Chapter 11: Securing TCP/IP Flashcards

1
Q

What is nonrepudiation?

A

-data is same as originally sent, came from source I think it should have come from.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is authentication?

A

-verifcy whoever accesses the data is the person I want to access it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is authorization?

A

-what a person who accesses the data can do with the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a cipher?

A

-general term for a way to encrypt data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is an algorithm?

A

mathematical formula underlies the cipher.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a complete algorithm?

A

cipher and implementation of the cipher.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is ciphertext?

A

result from running cleartext through a key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is a symmetric key algorithm?

A

uses same key to encrypt and decrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is asymmetric key algorithm?

A

-different keys for encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a block cipher?

A

encrypt data in single chuncks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a stream cipher?

A

-encrypts data a single bit at a time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Describe DES.

A

Data encryption standard

  • grandaddy of all TCP/IP symmetric-key algorithms.
  • 64 bit block and 56-bit key.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Describe AES.

A

Advanced Encryption Standard

  • block cipher
  • 128-bit block size
  • 128, 192, 256-bit key size.
  • used in applications from file encryption to wireless networking, to web sites.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is public-key cryptography?

A

-keys can exchange securely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is RSA?

A

Rivest Shamier Adleman

  • improvement to Diffre-Hellman public-key cryptography
  • enables secure digital signature.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Describe the encryption at the different levels at OSI.

A
  • Level 1: no common encryption
  • level 2: scramble all data in ethernet frame except mac address info.
  • layer 3: IPSEC: software that encrypts everything inside packet.
  • layer 4: TCP/UDP do not offer encryption.
  • layer 5: and 6: not comon for encryption.
  • layer 7: SSL/TLS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How is non-repudiation implemented?

A
  • most cryptographic hash function

- results in checksum or digest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Describe MD5

A

Message-Digest Algorithm version 5

  • some SMTP servers use this
  • most popular hash function.
  • CRAM-MD5: tool for server authentication.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Describe SHA

A

Secure Hash algorithm

-sha-1 and sha-2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a digital signature?

A
  • generated by sender to message and private key

- person with matching publick key verifies it came from intended sender.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is PKI?

A

Public-key infrastructure

-certificate: standardized type of digital signature that includes signature of a third party.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Describe PGP.

A

Pretty Good Privacy

  • web of trust
  • group of peers that trust each other.
  • email encryption: you get a certificate.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Decribe GPG>

A

GNU privacy guard

-alternate to PGP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is an ACL?

A

Access control list.

-defined list of permissions specify that an authenticated user may perform on a shared resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What are three ACL access models?

A
  • mandatory access control(MAC): every resource assigned a label.
  • Discretionary access control(DAC): resource owner assigns access.
  • Role-based access control(RBAC): most popular model and is an access based on role(group).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is PPP?

A

Point to point protocol.
-an authentication standard where 2 devices connect, authenticate with name/password, negotiate network protocol.

-RFC 1661: defines how PPP works.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What are the phases of PPP?

A
  • Link Dead; Link control protocol gets connection going
  • link establishment
  • Authentication: username/password
  • Network layer protocol: negotiate layer 3 protocol. Network control protocol(NCP) makes proper connection.
  • Termination.
28
Q

Describe PAP

A

Password authentication Protocol

-transmits username password in plaintext.

29
Q

Describe CHAP

A

Challenge Handshake Authentication Protocol

  • more secure authentication routine
  • hashes based on shared secret.
30
Q

Describe MS-CHAPv2.

A
  • most common authentication for dial up.

- most security.

31
Q

What are three parts of AAA?

A

-authentication, authorization, and accounting.

32
Q

Describe authentication as it relates to AAA.

A
  • present credential for access

- username/passwd, security token, retinal scan, digital certificate.

33
Q

Describe authorization as it relates to AAA.

A
  • What computer can and cannot do.

- bandwidth limits, times of day, certain applications.

34
Q

Describe RADIUS.

A

Remote Authentication Dial-In User Service.

  • used to support ISPs with thousands of modems.
  • radius server, network access servers, systems that dial in.
35
Q

What does a Radius server do?

A

Internet Authentication Service(microsoft)
-FreeRadius(Unix/linux)
-authenticate on UDP port 1812/1813
or ports 1645/1646

36
Q

Describe TACACS+.

A

Terminal Access Controller Access Control System Plus

  • single server stores ACL for all devices
  • developed by CISCO to support AAA
  • uses port 49 by default
  • can use Kerberos as part of the authentication scheme.
37
Q

What port does TACACS+ work on?

A

port 49

38
Q

What port does radius use?

A

UDP port 1812/183 or 1645/1646

39
Q

Describe Kerberos.

A

no connection to PPP

-authentication protocol for TCP/IP networks with clients connecting to single authenticating server

40
Q

What port does Kerberos use

A

UDP or TCP port 88

41
Q

Describe a kerberos key distribution center(KDC)

A
  • authentication server(AS)
  • Ticket-Granting Service(TGS)
  • after compares hash sends ticket granting ticket(TGT)
  • client sends TGT to TGS for authorization.
  • TGS sends token back to client called SID in winDNS.
42
Q

Descirbe EAP.

A

Extensible Authentication Protocol(EAP)

  • single standard to allow two devices to authenticate.
  • a PPP wrapper that EAP-compliante applications can use to accept one of many types of authentication.
  • substantial use in wireless networks
43
Q

What is EAP-PSK?

A
  • personal share key

- shared secret code stored on both WAP and client encrypted with AES.

44
Q

What is EAP-TLS?

A
  • Transport layer security.
  • use of RADIUS server
  • mutual authentication, certificates on server and client.
  • only on wireless networks.
45
Q

What is EAP-TTLS?

A
  • Tunneled TLS

- Single server-side certificate.

46
Q

What is EAP-MD5?

A

-hashes for transfer of authentication details.

47
Q

What is LEAP?

A

Lightweight EAP

-used by Cisco wireless products.

48
Q

What is 802.1x?

A

EAP for ethernet networks.

  • puts EAP inside of ethernet frame.
  • port authentication NAC mechanism for networks.
49
Q

Describe SSH.

A

Secure shell

  • use PKI in form of RSA key.
  • server sends public key, client encrypts session id, negotion encryption.
  • AES is popular, 3DES might be used.
50
Q

Describe publick keys to identify clients as it relates to SSH.

A
  • non-interactive logins - turn off password logins.
  • generate pair of RSA or DSA keys
  • public key on server, public key on cient.
51
Q

Describe Tunnels as they relate to SSH.

A
  • can tunnel for any tcpip application
  • encrypted link between two programs on separate computers.
  • freeSSHd server: any packet that enters encrypted tunnel(even unencrypted) automatically is encrypted.
52
Q

Describe SSL/TLS.

A

netscape created SSL.

53
Q

Describe TLS.

A

upgraed to SSL.

  • SSL limited to HTML, FTP, SMTP and few others.
  • TLS has no restrictions used in VOIP, VPNs, and webpages.
54
Q

Describe IPsec.

A

authenticate and encryption at layer 3.

55
Q

What is transport mode of IPsec?

A

-only payload of packet is encrypted.

56
Q

What is tunnel mode of IPsec?

A

-entire ip packet encrypted, encapsulated inside another IP packet.

57
Q

What is Authentication Header(AH) of IPsec?

A

-authentication

58
Q

What is ESP as it relates to IPsec?

A

Encapsulating Security Payload.

-authenticate and encryption

59
Q

What is ISAKMP?

A

Internet Security Association and Key management protocol.

-security associates.

60
Q

What is IKE and IKEv2 as it relates to IPSEC?

A
  • Internet Key exchange: kerberized internet negotiation of keys(KINK)
  • can encrypt data with MD5, SHA.
61
Q

What is SCP?

A

Secure copy protocol.
-transer data securely between two hosts.
doesnt have directory listing.

62
Q

What is SFTP?

A

Secure/SSH FTP.

  • active FTP uses ports 20 and 21, creating two-session communication.
  • SSH can only handle one session per tunnel.
  • OpenSSH: group of secure programs made by OpenBSD
  • WINSCP and Filezilla clients for SFTP server.
63
Q

What is SNMP?

A

-cacti.net queries SNMP

64
Q

What is LDAP?

A

-Lightweight directory access protocol.

65
Q

What port does LDAP use?

A

-port 389

66
Q

What port does NTP use?

A

port 123.