Auditing, Cryptography Flashcards

Fundamentals of auditing and cryptography

1
Q

Windows Encrypted File System

A

Allows encryption of files and folders. It uses a combination of symmetric and asymmetric encryption. There is a separate symmetric secret key and a digital certificate which holds the user’s private and public key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Virtual Private Network (VPN)

A

It creates a private network over a public network in a secure way. It uses a tunneling protocol to create a tunnel through the internet to the VPN server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Internet Protocol Security (IPSec)

A

It’s a protocol that encrypts and authenticates packets that are sent over an IP network. There are two modes of tunnel mode and transport mode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Software-Based Encryption

A

Uses software to encrypt data and a vulnerability in the operating system can compromise it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Hardware-Based Encryption

A

Uses hardware to perform encryption like TPMs or processors with x86 instruction set.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Examples of Symmetric Algorithms

A

Data Encryption Standard, Triple Data Encryption Standard, Advanced Encryption Standard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explain Symmetric cryptography!

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Explain Asymmetric Cryptography!

A

Asymmetric key cryptography AKA uses two keys: a public key and a private key. You use public key to access data and anyone can access that. Private keys are used to decrypt messages and they are carefully guarded by the receiver.
How public key encryption works: Anything encrypted with private key can be decrypted with the matched public key and anything encrypted with the public key can be decrypted with the matched private key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Explain Hash Functions and salting!

A

Hash functions are a third type of modern cryptography which we call keyless cryptography. Instead of using a key, hash functions convert the plaintext into a large unique and fix-length value which is called hash. Adding random strings to a password is password salting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is digital signature?

A

A digital signature allows you to sign a message so the others can detect any changes to the message after you’ve sent it, ensure that the message was sent by the expected party and prevent the sender from denying that they sent the message.

To digitally sign a message, the sender generates a hash of the message and then uses their private key to encrypt the hash. The sender then sends this digital signature along with the message, usually by appending it to the message itself.
When the message arrives at the receiving end, the receiver uses the public key corresponding to the sender’s public key to decrypt the digital signature and restores the original hash of the message. The receiver can check the integrity of the message by hashing the message again and comparing the two hashes. Some softwareas take care of verifying the integrity of the message quickly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a certificate and who is a certificate authority?

A

A digital certificate is an electronic document that identifies a server, a person, or an organization or other entity and associate that entity with a public key. The person who issues the certificate is called certificate authority.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Non-Repudiated

A

Refers to a situation that a person is unable to successfully deny that they have made a statement or taken an action because we have sufficient evidence that they did it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is Vulnerability assessment? name one tool and explain what it does.

A

Vulnerability assessment generally involves using vulnerability scanning tools such as Qualys, to locate weaknesses in an environment. Such tools usually scan the target systems to discover open ports and then interrogating each port to find out which service is listening on it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Penetration testing

A

Penetration testing mimics the techniques that an actual attacker would use to breach a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How to protect data in motion?

A

You will often use SSL(Secure Socket Layer) and TLS(Transport Layer Security) to encrypt a connection between two systems communicating over the network. SSL and TLS(both create a secure connection between client and server. TLS( is more secure) operate in conjunction with other protocols such as Internet Message Access Protocol(IMAP) and Post Office Protocol(POP) for email, Hypertext Transfer Protocol(HTTP) for web traffic and VoIP for voice conversation and messaging.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly