Chapter 10 Flashcards
Integrity
One of the three main goals of information security known as the CIA security triad
Integrity provides assurance that data or system configurations have not been modified
Audit logs and hashing are two methods used to ensure integrity
Compare with availability and confidentiality
Hash
A number created by executing a hashtag algorithm against data, such as a file or message
Hashing is commonly used for integrity
Common hashing algorithms are MD5, SHA-1, and HMAC
Confidentiality
One of three main goals of information security known as the CIA security triad
Confidentiality ensures that unauthorized entities cannot access data
Encryption and access controls help protect against the loss of confidentiality
Compare with availability and integrity
Encryption
A process that scrambles, or ciphers, data to make it unreadable
Encryption normally includes a public algorithm and a private key
Compare with Asymmetric and Symmetric Encryption
Digital Signature
An encryption hash of a message, encrypted with the sender’s private key
It provides authentication, non-reputation, and integrity
Authentication
The process that occurs when a user proves an identity, such as with a password
Non-Repudiation
The ability to prevent a party from denying an action
Digital Signatures and access logs provide non-repudiation
Patch File
Filler
SHA-1 Checksum
Filler
MD5
Message Digest 5 is a hashing function used to provide integrity
MD5 creates 128-bit hashes, which are also referred to as MD5 checksums
Experts consider MD5 cracked
SHA
Secure Hash Algorithm is a hashing function used to provide integrity
Versions include SHA-1, SHA-2, SHA-3
HMAC
Hash-based Message Authentication Code is a hashing algorithm used to verify integrity and authenticity of a message with the use of a shared secret
It is typically combined with another hashing algorithm such as SHA
RIPEMD
RACE Integrity Primitives Evaluation Message Digest is a hash function used for integrity
It creates fixed-length hashes of 128, 160, 256, or 320 bits
Key Stretching
A technique used to increase the strength of stored passwords
It adds additional bits (called salts) and can help thwart brute force and rainbow table attacks
Salt
A random set of data added to a password when creatig the hash
PBKDF2 and bcrypt are two protocols that use salts
Bcrypt
A key stretching algorithm
It is used to protect passwords
Bcrypt salts passwords with additional bits before encrypting them with Blowfish
This thwarts rainbow table attacks
PBKDF2
Password-Based Key Derivation Function 2 is a key stretching technique that adds additional bits to a password as a salt
It helps prevent brute force and rainbow table attacks
Data-at-rest
Any data stored on media
It’s common to encrypt sensitive data-at-rest
Data-In-Transit
Any data sent over a network
It’s common to encrypt sensitive data-in-transit
Data-In-Use
Any data currently being used y a computer
Because the computer needs to process the data, it is not encrypted while in use
Algorithm
Filler
Key
Filler
Random and Pseudo-Random Numbers
Filler
IV
Initialization Vector attack is a wireless attack that attempts to discover the IV
Legacy wireless security protocols are susceptible to IV attacks
Nonce
A number used once
Cryptography elements frequently use a nonce to add randomness
XOR
A logical operation used in some encryption schemes
XOR operations compare two inputs
If the two inputs are the same, it outputs True
If the two inputs are different, it outputs False
Confusion
A cryptography concept that indicates ciphertext is significantly different than plaintext
Diffusion
A cryptography concept that ensures that small changes in plaintext result in significant changes in ciphertext
Secret Algorithm
Filler
Weak/Deprecated Algorithms
Filler
High Resiliency
Filler
Block Cipher
An encryption method that encrypts data in fixed-sized blocks
Compare with stream cipher
StreamCipher
An encryption method that encrypts data as a stream of bits or bytes
Compare with block cipher
ECB
Electronic Codebook is a legacy mode of operation used for encryption
It is weak and should not be used
CBC
Cipher Block Chaining is a mode of operation used for encryption that effectively converts a block cipher into a stream cipher
It uses an IV for the first block and each subsequent block is combined with the previous block
CTM
Counter mode is a mode of operation used for encryption that combines an IV with a counter
The combined result is used to encrypt blocks
GCM
Galois/Counter Mode is a mode of operation used for incryption
It combines the counter (CTM) mode with hashing techniques for data authenticity and confidentiality
Symmetric Encryption
A type of encryption using a single key to encrypt and decrypt data
Compare with asymmetric encryption
Encryption Algorithm
Filler
Decryption Algorithm
Filler