08982917_NewHorizons Flashcards
Name one Stream Cipher
RC4
IMAP Port
143
Devices at Layer 3
Router - Makes decisions on sending PACKETS..
Can find the fastest ROUTE.
Drawback to CBC
Have to go in order
Asymmetric Examples
RSA (used by Web), Diffie-Hellman,
RC4 is a ______ cipher
STREAM
In Stream Cipher the bit are same size as _____
plain text
Deluge System
Floods area - Fire suppression
Substitution
Swaps out plain text.
Transposition or Permutation does what?
TRANSPOSITION CIPHERS rearrange the letters of a plaintext message.
Layer 3 (Network) data element
PACKET DATAGRAM
FTP, HTTP, SMTP function at what layer
7 Application
Data Element for Layer 2
FRAME
Substitution and Transposition provide..
Confusion and Diffusion
ARP is in layer …
2 Data - Assigns MAC to IP
0-1023 are known as
Well known ports
Key management should be used to:
Issue, Store , Backup, Renew, Revoke, Expire, Destroy
Security Architects design based on __________
requirements.
Layer 2 Tunneling protocol, occurs at what layer?
Layer 2 (data)
SAG vs BROWNOUT
SAG short timeframe of LOW
BROWNOUT longer timeframe of low power
Attempting to use multiple combinations of username and password. What is this attack?
Brute Force
Covert Channel is _______. What types are there?
“Unintended” access to data.
Storage-
Timing- Observe timing and order
PKI workflow
Sender requests certificate from CA
Sender gets certificate
Receiver verifies CA using CRL or OCSP
Receiver trusts Sender
Birthday attack focuses on finding ______
Collisions.
Hash - One Way
MD5, SHA1/2/256,
ICMP, OSPF and IP reside at what layer?
Layer 3 (Network)
IMAPs Port
995
802.3 operates at which layer?
Layer 1 and 2, Ethernet
Layer 3 (Network) protocols
IP, ICMP, RIP, OSPF
ICS vulnerabilities
legacy code,
Cipher is also known as an _______
algorithm
IP is layer ..
3 Network
ICS mitigation
Patching, design using IDS and Firewalls,
Stream ciphers encrypt data ____ at a time
ONE
TCP/IP Stack
Application
Host to Host
Networking
Network Access
What is the most commonly used and standard for Symmetric Encryption
AES
Block cipher blocks in ______
Chunks - 64/128bit at a time.
Stream and Block are a form _____ encryption
Symmetric
Key Clustering
Multiple Keys work for one lock
US Government Security Modes: Security Modes Must have these 3 things:
1) Mandatory Access Control environment MAC.
2) Total PHYSICAL control of COMPUTER CONSOLE.
3) Total PHYSICAL control over subject access to COMPUTER CONSOLE work space. ..
_______ _______mode provides the most granular control over resources and users because it enforces clearances, requires need to know, and allows the processing of only single sensitivity levels. All the other levels either do not have unique need to know between users (dedicated), allow multiple levels of data processing (compartmented), or allow a wide number of users with varying clearance (multilevel).
System high
Layer 2 devices?
Switches (layer 2 switch)
Layer 4 (Transport) data element
SEGMENT
Block Cipher Examples
DES, AES, Blowfish, IDEA
UDP, TCP, SSL/TLS is what layer
Layer 4 Transport
Layer 6 protocols and functions
Encryption, JPG, MPG, JPG
Primary risk for sending unencrypted data on the network
Sniffing attack
HTTP is what layer
7 Apllication
Encryption is used for ______ , _______and ____
Confidentiality, Integrity and NonRepudiation
Stream Cipher Examples
RC4
Block Cipher is _______ than Stream Cipher but more secure
Slower
JPG, MPG, PNG, Encryption and Compression layer ??
6 Presentation
Dictionary Attack
Encrypts know pw’s and compares the hash with your hash.
Layer 2 (Data) protocols
ARP, Ethernet, L2TP
Well Known Port #’s
0-1023