1. Introduction to Cyber Security Flashcards

1
Q

common cyber security attackers

A
  1. script kiddies
  2. hackers (white, grey, black)
  3. insiders
  4. cyber criminal groups
  5. hacktivist
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

cyber crime motivations

A
  1. bragging rights
  2. money
  3. steal, alter, delete information
  4. revenge
  5. state sponsored spying etc
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

types of cryptography

A
  1. symmetric key
    - encryption and decryption use the same key
    - private, only known to sender and receiver
  2. asymmetric key
    - encryption and decryption use different key
    - public key for encryption
    - private key for decryption
  3. hashing
    - no keys
    - one way functions to convert plain txt to fixed length hashed value
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

symmetric cryptography

A
  1. substitution cypher
    - mono alphabetic (Caesar cypher)
    - poly alphabetic (Vegenere cypher)
  2. transposition cypher
    - simple transposition
    - rail fence cypher
    - columnar transposition
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

vulnerabilities of symmetric cryptography

A

if algorithm is know, easy to decrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

how to solve vulnerabilities of symmetric cryptography

A
  1. approach
    - DES
    - 3 DES
    - AES
  2. approach
    - OTP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

asymmetric cryptography

A

keys are generated in pairs using one way function
choose one as public, one as private
public key to encrypt
private key to decrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

how to authenticate users using asymmetric keys

A

if use public key to encrypt, private key to decrypt –> confidentiality
if use public key to decrypt, private key to encrypt –> authentication

sender signs text with sender private key
sender encrypts signed text with receiver public key
receiver decrypts with receiver private key
receiver verify with sender public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

key generation

A
  1. modular arithmetic
  2. prime factorisation
    - RSA key generation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

RSA key generation

A
  1. pick 2 large prime P, Q
  2. calculate n = PQ
  3. calculate N = (P-1)(Q-1)
  4. pick e = number < N, co prime to N
  5. calculate d where d x e x mod(N) = 1
  6. public key = (e, n)
  7. private key = (d, n)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

deffie hellman key exchange

A

alice calculates: A = pow(G,a) x mod(P)
bob calculates: B = pow(G,b) x mod(P)

shared information: A, B, P, G

alice calculates: K = pow(B,a) x mod(P)
bob calculates: K = pow(A,b) x mod(P)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is the CIA triad

A
  1. confidentiality
    - prevention of unauthorised disclosure of information
  2. integrity
    - prevention of unauthorised modification of information
  3. availability
    - prevention of unauthorised withholding of resources
How well did you know this?
1
Not at all
2
3
4
5
Perfectly