Chapter 11 - Securing TCP/IP Flashcards

1
Q

What are the five areas of focus in TCP/IP security

A
Encryption
Integrity
Nonrepudiation
Authentication
Authorization
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define ‘ecryption’ in terms of TCP/IP security

A

To scramble, mix up, or change data

Must be easily descrambled by destination host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define ‘integrity’ in terms of TCP/IP security

A

The process that guarantees that the data received is the same as originally sent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define ‘nonrepudiation’ in terms of TCP/IP security

A

process of making sure data came from the person or entity it was supposed to come from

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define ‘authentication’ in terms of TCP/IP security

A

to verify that whoever is trying to access the data is the person you want access the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define ‘authorization’ in terms of TCP/IP security

A

defines what an authenticated person can do with that data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does all data start

A

plain text
clear text
Binary file (photograph)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define ‘cipher’

A

a general term for a way to encrypt data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define ‘unicode’

A

numbers representing letters and other characters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the purpose of a key in cryptography

A

A key does some math to every value using an algorithm. It enables us to scramble and unscramble data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define frequency analysis

A

certain letters of the alphabet are used more than others, this helps to decrypt the code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define symmetric-key algorithm

A

the same key is used for encryption and decryption

Major downfall is if someone gets a hold of the key they can encrypt or decrypt with it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define asymmectric algorithm

A

uses different keys for encryption and decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why use a block cipher

A

they can encrypt data in single ‘chunks’ of x length at a time
ex: 128-bit chunks
Works well when data comes in clearly distinct chunks
IP packets are ideal for this encryption method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define DES

A

Data Encryption Standard uses a 64-bit block and a 56 bit key.
- Susceptible to brute force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what are 3 examples of ecryption that proceeded DES

A

3DES
International Data Encryption Algorithm (IDEA)
Blowfish

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Define Stream Cipher

A

It takes a single bit at a time and encrypts it on the fly
+ Popular for long streams of data
ex. RC4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is RC4

A
Rivest Cipher 4
\+ Fast
\+ Easy to use
\+ Free
-  Legacy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is AES

A

Advanced Encryption Standard
- Block Cipher: 128 bit block & 128/192/256 key
+ Fast
+ Encompases many areas (wireless to file encryption)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is Public Key Cryptography

A

most popular
Keys are exchanged securely
Public keys are used for encryption and decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What kind of encryption is seen at each layer of the OSI model

A
Layer 1: no encryption
Layer 2: Proprietary encryption
Layer 3: IPsec 
Layer 4: no encryption
Layer 5/6/7: All the important encryption standards
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is a hash and its use

A

A cryptographic function that runs a string of binary digits and results in a value of some fixed length
aka checksum or message digest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Define SHA

A

Secure Hash Algorithm is the primary family of hash functions.
SHA-1 ( No longer safe)
SHA-2…
SHA-256 (most popular)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

If MD5 is considered secure why is it still used in SMTP

A

Use a special form of MD5 called Challenge-Response authentication mechanism message digest 5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is a digital signature
A hash of the message encrypted by the private key
26
How are public keys used
matching public keys decrypt digital signature public key, generate their own hash, and compares it to encrypted hash
27
Define certificate
a standardized type of digital signature that includes the digital signature of a third party, person, or company.
28
How does one obtain a certificate for a website
Once a website is created you can get a certificate from a authorized signing authority
29
Define authentication
the process of positively identifying users trying to access data.
30
Define Network Access Control
Defines a newer series of protection applications that combine the features of what traditionally was done by separate applications.
31
What is ACL
Access control list. A list of permissions that specifies what an authenticated user may perform on a shared resource 1. Mandatory 2. Discretionary 3. Role Based
32
What is Mandatory Access Control
every resource is assigned a label that defines its security level - Oldest
33
What is Discretionary Access Control
DAC is based on the idea that resource has an owner who may at his or her discretion assign access to that resource
34
What is Role based access control
RBAC most popular used in file sharing. Defines a users access to a resource based on the roles the user plays in the network
35
What protocol does dial up use
Serial Line Internet Protocol was totally unsecure and what migrated to PPP
36
What is PPP
Point to Point Protocol enables two point to point devices to connect authenticate with a user name and password, and negotiate the protocol the devices will use. The starting side is called the initiator and has the list of usernames and passwords
37
What are the 5 phasesto PPP
1. Link Dead: Link control protocol starts connection 2. Link Established: communicated with destination LCP 3. Authentication 4. Network Layer Protocol 5. Termination
38
What are the two methods PPP used for authentication
``` PAP = Password Authentication Protocol transmits the user name and password over plaintext CHAP = Challenge Handshake Authentication Protocol bases hashes on a shared secret. Repeats process. MS-CHAPv2 is still popular ```
39
What is AAA
Authentication, Authorization, Accounting is designed for port authentication. Allows remote users to a particular point of entry.
40
What are the two standards for AAA
RADIUS | TACACS+
41
What is RADIUS
Remote Authentication Dial-In Service consists of a RADIUS server that has access to a database of user names and passwords, a number of NACs, and a group of systems that make up the network - Authentication on port: 1812 (UDP), 1813 (UDP), 1645 (UDP), 1646 (UDP)
42
What is TACACS +
Terminal access Controller Access Control System Plus was developed by cisco. Uses PAP, CHAP, and MD5 hashes
43
What is Kerberos
authentication protocol for TCP/IP with many clients connecting to a single authenticating server Port 88 Uses KDC for authentication process
44
What is KDC
Key distribution server used by kerberos has two processes Authentication server and ticket granting service. 1.. Hash user name and password to the AS 2. Compare results of hash to its own hash 3. If match, send granting ticket and timestamp If the KDC goes down no one has access
45
What is Windows SID
Security token identifier
46
What is EAP
Extensible Authentication Protocol was developed to create a single standard to allow two devices to authenticate. Wrppaer for PPP. Used in wireless
47
What are the six types of EAP
EAP-PSK - Personal Shared Key, shared code on both AP and client, Uses AES TLS - EAP with TLS, requires certificates on both client and server EAP-TTLS - Single server-side certificate, tunneled TLS PEAP - Protected Extensible Authentication Protocol EAP-MS-CHAPv2 - uses password function with encrypted tls tunnel LEAP = Lightweight extensible authentication protocol used almost exclusively by cisco products
48
What encryption does 802.1x use
Puts EAP information inside the ethernet frame. | Port based authentication network access control mechanism
49
What does an SSH server use for a key
RSA key
50
How does a SSH server use a key
Receives key, creates session ID, encrypts it with PK. Server decrypts and uses ID in all transfers going forward. - Add usernames and passwords to authenticate -
51
What must be generated to use public/private keys
A pair of RSA or digital signature algorithm
52
What is SSL limited to
HTML, FTP, SMTP, and other older TCP apps
53
What is IPsec
Internet Protocol Security is an authentication and ecryption protocol suite that works at the internet/network layer and will become primary method when IPV6 comes out.
54
What two ways does IPsec work in?
Transport mode and Tunnel Mode.
55
Explain IPsec transport mode:
only actual payload is encrypted; destination , source, other ipheader info is still readable
56
Explain IPsec tunnel mode
entire IP packet is encrypted and then placed into an IPsec endpoint where it is encapsulated inside another IP packet
57
What are the main IPsec protocols
Authentication Header Encapsulating Security Payload Internet Secuiryt Association and Key management Protocol Internet Key exchange
58
What is Authentication Header
AH is for authentication
59
what is Encapsulating Security Payload
ESP is for implementing authentication and encryption
60
what is internet Security Association and Key management
For establishing security associations that define things like the protocol used for exchanging keys
61
Whgat is Internet Key Exchange
also called Kerberized Internet Negotiation of Keys widely used key exchanging protocols
62
What is Secure Copy Protocol
One of the first protocols used to transfer data securely between two hosts
63
What is Simple Network Management Protocol
for querying the state of SNMP devices
64
Define LDAP
Lightweight Directory Access Protocol is the tool that programs use to query aand change a databased. Port 389
65
What is NTP used for
Netowrk Time Protocol gives the time.