1 Flashcards
Incident response phases
Preparation
Detection & Analysis
Containment, Eradication & Recovery
Post-event activity
From NiST
Types of halon
1211 only in portable, streaming agent
1301 only in fixed, flooding agent
Sha
Secure Hash Algorithm
Hashing algorithm
20 byte output
AES
Advanced Encryption Standard Original name rijndael Block cipher Block size 128 Key length 128, 192, 256
EAP
Extensible authentication protocol
Used by ppp
Support multi auth mechanisms
Token cards, smart cards, certs, opt, public key enc
Usage gap
Total potential - actual current usage
Used to authent asym keys
Password
Circuit level firewall
Provides udp and tcp connection security
Operates transport and application layers such as session
Stream cipher
Faster than block
PEAP
Protected Extensible Authentication Protocol
Mschap
Gtc
IDEA
International data encryption algorithm
Symmetric block cipher
DES
Data encryption standard
Symmetric block
Blowfish
Symmetric block
Key 32 to 448 bits
Two fish
Symmetric block
Block 128
Key up to 256
ECB
Electronic Code Book
Block Cipher
Same key on each block
CBC
Cipher Block Chaining
Block cipher
Uses IV on first block
Plaintext XORed with previous ciphertext before being encrypted
PCBC
Propagating Cipher Block Chaining
Block Cipher
uses IV on first block
Plaintext XORed with both previous plaintext and previous ciphertext before being encrypted
CFB
Cipher Feedback
makes a block cipher into a self-syncronizing stream cipher
if part of encrypted message lost, only part of decryption lost.
OFB
Output Feedback
makes a block cipher into a synchronous stream cipher
allows many error correction codes to function even when applied before encryption
smart cards
typically credit card sized
embedded IC
some have electrical contacts
does not display
MD5
Message Digest
Hash
128 hash output
SOM
Service-Oriented Modeling
Comprehensive view of analysis, design and arch of all software entities
View software entities as assets referred to as services