Chapter 3 Flashcards
Algorithm
A set of rules and procedures, usually mathematical in nature. Algorithms can define how the encryption and decryption processes operate. Often very complex, many algorithms are publicly known; anyone can investigate and analyze the strengths and weaknesses of an algorithm.
Assymetric Cryptography
A means of encoding and decoding information using related but different keys for each process. A key used to encode cannot decode, and vice versa. Cryptography based on algorithms that use either key pairs or some other special mathematical mechanism. Asymmetric cryptography that uses key pairs is commonly known as public key cryptography. Different keys serve different purposes. Different keys are used by different members of the communication session. Some systems use something different from keys altogether.
Authentication, authorization, and accounting
Programs used to control access to computer resources, enforce policies, audit usage, and provide billing information. Examples include RADIUS, TACACS, 802.1x, LDAP, and Active Directory.
Authenticity
The security service of the combination of authentication and access control (authorization) that provides either the identity of the sender of a message or controls who is the receiver of a message.
Avalanche effect
A common feature of hash algorithms. This effect ensures that small changes in the input data produce large changes in the outputted hash value. A single binary digit change in a file should produce a clearly recognizable differ-ence in the resultant hash value.
Certificate authority (CA)
A trusted third-party entity that issues digital certificates to verify and validate identities of people, organizations, systems, and networks digitally.
Channel
A communication pathway, circuit, or frequency dedicated or reserved for a specific transmission.
Ciphertext
The seemingly random and unusable output from a cryptographic function applied to original data. Ciphertext is the result of encryption. Decryption converts ciphertext back into plaintext.
Client-to-server VPN
A VPN created between a client and a server either within the same local network or across a WAN link or intermediary network to support secure client interaction with the services of a resource host. Also known as a host-to-host VPN.
Corporate firewall
An appliance firewall placed on the border or edge of an organization’s network.
Decryption
The process of converting cipher text back into plain text.
Dedicated connection
A network connection that is always on and available for immediate transmission of data. Most leased lines are dedicated connections.
Dedicated leased line
Digital certificate
An electronic proof of identity issued by a certificate authority (CA). A digital certificate is an entity’s public key encoded by the CA’s private key.
Digital envelope
A secure communication based on public-key cryptography that encodes a message or data with the public key of the intended recipient.
Digital signature
A public-key cryptography–based mechanism for proving the source (and possibly integrity) of a signed dataset or message. A digital signature uses the private key of a sender. Not the same as a “digitized signature,” which is a digital image of handwriting.
Distributed LAn
A LAN whose components are in multiple places that are interconnected by WAN VPN links.
Eavesdropping
The act of listening in on digital or audio conversations. Network eavesdropping usually requires a sniffer, protocol analyzer, or packet capturing utility. Eavesdropping may be able to access unencrypted communication, depending on where it occurs.
Edge Router
A router positioned on the edge of a private network. Usually an edge router is the last device owned and controlled by an organization before an ISP or telco connection.
Extranet VPN
A VPN used to grant outside entities access into a perimeter network; used to host resources designated as accessible to a limited group of external entities, such as business partners or suppliers, but not the general public.
Fragmentation
This occurs when a dataset is too large for maximum supported size of a communication container, such as a segment, packet, or frame. The original dataset divides into multiple sections or fragments for transmission across the size-limited medium, then reassembles on the receiving end. Fragmentation can sometimes corrupt or damage data or allow outsiders to smuggle malicious content past network filters.
Hardware VPN
A dedicated device hosting VPN software. Also known as an appliance VPN. Hardware VPNs can connect hosts and/or networks.
Hash
The unique number produced by a hash algorithm when applied to a dataset. A hash value verifies the integrity of data.
Hash algorithm
A set of mathematical rules and procedures that produces a unique number from a dataset.
Hash value
The unique number produced by a hash algorithm when applied to a dataset. A hash value verifies the integrity of data.
Hashing
The process of verifying data integrity. Hashing uses hash algorithms to produce unique numbers from datasets, known as hash values. If before and after hash values are the same, the data retain integrity.