Chapter 11: Securing TCP/IP Flashcards
Plaintext/Cleartext
Data that is in an easily read or viewed format
Symmetric-Key Algorithm
Any encryption method that uses the same key for both encryption and decryption.
Assymetric-Key Algorithm
Any encryption method that uses different keys for encryption and decryption.
Block Cipher
- An encryption algorithm in which data is encrypted in “chunks” of a certain length at a time.
- Popular in wired networks
Stream Cipher
An encryption method that encrypts a single bit at a time.
Rivest Cipher 4 (RC4)
Was the dominant stream cipher for a time, but now is not.
Advanced Encryption Standard (AES)
A block cipher that uses a 128-bit block size and 128, 192, or 256 bit key size.
What is the most popular form of email encryption?
Public-Key Cryptography
Rivest Shamir Adleman (RSA)
An improved asymmetric cryptography algorithm that enables secure digital signatures.
IPsec
The Network layer encryption protocol.
Integrity
The process that guarantees that the data received is the same as originally sent.
Secure Hash Algorithm (SHA)
The primary family of cryptographic hash functions.
Two unsafe algorithms
SHA-1 and Message-Digest Algorithm version 5 (MD5)
Nonrepudiation
The receiver of info has a very high confidence that the sender of a piece of info truly is who the receiver thinks.
Digital Signature
An encrypted hash of a private encryption key that verifies a sender’s identity to those who receive encrypted data or messages.
Certificate
A standardized type of digital signature that includes the digital signature of a third party (like GoDaddy) that guarantees that who is passing out this certificate truly is who they say they are.
Public-Key Infrastructure (PKI)
The system for creating and distributing digital certificates using sites like GoDaddy, VeriSign, etc.
Authentication
The process of positively identifying users trying to access data.
Authorization
Defines what an authenticated user can do with data.
Network Access Control (NAC)
Control over information, people, access, machines, and everything in between
Access Control List (ACL)
A clearly defined list of permissions that specifies what an authenticated user may perform on a shared resource
Mandatory Access Control (MAC)
Authorization method in which every resource is assigned a label that defines its security level.
Discretionary Access Control (DAC)
Authorization method based on the idea that there is an owner of a resource who may at his or her discretion assign access to that resource.
Role-Based Access Control (RBAC)
Authorization method that defines a user’s access to a resource based on the roles the user plays in the network environment.
Point-to-Point Protocol (PPP)
Enables two point-to-point devices to connect, authenticate, and negotiate the network protocol the two devices will use.
The 5 Distinct Phases to a PPP Connection
1) Link Dead: No link yet.
2) Link Establishment: Link Control Protocol (LCP) communicates with the LCP on the other side of the PPP link.
3) Authentication: Username/Password
4) Network layer protocol: LCP uses a protocol called Network Control Protocol (NCP) to make proper connections
5) Termination
In a point-to-point connection, the side asking for the connection is the _______ and the other side is the ________.
Initiator, Authenticator
Password Authentication Protocol (PAP)
The oldest and most basic form of authentication.
Sends the passwords in cleartext!!
Challenge Handshake Authentication Protocol (CHAP)
A remote access authentication protocol that has the serving system challenge the remote client, which must provide an encrypted password.
MSCHAP
The most common authentication method for dial up.
Authentication, Authorization, and Accounting (AAA)
A security philosophy based upon the three words it is named with, ya know?
Remote Authentication Dial-In User Service (RADIUS)
- An AAA standard created to support ISP’s with hundreds or thousands of modems in hundreds of computers to connect to a single central database.
- Either UDP 1812/1813 or UDP 1645/1646
3 Devices of RADIUS
1) Radius Server that has access to usernames/passwords
2) Network Access Servers (NAS) that control the modems
3) A group of systems that dial into the network.
What is the Microsoft RADIUS server?
Internet Authentication Service (IAS)
What is the Linux RADIUS server?
FreeRADIUS
Terminal Access Controller Access Control System Plus (TACACS+)
- A protocol developed by Cisco to support AAA in a network with many routers and switches.
- TCP port 49
- Similar to RADIUS, but separates authorization, authentication and accounting.
Kerberos
An authentication standard designed to allow different operating systems and applications to authenticate each other.
Key Distribution Center (KDC)
System for granting authentication in Kerberos.
Two processes of KDC
1) Authentication Server (AS)
2) Ticket Granting Service (TGS)
In Windows, the security token is called a __________.
Security Identifier (SID)
EAP-PSK
- Most popular form of authentication in wireless networks.
- Uses a shared secret code (password or whatever) stored on the WAP and the clients
EAP-TLS
- A protocol that defines the use of a RADIUS server as well as mutual authentication, requiring certificates on both the server and every client.
- Only used on wireless networks
EAP-TTLS
A protocol similar to EAP-TTLS, but only uses a single server-side certificate.
LEAP
Proprietary EAP used almost exclusively by Cisco wireless products.
802.1X
- A port-authentication network access control mechanism for networks.
- Uses EAP