Term
|
Definition
Principle in which attackers are forced to break multiple lines of defense to be able to access the target system or protected areas. |
|
|
Term
|
Definition
Where every server and client machine should be hardened by having frequent backups, timely software patches for applications and operation systems, host firewalls, and other authentication control measures. |
|
|
Term
|
Definition
Should be readable only by the intended party |
|
|
Term
|
Definition
protects the confidentiality of messages from such threats as packet sniffing and man-in-the-middle attack (MITM) |
|
|
Term
|
Definition
Assures that data (or messages) are not manipulated accidentally or maliciously by unauthorized parties. |
|
|
Term
Frame Check Sequence(FCS) |
|
Definition
added at the end of each from for error detection is a general approach to detect such changes. |
|
|
Term
|
Definition
Means that the identity of communicating parties and message sources need to be validated. |
|
|
Term
What is authentication an effective weapon against? |
|
Definition
Man-in-the-middle attacks and various types of spoofing. |
|
|
Term
Access control and authorization |
|
Definition
refer to the proces of granting/denying the access of a network of systems attached to the network, and of resources such as files, directories, and programs available within a system. |
|
|
Term
What tool should be used to enforce access policy? |
|
Definition
Access Control List (ACL) |
|
|
Term
Identity management and directory service |
|
Definition
Access privelages should be arranged so that a person or a user group is granted limited access to specific service and system resources. |
|
|
Term
What is a popular technology for message confidentiality? |
|
Definition
|
|
Term
What are popular technologies for message Integrity? |
|
Definition
Checksum/frame check sequence (FCS) Digital Signatures |
|
|
Term
What are popular technologies for access control? |
|
Definition
Access Control List (ACL) Anti-Virus and Anti-Spyware Intrusion detection and prevention system Directory Server |
|
|
Term
What are popular technologies for Authentication? |
|
Definition
Passwords and Passphrases Digital Signatures and digital certificates Smart cards and biometric solutions (ex. voice and face recognition) Security tokens) |
|
|
Term
|
Definition
represents software and/or hardware designed to prot4ect a network from various attacks by cntrolling they type of service for inbound and outbound; and by monitoring the patterns of message flows and the network usage by local and remote users. |
|
|
Term
|
Definition
an internal network that needs secure protection from external threats |
|
|
Term
|
Definition
houses servers such as email and web server that provide public servies and therefore can be more vulnerable to attacks coming from the internet. |
|
|
Term
Firewalls/routers either pass or drop a packet based on the filtering rules defined in the...? |
|
Definition
Access Control List (ACL) |
|
|
Term
|
Definition
a rudimentary form of screening in which the firewall examined each packet as an isolated case. |
|
|
Term
|
Definition
The firewall reviews each arriving packet in the context of the previous engagement, making the packet screening much more effective than stateless filtering. |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
For inbound packets, does filtering or routing occur first? |
|
Definition
Filter first, then routing |
|
|
Term
when the packet is outbound, does filtering or routing occur first? |
|
Definition
Routing occurs first, then filtering |
|
|
Term
|
Definition
a procedure that transforms a message into an unreadable code |
|
|
Term
what are the four elements of cryptography? |
|
Definition
plaintext, ciphertext, cipher, and key |
|
|
Term
|
Definition
An original unencrypted message in various formats including text, voice, data, and video |
|
|
Term
|
Definition
is an encryption algorithm used to convert plaintext to ciphertext and vice versa |
|
|
Term
how many types of ciphers are there? |
|
Definition
two (Stream and block ciphers) |
|
|
Term
what are the two types of ciphers? |
|
Definition
|
|
Term
What does a stream cipher do? |
|
Definition
Encrypts a message bit by bit (bit-level encryption) |
|
|
Term
What does a block cipher do? |
|
Definition
Encryption per block of certain size (128 bit block) *most ciphers are block ciphers |
|
|
Term
What is the most common type of cipher? |
|
Definition
|
|
Term
|
Definition
represents a binary value the cipher utilizes to encrypt/decrypt the data |
|
|
Term
What is the recommended key size to safeguard encrypted messages? |
|
Definition
100 is recommended and most web browsers use 128 bits |
|
|
Term
T/F does a cryptography system use a fixed key size? |
|
Definition
|
|
Term
Can a key value be randomly generated based on encryption software or derived from a password? |
|
Definition
|
|
Term
|
Definition
A randomly generated key used for only a particular session |
|
|
Term
|
Definition
When both the sender and receiver have the same key before the session begins |
|
|
Term
|
Definition
The sender utilizes a public key to encrypt the data and then utilizes their private key to decrypt the data |
|
|
Term
Which is more secure, asymmetric or symmetric keys? |
|
Definition
|
|
Term
Synonym for electronic autpographs |
|
Definition
|
|
Term
Are asymmetric keys shorter or longer than symmetric keys? |
|
Definition
MUCH LONGER which is a disadvantage |
|
|
Term
are the two types of keys used in a hybrid fashion? |
|
Definition
Yes, generally symmetric keys are used to encrypt actual messages while asymmetric keys are used to send symmetric keys and authenticate communicating parties. |
|
|
Term
|
Definition
A high-tech solution for message and sender authentication. |
|
|
Term
|
Definition
A digital equivalent of an ID card and is used in conjunction with the asymmetric encryption system |
|
|
Term
Who sells digital certificates? |
|
Definition
Certificate authorities (CAs) ex. verisign... |
|
|
Term
What is the widely accepted standard from the International Telecommunications Untion (ITU) defining a format of digital certificated? |
|
Definition
|
|
Term
Are Certificate Authorities public or Private institutes? |
|
Definition
Both! examples are verisign, Microsoft, American Online |
|
|
Term
can a Certificate Authority revoke a certificate? |
|
Definition
|
|
Term
Certificate revocation list |
|
Definition
Revoked certificates go on this list! |
|
|
Term
If the certificate is not recognized, does the browser warn the user? |
|
Definition
yes and it advises against proceeding |
|
|
Term
How strong is Wired Equivalent Privacy? |
|
Definition
|
|
Term
How strong is Wi-Fi Protected Access(WPA)? |
|
Definition
|
|
Term
How strong is IEEE 802.11i(also called WPA2)? |
|
Definition
|
|
Term
|
Definition
|
|
Term
Why is WPA and WPA2 better than WEP? |
|
Definition
Because WPA and WPA2 are dynamically changing after the initial setup |
|
|
Term
IS WPA and offical IEEE standard? |
|
Definition
NO...it was meant as a transition between WEP and WPA2 |
|
|
Term
Robust Security Network (RSN) |
|
Definition
Only allows authorized users onto the network |
|
|
Term
|
Definition
Personal mode of WPA...basically is setup for small businesses or home offices |
|
|
Term
|
Definition
Is setup in a way that the system relies on a central server for key management which ensures consistency in user authentication |
|
|