Term
|
Definition
Involves replacing units in the plaintext with different ciphertext. Typically rotates or scrambles letters of the alphabet. |
|
|
Term
|
Definition
Units in this cipher stay the same in plaintext and ciphertexr but their order is changed, according to some mechanism. |
|
|
Term
|
Definition
Any cipher implemented using a machine |
|
|
Term
|
Definition
Depends on the fact that some letters and groups of letters appear more frequently in natural language than others. Substitution and transposition are vulnerable to cracking by this analysis. Still used in modern cryptanalysis |
|
|
Term
|
Definition
based on mathematical algorithms ro perform extremely complex transpositions and substitutions. |
|
|
Term
|
Definition
increases security of the encryption process, a message cannot be decrypted without knowledge of the specific key even if the cipher method is known |
|
|
Term
|
Definition
range key values available to use with an algorithm, equivalent to 2 to the power of the size of the key. |
|
|
Term
|
Definition
is an encryption key itself. consists of exactly the same amount of characters as the plaintext and must be generated by a truly random algorithm. hardest key to break |
|
|
Term
|
Definition
developing field of cryptography and cryptanalysis based on quantum physics. |
|
|
Term
Secure Hash Algorithm (SHA) |
|
Definition
Developed by the NSA to address weaknesses in MDA. SHA-1 160-bit digest SHA-2 using longer digests (up to 512 bits) |
|
|
Term
Message Digest Algorithm (MDA) |
|
Definition
MD5 128-bit hash not as secure as SHA-1 but performs better in popular OS |
|
|
Term
|
Definition
RIPEMD-160 offers similar performance and encryption strength to SHA-1 |
|
|
Term
|
Definition
Plaintext is divided into equal-size blocks(usually 64- or 128-bit). If there is not enough data in the plaintext, it is padded to the correct size using some string defined by the algorithm |
|
|
Term
|
Definition
the key should not be derived from the ciphertext. uses substitution units called S-boxes, each S-box operates differently and is determined by the key |
|
|
Term
|
Definition
if any one bit of plaintext is changed, half of them should change as a result |
|
|
Term
|
Definition
each bit or byte of data in the plaintext is encrypted one at a time. this is not predetermined but calculated from the key |
|
|
Term
Data Encryption Standard (DES/3DES) |
|
Definition
uses 64-bit block cipher and a 56-bit key. 3DES is encrypted 3 times using different keys(typically key1 then key2 and then key1 again) |
|
|
Term
Advanced Encryption Standard (AES) |
|
Definition
uses 128-bit block cipher and 128-, 192-, or 256-bit key |
|
|
Term
|
Definition
RC4 is a stream cipher uses a variable length key(40 to 2048-bit). RC5 is a block cipher(32-, 64-, or 128-bit) |
|
|
Term
International Data Encryption Algorithm (IDEA) |
|
Definition
64-bit block and 128-bit key. |
|
|
Term
|
Definition
64-bit block and 32-448 bit key |
|
|
Term
|
Definition
128-bit block and up to a 256 bit key |
|
|
Term
|
Definition
64-bit block 40-128 bit key |
|
|
Term
|
Definition
uses a single secret key to encrypt and decrypt data. |
|
|
Term
|
Definition
public key is used to decrypt data while a secret private key is used to encrypt data |
|
|
Term
|
Definition
group 1 (768-bit) group 2 (1024-bit) group 5 (1536-bit) group 2048 (2048-bit) |
|
|
Term
|
Definition
block sizes and key lengths are variable according to the application, with larger keys offering more security. |
|
|
Term
Elliptic Curve Cryptopgraphy (ECC) |
|
Definition
algorithm for low power devices such as cell phones and PDAs |
|
|
Term
|
Definition
used to prove the identity of the sender of a message |
|
|
Term
|
Definition
does not protect the contents of a message, provides a layer of confidentiality |
|
|
Term
|
Definition
The process of using both a secret-key and public key |
|
|
Term
|
Definition
made for 2 reasons: *to decipher encrypted data without authorization *to impersonate a person or organization by appropriating their digital signature or certificate |
|
|
Term
|
Definition
attempts every possible combination in the key space in order to derive a plaintext from a ciphertext. keyspace is determined by the number of bits used |
|
|
Term
|
Definition
guesses the likely value of the plaintext by enumerating values in the dictionary rather than attempting to compute every possible value |
|
|
Term
|
Definition
uses a precomputed lookup table of all possible passwords and their matching hashes |
|
|
Term
|
Definition
a key may be generated from a password, if the password is weak, an attacker may be able to guess or crack the password to derive the key |
|
|
Term
|
Definition
by studying physical properties of the cryptographic system, information may be deduced about how it works |
|
|
Term
|
Definition
the container document or file is called the covertext.
obscures the presence of a file within a file, information is usually embedded where you would not expect to find it. |
|
|
Term
|
Definition
users trust certificates issued by that CA and no other disadvantage: restricted to users in a single organization(cannot model different relationships between user groups) |
|
|
Term
|
Definition
Single CA(root) issues certificates to a number of intermediate CAs which issue certificates to leaf CAs which issue certificates to users. advantage: Root can have multiple policies; disadvantage: single point of failure |
|
|
Term
|
Definition
each root CA can issue certificates to other CAs and trust certificates issued by these CAs advantage: cross-certification; disadvantage: not scalable to a large number of CAs |
|
|
Term
|
Definition
root CAs can establish a trust relationship through an intermediate bridge CA |
|
|
Term
|
Definition
users sign one anothers certificates, there is no need for central administration so the system has to be self-policing to weed out malicious users. |
|
|
Term
|
Definition
the server authenticates to the client and the client authenticates to the server |
|
|
Term
|
Definition
spoofing a website to imitate a target bank or ecommerce providers secure website, then emailing users of the genuine website informing them that their account must be updated, supplying a disguised link that actually leads to their spoofed site. |
|
|
Term
|
Definition
a phishing attack that is done over a voice channel(telephone or VoIP) |
|
|
Term
|
Definition
a phishing scam where the attacker has some information that makes the target more likely to be fooled by the attack |
|
|
Term
|
Definition
redirecting users from a legitimate website to a malicious one. |
|
|
Term
|
Definition
program desgined to replicate and spread amongst computers, usually by "infecting" executable applications or program code |
|
|
Term
|
Definition
memory-resident viruses that replicate over network resources |
|
|
Term
|
Definition
waits for a preconfigured time or date or system or user event to trigger |
|
|
Term
|
Definition
program or script designed to spawn a large number of processes |
|
|
Term
|
Definition
program that pretends to be something else. many function as a backdoor application |
|
|
Term
|
Definition
monitors user activity and sends the information to someone else |
|
|
Term
|
Definition
any type of software or browser plug-in that displays advertisments |
|
|
Term
|
Definition
hard to detect trojan, changes core system files, often at the kernel level, so that GUI browsers and scanning tools no longer reveal their presence, they also contain tools for cleaning system logs |
|
|
Term
|
Definition
an access method that is installed without the user knowledge, or a hole in software applications from testing or misconfiguration |
|
|
Term
|
Definition
unsolicited email meassages |
|
|
Term
|
Definition
spam over instant messaging or VoIP |
|
|
Term
|
Definition
software that uses a database of known virus patterns plus heuristic malware identification techniques to try to identif infected files and prevent viruses from spreading |
|
|
Term
|
Definition
intercepts commands from anti-virus software and passes the software a clean version of the file; or jump from file-to-file ahead of the virus scanner |
|
|
Term
|
Definition
polymorphic or metamorphic virus attempts to change itself to avoid detection |
|
|
Term
|
Definition
the virus code is protected, making it difficult for anti-virus software to analyze it |
|
|
Term
|
Definition
seeks to disable the anti-virus software |
|
|
Term
slow and sparse infectors |
|
Definition
replicate slowly to stay under the radar |
|
|
Term
|
Definition
application = application presentation = application session = application transport = transport network = internet data link = link/network interface physical = link/network interface |
|
|
Term
link/ network interface layer |
|
Definition
defines the hosts connection to the network. comprised of the hardware and software involved in the interchange of frames between computers |
|
|
Term
|
Definition
provides addressing and routing functions, uses a number of protocols to ensure the delivery of packets |
|
|
Term
|
Definition
provides communication between the source and destination computers and breaks application layer information into segments. |
|
|
Term
|
Definition
the layer at which most tcp/ip services protocols are implemented |
|
|
Term
footprinting and fingerprinting |
|
Definition
an attack that tries to learn the configuration of a network while fingerprinting targets a specific host |
|
|
Term
|
Definition
an attack where the attacker imitates some sort of resource that the victim thinks is genuine |
|
|
Term
|
Definition
the attacker captures data packets that contain authentication data and resends the packet to try to re-establish the session |
|
|
Term
|
Definition
an attack where the attacker sits between two communicating hosts, and transparently monitors, captures, and relays all communication between the hosts |
|
|
Term
|
Definition
an attack that cause a service at a given host to fail or become unavailable to legitimate users |
|
|
Term
|
Definition
a DoS attack that is launched from multiple computers, usually done because the attackers resources could be far less than those of the victim |
|
|
Term
|
Definition
|
|
Term
|
Definition
a computer that is used to distribute a DoS attack |
|
|
Term
|
Definition
used to facilitate eavesdropping. 2 main functions: traffic analysis, and packet capture/analysis/transmission |
|
|
Term
|
Definition
another redirection attack, but it aims to corrupt the records held by the DNS server |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Firewall port for remote desktop |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
currently considered the strongest type of authentication. protected against sniffing, password-guessing(dictionary), and man-in-the-middle attacks |
|
|
Term
|
Definition
used in most wireless network authentication products. protected against sniffing, password-guessing(dictionary), and man-in-the-middle attacks. cheaper than EAP-TLS |
|
|
Term
|
Definition
cisco's proprietary version of EAP. vulnerable to password-guessing(dictionary attacks). |
|
|
Term
|
Definition
a secure hash of a user password. cannot provide mutual authentication. not suitable for use over insecure networks; vulnerable to man-in-the-middle attacks |
|
|
Term
|
Definition
means that certain information should only be known to certain people |
|
|
Term
|
Definition
means that the data is stored and transferred as intended and that any modification is authorized |
|
|
Term
|
Definition
means that information is accessible to those authorized to view or modify it |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
gives oversight of the information system |
|
|
Term
|
Definition
probes a router by setting flags in a TCP packet all at once |
|
|
Term
|
Definition
subverts the TCP handshake process by withholding the client's ACK packet. |
|
|
Term
|
Definition
an attacker generates a large number of HTTP requests or SMTP mail messages designed to overwhelm the server |
|
|
Term
|
Definition
the client spoofs the victim's IP address and pings the broadcst address of a third-party network, each host directs its echo responses to the victim server |
|
|
Term
|
Definition
works by broadcasting unsolicited ARP reply packets, the recieving devices trust this communication and update their MAC:IP address cache table with the spoofed address |
|
|
Term
|
Definition
compromises the victim's DNS server; replaces valid IP addresses for a trusted website with the attacker's IP address |
|
|
Term
|
Definition
redirection attack that aims to corrupt the records held by the DNS server itself to redirect traffic for a |
|
|