Chapter 10 Flashcards

1
Q

Integrity

A

One of the three main goals of information security known as the CIA security triad

Integrity provides assurance that data or system configurations have not been modified

Audit logs and hashing are two methods used to ensure integrity

Compare with availability and confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Hash

A

A number created by executing a hashtag algorithm against data, such as a file or message

Hashing is commonly used for integrity

Common hashing algorithms are MD5, SHA-1, and HMAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Confidentiality

A

One of three main goals of information security known as the CIA security triad

Confidentiality ensures that unauthorized entities cannot access data

Encryption and access controls help protect against the loss of confidentiality

Compare with availability and integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Encryption

A

A process that scrambles, or ciphers, data to make it unreadable

Encryption normally includes a public algorithm and a private key

Compare with Asymmetric and Symmetric Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Digital Signature

A

An encryption hash of a message, encrypted with the sender’s private key

It provides authentication, non-reputation, and integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Authentication

A

The process that occurs when a user proves an identity, such as with a password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Non-Repudiation

A

The ability to prevent a party from denying an action

Digital Signatures and access logs provide non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Patch File

A

Filler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SHA-1 Checksum

A

Filler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

MD5

A

Message Digest 5 is a hashing function used to provide integrity

MD5 creates 128-bit hashes, which are also referred to as MD5 checksums

Experts consider MD5 cracked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SHA

A

Secure Hash Algorithm is a hashing function used to provide integrity

Versions include SHA-1, SHA-2, SHA-3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

HMAC

A

Hash-based Message Authentication Code is a hashing algorithm used to verify integrity and authenticity of a message with the use of a shared secret

It is typically combined with another hashing algorithm such as SHA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

RIPEMD

A

RACE Integrity Primitives Evaluation Message Digest is a hash function used for integrity

It creates fixed-length hashes of 128, 160, 256, or 320 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Key Stretching

A

A technique used to increase the strength of stored passwords

It adds additional bits (called salts) and can help thwart brute force and rainbow table attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Salt

A

A random set of data added to a password when creatig the hash

PBKDF2 and bcrypt are two protocols that use salts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Bcrypt

A

A key stretching algorithm

It is used to protect passwords

Bcrypt salts passwords with additional bits before encrypting them with Blowfish

This thwarts rainbow table attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

PBKDF2

A

Password-Based Key Derivation Function 2 is a key stretching technique that adds additional bits to a password as a salt

It helps prevent brute force and rainbow table attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Data-at-rest

A

Any data stored on media

It’s common to encrypt sensitive data-at-rest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Data-In-Transit

A

Any data sent over a network

It’s common to encrypt sensitive data-in-transit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Data-In-Use

A

Any data currently being used y a computer

Because the computer needs to process the data, it is not encrypted while in use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Algorithm

A

Filler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Key

A

Filler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Random and Pseudo-Random Numbers

A

Filler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

IV

A

Initialization Vector attack is a wireless attack that attempts to discover the IV

Legacy wireless security protocols are susceptible to IV attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Nonce

A

A number used once

Cryptography elements frequently use a nonce to add randomness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

XOR

A

A logical operation used in some encryption schemes

XOR operations compare two inputs

If the two inputs are the same, it outputs True

If the two inputs are different, it outputs False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Confusion

A

A cryptography concept that indicates ciphertext is significantly different than plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Diffusion

A

A cryptography concept that ensures that small changes in plaintext result in significant changes in ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Secret Algorithm

A

Filler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Weak/Deprecated Algorithms

A

Filler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

High Resiliency

A

Filler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Block Cipher

A

An encryption method that encrypts data in fixed-sized blocks

Compare with stream cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

StreamCipher

A

An encryption method that encrypts data as a stream of bits or bytes

Compare with block cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

ECB

A

Electronic Codebook is a legacy mode of operation used for encryption

It is weak and should not be used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

CBC

A

Cipher Block Chaining is a mode of operation used for encryption that effectively converts a block cipher into a stream cipher

It uses an IV for the first block and each subsequent block is combined with the previous block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

CTM

A

Counter mode is a mode of operation used for encryption that combines an IV with a counter

The combined result is used to encrypt blocks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

GCM

A

Galois/Counter Mode is a mode of operation used for incryption

It combines the counter (CTM) mode with hashing techniques for data authenticity and confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Symmetric Encryption

A

A type of encryption using a single key to encrypt and decrypt data

Compare with asymmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Encryption Algorithm

A

Filler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Decryption Algorithm

A

Filler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Substitution Cipher

A

An encryption method that replaces characters with other characters

42
Q

Plaintext

A

Text displayed in a readable format

Encryption converts plaintext to ciphertext

43
Q

Ciphertext

A

The result of encrypting plaintext

Ciphertext is not in an easily readable format until it is decrypted

44
Q

ROT13

A

A substitution cipher that uses a key of 13

To encrypt a message, you would rotate each letter 13 spaces

To decrypt a message, you would rotate each letter 13 spaces

45
Q

Obfuscation

A

An attempt to make something unclear or difficult to understand

Steganography methods use obfuscation to hide data within data

46
Q

AES

A

Advanced Encryption Standard is a strong symmetric block cipher that encrypts data in 128-bit blocks

AES can use key sizes of 128 bits, 192 bits, 256 bits

47
Q

Fast

A

Filler

48
Q

Efficient

A

Filler

49
Q

Strong

A

Filler

50
Q

DES

A

Data Encryption Standard is a legacy symmetric encryption standard used to provide confidentiality
It has been compromised and AES or 3DES should be used instead

51
Q

3DES

A

Triple Digital Encryption Standard is a symmetric algorithm used to encrypt data and provide confidentiality

It is a block cipher that encrypts data in 64-bit blocks

52
Q

RC4

A

A symmetric stream cipher that can use between 40 and 2,048 bits

Experts consider it cracked and recommend using stronger alternatives

53
Q

Blowfish

A

A strong symmetric block cipher

It encrypts data in 64-bit blocks and supports key sized between 32 and 448 bits

Compare with Twofish

54
Q

Twofish

A

A symmetric key block cipher

It encrypts data in 128-bit blocks and supports 128-, 192-, or 256-bit keys

Compare with Blowfish

55
Q

Asymmetric Encryption

A

A type of encryption using two keys to encrypt and decrypt data

It uses a public key and a private key

Compare with symmetric encryption

56
Q

Public Key

A

Part of a matched key pair used in asymmetric encryption

The public key is publicly available

Compare with private key

57
Q

Private Key

A

Part of a matched key pair used

58
Q

Certificate

A

A digital file used for encryption, authentication, digital signatures, and more

Public certificates include a public key used for asymmetric encryption

59
Q

Serial Number

A

Filler

60
Q

Issuer

A

Filler

61
Q

Validity Dates

A

Filler

62
Q

Subject

A

Filler

63
Q

Usage

A

Filler

64
Q

RSA

A

Rivest, Shamir, and Adleman is an asymmetric algorithm used to encrypt data and digitally sign transmissions

It is named after its creators, Rivest, Shamir, and Adleman

65
Q

Ephemeral

A

An ephemeral key is a type of key used in cryptography

Ephemeral keys have very short lifetimes and are re-created for each session

66
Q

Perfect Forward Secrecy

A

A characteristic of encryption keys ensuring that keys are random

Perfect forward secrecy methods do not use deterministic algorithms

67
Q

DHE

A

Filler

68
Q

ECDHE

A

Filler

69
Q

Steganography

A

The practice of hiding data within data

For example, it’s possible to embed text files within an image, hiding them from casual users

It is one way to obscure data to hide it

70
Q

DSA

A

Digital Signature Algorithm is an encrypted hash of a message used for authentication, non-repudiation, and integrity

The sender’s private key encrypts the hash of the message

71
Q

Hashing

A

Filler

72
Q

S/MIME

A

Secure/Multipurpose Internet Mail Extensions is a popular standard used to secure email

S/MIMI provides confidentiality, integrity, authentication, and non-repudiation

73
Q

Cipher Suites

A

Filler

74
Q

Crypto Module

A

A set of hardware, software, and/or firmware that implements cryptographic functions

Compare with crypto service provider

75
Q

Crypto Service Providers

A

A software library of cryptographic standards and algorithms

These libraries are typically distributed within crypto modules

76
Q

Downgrade Attack

A

A type of attack that forces a system to downgrade its security

The attacker then exploits the lesser security control

77
Q

PKI

A

Filler

78
Q

Root Certificate

A

A PKI certificate identifying a root CA

79
Q

Certificate Chaining

A

A process that combines all certificates within a trust model

It includes all the certificates in the trust chain from the root CCA down to the certificate issued to the end user

80
Q

CSR

A

Certificate signing request is a method of requesting a certificate from a CA

It starts by creating an RSA-based private/public key pair and then including the public key in the CSR

81
Q

Expired

A

Filler

82
Q

Certificate Not trusted

A

Filler

83
Q

Improper Certificate and Key management

A

Filler

84
Q

OCSP

A

Online Certificate Status Protocol is an alternative to using a CRL

It allows entities to query a CA with the serial number of a certificate

The CA answers with good, revoked, or unknown

85
Q

Stapling

A

The process of appending a digitally signed OCSP response to a certificate

It reduces the overall OCSP traffic sent to CA

86
Q

Pinning

A

A security mechanism used by some web sites to prevent web site impersonation

Web sites provide clients with a list of public key hashes

Clients store the list and use it to validate the web site

87
Q

Key Escrow

A

The process of placing a copy of a private key in a safe environment

88
Q

Machine/Computer

A

Filler

89
Q

User

A

Filler

90
Q

Email

A

Filler

91
Q

Code Signing

A

The process of assigning a certificate to code

The certificate includes a digital signature and validates the code

92
Q

Self-Signed

A

Filler

93
Q

Wildcard

A

Filler

94
Q

SAN

A

Filler

95
Q

Domain Validation

A

Filler

96
Q

Extended Validation

A

Filler

97
Q

CER

A

Canonical Encoding Rules are a base format for PKI certificates

They are binary encoded files

Compare with DER

98
Q

DER

A

Distinguished Encoding Rules are a base format for PKI certificates

They are BASE64 ASCII encoded files

Compare with CER

99
Q

PEM

A

Privacy Enhanced Mail is a common format for PKI certificates

It can use either CER (ASCII) or DER (Binary) formats and can be used for almost any type of certificates

100
Q

P7B

A

PKCS#7 is a common format for PKI certificates

They are DER-based (ASCII) and commonly used to share public keys

101
Q

P12

A

PKCS#12 is a common format for PKI certificates

They are CER-based (Binary) and often hold certificates with the private key

They are commonly encrypted

102
Q

PFX

A

Personal information Exchange is a common format for PKI certificates

It is the predecessor to P12 certificates