12.0 Flashcards
What are the three primary goals of security?
Confidentiality
Integrity
Availability
Confidentiality best practices?
Use firewalls, acls, require appropriate credentials, encrypt traffic.
What are the two basic forms of encryption?
Symmetric and Asymmetric Encryption.
List the 3 Symmetric Encryption Algorithms
DES, 3DES, AES
AES is available in what key versions?
128, 192, 256
Describe one of the most popular Asymmetric algorithm in use today
RSA: used as part of a PKI system, which uses digital certs and a CA to authentication and encryption services.
What does integrity ensure?
Ensures that data has not been modified in transit.
Hashing is one approach to data integrity, what are two of the most common hashing algorithms?
MD5 (Message Digest 5), Secure Hash Algorithm 1 (SHA-1)
Availability of data is a measure of the data’s _____.
Accessibility.
3DES Key Length
168
MD5 Key Length
128
DES KL
56
AES KL
128
SHA-1 KY
160