext messages using the same transformation algorithm, but with different keys. |
|
|
Term
|
Definition
- Protect society, the commonwealth, and the infrastructure.
- Act honorably, honestly, justly, responsibly, and legally.
- Provide diligent and competent service to principals.
- Advance and protect the profession.
|
|
|
Term
|
Definition
Father of information security
coined terms:
Diffusion
- plain text should be spread out in the ciphertext
Confusion
- relationship between the plain text and the cipher text should be as confused (random) as possible
|
|
|
Term
|
Definition
how long it will take to break a cipher |
|
|
Term
|
Definition
the science of secure communication |
|
|
Term
|
Definition
creates messages whose message is hidden |
|
|
Term
|
Definition
the science of breaking encrypted information |
|
|
Term
|
Definition
monoalphabet cipher
16th century
Blaise de Vigenere
grid
a-z
b-a
c-d
lookup plaintext intersecion with key |
|
|
Term
|
Definition
Monoalphabet or Polyalphabet
mono
agree setting (a=k)
poly
agree turn 2 char after every 10
used in civil war
invented 1466/67 |
|
|
Term
|
Definition
One time pad
Gilbert Vernam
1917
teletype encryption
|
|
|
Term
|
Definition
crypto device using rotor
Enigma is a form of Hebern machine
SIGABA is a form of Hebern machine |
|
|
Term
|
Definition
Japanize encryption machine based on phone switch hardware
not technically a hebern machine |
|
|
Term
|
Definition
Crypto law
1947 - 1994
protect crypto from going to countries behind the iron curtain |
|
|
Term
|
Definition
replaced COCOM
controled crypto export |
|
|
Term
|
Definition
ECB - Electronic Code Book
CBC - Cipher Block Chaining
CFB - Cipher Feedback (stream)
OFB - Output Feedback
CTR - Counter Mode
EBC is orig mode.
CBC, CFB, OFB added in FIPS publication 81
CTR is newest mode added in NIST 800-38a |
|
|
Term
|
Definition
FIPS 48-3
DES 56b key 64b Block
2TDES EDE 112b key
3TDES EDE 168b key (effective 112b due to mim) |
|
|
Term
|
Definition
MD5 - 128 bit output
SHA-1 - 160 bit output
SHA-2 - 224,256,384,512 bit output
HAVAL - 128,160,192,224,256 bit output
3,4 or 5 rounds (faster than MD5) |
|
|
Term
|
Definition
FIPS 197
Finalists: MARS, RC6, Rijndael, Serpent, twofish
one block (128 bits) is call the state (4x4 array)
SubBytes: confusion
ShiftRows: dissusion
MixColumns: diffusion
AddRoundKey: XOR
|
|
|
Term
|
Definition
- Class 1/Level 1 for individuals, intended for email, no proof of identity
- Class 2/Level 2 is for organizations and companies for which proof of identity is required Level 2 certificates verify a user's name, address, social security number, and other information against a credit bureau database.
- Class 3/Level 3 is for servers and software signing, for which independent verification and checking of identity and authority is done by the issuing certificate authority
- Class 4 for online business transactions between companies
- Class 5 for private organizations or governmental security |
|
|
Term
|
Definition
US EU Material Suppression Agent
A A Wood/Paper Water or Soda Acid
B B Liquid Gas Suppression or Soda H20
B C Flamable Gas Ditto
C E Electrical Gas Suppression
D D Metals Dry Powder
K F kitchen (oil/fat) Wet Chemicals |
|
|
Term
|
Definition
Water: Lower temperature
Soda Water: Lower temperature and starve Oxygen
Dry Powder: Lower temperature and starve Oxygen
Wet Chemical: Lower temperature
CO2: remove Oxygen
Halon: Chemical Reaction to remove consume energy and lower temperature |
|
|
Term
|
Definition
Orange: 135f/75c
Red: 155f/68c
Yellow: 175f/79c
Green: 200f/93c
Blue: 286f/141c
Magnetic media damage @ 100f
Disk Drive Damage at 150f
Computer damage @ 175f
Paper damage @350f |
|
|
Term
|
Definition
Argon Argonite
FM-200 (HFC-227) NAF-S-111
Inergen (IC-541) CEA-410
FE-13
FE-13 is newest and safe up to 30% consentration, most of the others are only save at 10-15% |
|
|
Term
Data Mining
Knowledge Discovery in Database (KDD)
Three Approaches |
|
Definition
- Classification - Data is grouped according to shared similarities
- Probabilistic - Data interdependencies are identified and probabilities are applied to their relationships
- Statistical - Identifies relationships between data elements and uses rule discovery
|
|
|
Term
Cleanroom development model |
|
Definition
Strict testing proceedures
high quality product is output
Formal Development and Testing process
|
|
|
Term
|
Definition
- Initial
- Repeatable
- Defined
- Managed
- Optimizing
|
|
|
Term
Programming Language
Generations |
|
Definition
- Machine Language
- Assembly Language
- High Level Language
- Very High Level Language
- AI and Natural Language
|
|
|
Term
|
Definition
- Application
- Host to Host (or Transport)
- Internet
- Network Access
|
|
|
Term
|
Definition
- T1 - 1.544 Mbps (24 channels @ 64Kbps)
- T3 - 45 Mpbs (28 T1s)
- ISDN (BRI) 144Kbps
Note E1 (Europe) is 2Mbps (32 channels @ 64KBps 2 reserverd for singnal and control) |
|
|
Term
ISDN
Integrated Services Digital Network |
|
Definition
- BRI - Basic Rate Interface
- PRI - Primary Rate Interface
- B Channel (Bearer) - Data (64K)
- D Channel (Delta) - Signaling (16bit)
BRI = 128k (2B + 1D)
PRI Delivered over T1 (1544k) or E1 (2048k). |
|
|
Term
|
Definition
Digital Subscriber Line
- Always on
- Voice and Data (data on higher freq), requires filter on premise
- 256k to 40Mbps
Voice Coils on line disrupt it. Limites use as voice coils were needed for voice quality.
ASDL 18000 ft 1.5-9m down, 16-640k up
SDLS 10000 ft 1.544m single pair
HDSL 12000 ft 1.544m two pairs
VDSL 1000 - 4500ft 13-52m down, 1.5-2.3m up |
|
|
Term
|
Definition
- 128 bit address
- Auto config
- IPSec built in
|
|
|
Term
|
Definition
Please do not throw sausage pizza away
- Physical
- Data Link
- Network
- Transport
- Session
- Presentation
- Application
|
|
|
Term
|
Definition
describes how signal travels across the wires (arranged by physical topology)
Ethernet ATM Token Ring HDLC FDDI ISDN
X.25 |
|
|
Term
Ethernet Copper Cable Standards |
|
Definition
- thinnet - 10 base2 (10 mbps) coax
- 200 meters (185 real) 607 ft Tconn
- thicknet - 10 base5 (10 mbps) coax
- 500 meters 1600 ft
- Nconn or tap (no t). 2.5m markers
- USTP - 10 base t (10 mpbs)
- 100 base t (100 mpbs)
- 1000 base t (gigibit)
|
|
|
Term
|
Definition
- 1 std telephone
- 2 <4mbps EIA/TIA 586
- 3 10mbps
- 4 16mbps
- 5 100mbps
- 6 (5e) 1gbps
100m 330f is max len (55 cat6 unless cat6a) |
|
|
Term
|
Definition
Extensible authentication protocol
extension of PPP
RFC 2284 |
|
|
Term
|
Definition
High level Data Link Control
layer 2 (data link)
NRM - Normal Response Mode - Primary station starts all conversations (SDLC only supports this mode)
ARM - Async Response Mode - Secondary stations can start conversations - Primary still responsible for error, link setup, link termination
ABM - Async Balanced Mode - equal responsibilities, duplex |
|
|
Term
|
Definition
Point to Point Tunneling Protocol
Works over IP Only
Can encapsulate non IP |
|
|
Term
|
Definition
Layer 2 Tunneling Protocol
Works over many protocol (not just IP)
Newest |
|
|
Term
|
Definition
Point to Point Protocol
Network Access Layer of TCP/IP Model
|
|
|
Term
|
Definition
Internet Group Management Protocol
Multicast management
Station informs router that it is part of a multi-cast group so router knows to forward packets for the group
|
|
|
Term
|
Definition
- Critical - Minutes to Hours
- Urgent - 24 hours
- Important - 72 hours
- Normal - 7 days
- Non-essential - 30 days
|
|
|
Term
|
Definition
- catastrophe - Long term, weeks, months, years
- Earthquakes, etc - Facility distroyed
- Disaster - Day or longer
- non-disaster - Less than a day
|
|
|