Term
name some three predecessor technologies to web services |
|
Definition
CGI, RMI (remote machine), remote procedure calls, Dcomm(microsoft distributed) |
|
|
Term
|
Definition
internet api, executed on a remote machine |
|
|
Term
what language is a webservice request and response messages made in |
|
Definition
xml, extensible markup language |
|
|
Term
what is W3C and what does it have todo with web service? |
|
Definition
world wide web consortium and come up with standards, def of webs services |
|
|
Term
name 3 predecessor technologies to the web |
|
Definition
cgi (but not really) java rmi remote procedure calls soap dcomm |
|
|
Term
how do u request a web service in VB? |
|
Definition
write a method in access a service |
|
|
Term
know how to generate using a public and private keys |
|
Definition
find 2 prime numbers, p=3, q=7 n = p*q find phi(N) =3-1 * 7-1 = 2*6 = 12 fine e&d so that e*d = 1 mod phi(N), e *d = 1 mod 12\ (e*d_/13, 25, e = 5, d = 5 encrypt: 2^5 mod 21 = 32 mod 21 = 11 decrypt 11^ 5 mod 21 = 2 *a^phi(n) = 1 mod N -> oliers theorem, a and N must be relatively prime *message should be smaller and p & q *multiplecharactersAB, (26^2) + 2 |
|
|
Term
know how to encrypt using public and private keys |
|
Definition
*2 <-- 2^5 mod 21 32 mod 21 = 11 11^5 mod 21 = 2 |
|
|
Term
|
Definition
a number used to mix into the data to encrypt or decrypt the data |
|
|
Term
what kind of key should be used for maximum security |
|
Definition
the same length as the message your are encoding, should only be used once |
|
|
Term
what is the difference between symmetric and asymmetric keys? |
|
Definition
symmetric is encrypted/decrypted with the same key asymmetric is encrypted/decrypted with other different keys |
|
|
Term
how are keys exchanged using diffie-hellman key exchange? |
|
Definition
M,N M^a mod N, M^b mod N, *m^b mod N(^a is the symmetric key M(large number(*user1) sends M,N to another user(user2) *user1)generates A, generated M^a mod n send to user 2 (user2) recieves M^b mod N and raise it to the power of a , generates M^ab mod N (key) (user1) revieves M^b mod N takes M^b mod N and raises ittothe powerof b generate M^ab mod N (key) your key is M^ab mod N |
|
|
Term
how do digital signatures work? |
|
Definition
sign a some sort of data using a "website" public key and then verifying that information with their private key *take the message *problems: message could get corrupted in transition and not match |
|
|
Term
how can public key encryption be used to ensure data integrity? |
|
Definition
it does it with a signature |
|
|
Term
how can public key encryption be used to ensure a non-repudiation? |
|
Definition
the public keys must be truly public. they must have been passed around prior |
|
|
Term
what is the difference between a block cipher and a stream cipher? |
|
Definition
one process steam small groups of data and one process large groups of data |
|
|
Term
give an example of a block cipher and a stream cipher |
|
Definition
stream cipher is used for real time encryption/decryption and a block cipher blow fish wofish is a keyed, symmetric block ciper, designed in 1993 by Bruce Schneier and included in a large number of cipher suites and encryption produces. Blowfish proves a good encryption rate in software and no effective cryptanalysis of it has been found to date. However. the Advanced Encryption Standard now receives more attention |
|
|
Term
what is a one-way hash function and give an example of one |
|
Definition
there is no inverse to the function. ex. SHA, MD5, NTLM, LM cannot send hash messages to receive original data/text/message |
|
|
Term
|
Definition
a certificate is a mechanism used to verify an identity on a computer and/or over a computer network. You might call it a "digital identity |
|
|
Term
what is a certificate authority? |
|
Definition
certificate authority or certification authority (CA) is an entity,which is core to many PKI (public key infrastructure) schemes, whose purpose is to issue digital certificates to use by other parties, it exemplifies a trusted third party. some certification authority may charge a fee for their service while some other CAs are free. it is also not uncommon for government and institutions to have their own CAs |
|
|
Term
what are certificates used for? |
|
Definition
to authenticate a users on a network |
|
|
Term
what is a "chain of trust" wrt certificates? |
|
Definition
in a computer security, a chain of trust is established by validating each component of hardware and software from the bottom-up. it is intended to ensure that only trusted software and hardware can be used while still remaining flexible |
|
|
Term
where are certificates stored |
|
Definition
|
|
Term
what is a "root certificate authority" |
|
Definition
one who issues a certificate |
|
|
Term
|
Definition
a room certificate authority |
|
|
Term
why is a hash function needed for a certificate? |
|
Definition
certificate - > hashed certificate signature -> decrypt with pk of signer -> stuff compared with above certificates are hashed and compared to a decrypted signature |
|
|
Term
what security mechanism does https use? |
|
Definition
TLS - transport layer security - it negotiates the protocol its going to use for key transfer the public key is the problem in https |
|
|
Term
how does https exchange symmetric keys? |
|
Definition
|
|
Term
what do u need to do with a web server to provide an https connection? |
|
Definition
|
|
Term
what do u need to do with a web server to provide an https connection? |
|
Definition
|
|
Term
when sniffing an https connection, why do you not see sometimes a public key exchange between the client and the server? |
|
Definition
uses a different type of key exchange |
|
|
Term
|
Definition
a standard for public private key |
|
|
Term
what is Active Directory? |
|
Definition
manage information on a network |
|
|
Term
what is a site, a domain, and an organizational unit |
|
Definition
site - a local area network (LAN) domain - a group of computers on a network organizational unit - a subset of a domaino |
|
|
Term
what is a group policy object? |
|
Definition
a set of rules that apply to site, domain, and organizational unit |
|
|
Term
what can a group policy object be associated with? |
|
Definition
site, domain, organizational unit |
|
|
Term
what is the order in which group policy objects are enforced? |
|
Definition
local, site, domain, organizational unit |
|
|
Term
what is a trust relationship within active directory? |
|
Definition
trusted communication pass between different computers |
|
|
Term
what is a forest ( with respect to active directory) |
|
Definition
|
|
Term
when would you want to use a forest |
|
Definition
when you have multiple domains |
|
|
Term
why would you want more than one domain server for a domain? |
|
Definition
|
|
Term
when you set up a domain server, what are your choices? |
|
Definition
using a hub server as the administration server for both the public address book and your other databases. using a dedicated registration server as the administration server for the public address book and one or more separate hub servers as an administration servers for your other databases using a multi-function server as the administration server for the public address book, and distributing administration responsibilities for the other databases. |
|
|
Term
|
Definition
lightweight directory access protocol |
|
|
Term
what services does LDAP provide? |
|
Definition
authentication, controls permissions to network file shares |
|
|
Term
what is a distinguished name and how is it used in LDAP? |
|
Definition
it is a unique identifier |
|
|
Term
what are the difference(s) between LDAP and active directory? |
|
Definition
LDAP is small and lightweight, AD can control everything |
|
|
Term
what do LDAP and Active directory have in common? |
|
Definition
|
|