Chapter 21 Security Flashcards

1
Q

encryption

A

alters data into a form that is unreadable by anybody that is not the intended recipient
process of turning plain text into cipher text

Example sentence: The encryption process ensures that sensitive information remains secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

plain-text

A

the original data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

cipher text

A

the encrypted data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

public key

A

widely available key that can be used to encrypt messages that only the owner of the private key can decrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

private key

A

key needed to decrypt data that has been encrypted by a public key and is used in asymmetric encryption which is not shared

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

similarities between priv and pub key

A

both used in asymmetric encryption
a pair of keys is required
one is used to encrypt data and the other is used to decrypt data
both are hashing algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

differences between priv and pub key

A

private key is only known to the owner of the key pair, public key can be distributed to anyone
when messages are sent to the owner of the public key they are encrypted with the owner’s public key so they can only be decrypted by the owner’s private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

symmetric key encryption

A

when only one key is used to encrypt and decrypt (sender and receiver share the secret key)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

asymmetric encryption

A

when two different keys are used (one for encryption and one for decryption)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

how does asymmetric encryption ensure that the message remains private

A

sender will encrypt the message with the receiver’s public key
receiver will decrypt the message with their private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

secure socket layer protocol (SSL)

A

when a user logs onto a website, SSL encrypts the data and only the client’s computer and the webserver are able to make sense of what is being transmitted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

process of setting up secure connection using SSL

A

browser requests that the server identifies itself
server sends a copy of its SSL certificate and its public key
browser checks the certificate against a list of trusted certificate authorities
if browser trusts certificate, it creates and sends the server a symmetric session key using the server’s public key
server decrypts the symmetric session key using its private key
server sends browser an acknowledgement encrypted with session key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

symmetric session key

A

when the client gains trust of the server after confirming the SSL certificate of it from a CA (certificate authority), the client creates a symmetric session key by using the public key of the server for that particular session
after this all messages are encrypted by that session key which is only known to the client and server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

transport layer security protocol (TLS)

A

recent security protocol
more secure than SSL
only some browsers have the capability to support TLS so SSL is widely used
provides encryption, authentication and data integrity in more effective way

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

record protocol

A

(main layer #1 of TLS) can be used with or without encryption, contains the data being transmitted over the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

handshake protocol

A

(main layer #2 of TLS) permits the web server and client to authenticate each other and to make use of encryption algorithm

17
Q

differences between SSL and TLS

A

it’s possible to extend TLS by adding new authentication methods unlike SSL
TLS can make use of session caching which improves overall performance of the communication when compared to SSL
TLS separates the handshaking process from the record protocol layer where all data is held

18
Q

session caching

A

when opening a TLS session a lot of time is required due to the complex cryptographic process
so the existing session can be used again

19
Q

what is the purpose of TLS

A

to provide secure communication over a network
to maintain data integrity
additional layer of security

20
Q

applications of TLS

A

online banking
private email
online shopping
online messaging

21
Q

security parameters agreed on b/w server and client during handshake

A

which protocol will be used => there are different versions of the 2 protocols
session ID => uniquely identifies a related series of messages b/w server and client
session type => reusable or not
encryption method => asymmetric or symmetric
authentication method => use of digital certificate or use of digital signature

22
Q

differences between a digital certificate and signature

A

certificate is obtained from an issuing authority while signature is created from a message
certificate provides authentication of owner while signature is used to authenticate a message sent by the owner
certificate remains unchanged while valid while signature is created for every message
signature makes use of private key and does not provide info while certificate provides info and does not use private key

23
Q

purpose of a digital signature

A

to ensure a document is authentic
to ensure a document has not been altered during transmission
the validity of contents cannot be denied

24
Q

how is a digital signature produced

A

a message is put thru agreed hashing algorithm
to produce a hash total also known as a message digest
the message digest is then encrypted using the sender’s private key

25
Q

how is a digital certificate obtained

A

an application is filed to an issuing certificate authority

26
Q

how is a digital certificate obtained

A

an application is filed to an issuing certificate authority (CA) with proof of identity e.g: name of organization/address
so their identity can be checked by organizational registration authority
so that a digital certificate will only be issued to a trusted organization

27
Q

items in a digital certificate

A

public key
agreed hashing algorithm
serial number
name of organisation
date valid from/to
signature
name of issuer
CA digital signature

28
Q

how is asymmetric encryption used to ensured that the message is verified

A

sender creates the message digest
receiver recreates the message digest
if both copied of message digest match then message has not been altered

29
Q

quantum computing

A

due to advancement in tech, the concept of quantum computers have been introduced which will easily be able to crack all encryption keys

30
Q

benefits of quantum cryptography

A

any eavesdropping can be identified
integrity of the key once transferred can be guaranteed
more secure keys can be exchanged

31
Q

drawbacks of quantum cryptography

A

requires a dedicated line and specialist hardware which can be expensive to implement
has a limited range
possible for polarisation of light to be altered due to various contions while travelling down fibre optic cable
terrorists and criminals can use the technology to hide their activities from government