Chapter 3 Flashcards

1
Q

Algorithm

A

A set of rules and procedures, usually mathematical in nature. Algorithms can define how the encryption and decryption processes operate. Often very complex, many algorithms are publicly known; anyone can investigate and analyze the strengths and weaknesses of an algorithm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Assymetric Cryptography

A

A means of encoding and decoding information using related but different keys for each process. A key used to encode cannot decode, and vice versa. Cryptography based on algorithms that use either key pairs or some other special mathematical mechanism. Asymmetric cryptography that uses key pairs is commonly known as public key cryptography. Different keys serve different purposes. Different keys are used by different members of the communication session. Some systems use something different from keys altogether.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Authentication, authorization, and accounting

A

Programs used to control access to computer resources, enforce policies, audit usage, and provide billing information. Examples include RADIUS, TACACS, 802.1x, LDAP, and Active Directory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Authenticity

A

The security service of the combination of authentication and access control (authorization) that provides either the identity of the sender of a message or controls who is the receiver of a message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Avalanche effect

A

A common feature of hash algorithms. This effect ensures that small changes in the input data produce large changes in the outputted hash value. A single binary digit change in a file should produce a clearly recognizable differ-ence in the resultant hash value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Certificate authority (CA)

A

A trusted third-party entity that issues digital certificates to verify and validate identities of people, organizations, systems, and networks digitally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Channel

A

A communication pathway, circuit, or frequency dedicated or reserved for a specific transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Ciphertext

A

The seemingly random and unusable output from a cryptographic function applied to original data. Ciphertext is the result of encryption. Decryption converts ciphertext back into plaintext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Client-to-server VPN

A

A VPN created between a client and a server either within the same local network or across a WAN link or intermediary network to support secure client interaction with the services of a resource host. Also known as a host-to-host VPN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Corporate firewall

A

An appliance firewall placed on the border or edge of an organization’s network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Decryption

A

The process of converting cipher text back into plain text.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Dedicated connection

A

A network connection that is always on and available for immediate transmission of data. Most leased lines are dedicated connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Dedicated leased line

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Digital certificate

A

An electronic proof of identity issued by a certificate authority (CA). A digital certificate is an entity’s public key encoded by the CA’s private key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Digital envelope

A

A secure communication based on public-key cryptography that encodes a message or data with the public key of the intended recipient.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Digital signature

A

A public-key cryptography–based mechanism for proving the source (and possibly integrity) of a signed dataset or message. A digital signature uses the private key of a sender. Not the same as a “digitized signature,” which is a digital image of handwriting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Distributed LAn

A

A LAN whose components are in multiple places that are interconnected by WAN VPN links.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Eavesdropping

A

The act of listening in on digital or audio conversations. Network eavesdropping usually requires a sniffer, protocol analyzer, or packet capturing utility. Eavesdropping may be able to access unencrypted communication, depending on where it occurs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Edge Router

A

A router positioned on the edge of a private network. Usually an edge router is the last device owned and controlled by an organization before an ISP or telco connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Extranet VPN

A

A VPN used to grant outside entities access into a perimeter network; used to host resources designated as accessible to a limited group of external entities, such as business partners or suppliers, but not the general public.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Fragmentation

A

This occurs when a dataset is too large for maximum supported size of a communication container, such as a segment, packet, or frame. The original dataset divides into multiple sections or fragments for transmission across the size-limited medium, then reassembles on the receiving end. Fragmentation can sometimes corrupt or damage data or allow outsiders to smuggle malicious content past network filters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Hardware VPN

A

A dedicated device hosting VPN software. Also known as an appliance VPN. Hardware VPNs can connect hosts and/or networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Hash

A

The unique number produced by a hash algorithm when applied to a dataset. A hash value verifies the integrity of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Hash algorithm

A

A set of mathematical rules and procedures that produces a unique number from a dataset.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Hash value

A

The unique number produced by a hash algorithm when applied to a dataset. A hash value verifies the integrity of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Hashing

A

The process of verifying data integrity. Hashing uses hash algorithms to produce unique numbers from datasets, known as hash values. If before and after hash values are the same, the data retain integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

host-to-host VPN

A

A VPN created between two individual hosts across a local or intermediary network. Host-to-host VPNs is also known as client-to-server or remote-to-office or remote-to-home VPNs.

28
Q

Host-to-site VPN

A

A VPN created between a host and a network across a local or intermediary network. Also known as a remote access VPN.

29
Q

Hybrid VPN

A

A form of VPN establishing a secure VPN over trusted VPN connections.

30
Q

Identity proofing

A

The act of authentication. Confirming the identity of a user or host.

31
Q

Intermediary network

A

Any network, network link, or channel located between the endpoints of a VPN. Often the Internet.

32
Q

Key or encryption key

A

The unique number used to guide an algorithm in the encryption and decryption process. A valid key must be within the keyspace of an algorithm.

33
Q

Key exchange

A

The cryptographic function ensuring that both endpoints of a commutation have the same symmetric key. Key exchange occurs by simultaneous key generation or with a digital envelope.

34
Q

Key pair

A

The set of associated keys including a public key and a private key used by public key cryptography. Only the public key can decrypt data encrypted by the private key, and vice versa.

35
Q

Keyspace

A

The range of valid keys used by an algorithm. Keyspace is the bit length of the keys supported by the algorithm.

36
Q

Leased line

A

A network communications line leased from an ISP or telco service. A leased line is usually a dedicated line between network locations or to the Internet.

37
Q

Non-dedicated Connection

A

A network connection not always on and available for immediate trans-mission of data. A connection must be established through a negation process before the channel is open and ready for data transmission. Dial-up, ISDN, and DSL lines are non-dedicated connections.

38
Q

Nonrepudiation

A

A security service that ensures that a sender cannot deny sending a message. This service can be provided by public key cryptography, typically through a digital signature.

39
Q

One-time pad

A

A form of cryptography in which each encryption key is used once before being discarded. Keys are pseudorandom and never repeat. Key length must match message length, so that each character is encrypted with a unique key character.

40
Q

One-way function

A

A mathematical operation performed in one direction relatively easily; reversing the operation is impossible—or nearly so.

41
Q

Optical Carrier (OC)

A

A form of network carrier line, often leased or dedicated, which uses fiber optic cables for very high-speed connections. An OC-1 connection supports a throughput of 51.84 Mbps.

42
Q

Out of band

A

A method of communication through an alternative route, mechanism, or pathway than the current one employed (the current communication is known as “in band”). Commonly used as a technique for secured data exchange or verification of an identity.

43
Q

Private branch exchange (PBX)

A

A type of business telephone network. PBX systems allow for multiple phone extensions, voice mailboxes, and conference calling. PBX systems require specialized equipment. PBX systems are largely being replaced by VOIP (Voice over IP) solutions.

44
Q

Private key

A

The key of the public key cryptography key pair kept secret and used only by the intended entity. The private key decodes information encoded with its associated public key, encrypting information that can be decrypted only by its associated public key. This process validates the identity of the originator and creates a digital signature.

45
Q

Pseudo random number generator

A

The mechanism of computer systems that produces partially random numbers using a complex algorithm and a seed value that is usually time based. Computers are currently unable to produce true random numbers and a PRNG approximates randomness.

46
Q

Public Key

A

The key of the public key cryptography key pair shared with other entities with whom the holder of the private key wishes to correspond. The public key decodes messages encoded with its associated private key, originates messages that only the holder of the associate private key can decrypt, and creates digital envelopes.

47
Q

Public key cryptography

A

A subset of asymmetric cryptography based on the use of key pair sets. Public key cryptography uses public and private keys to create digital envelopes and digital signatures.

48
Q

Public network

A

Any network that accessible by entities from outside an organization. Most often, use of this term implies the Internet, but many other public networks exist.

49
Q

Rekeying

A

The process of triggering the generation of a new symmetric encryption key and secure exchange of that key. Rekeying can take place based on time, idleness, volume, randomness, or election.

50
Q

Remote access VPN

A

Another name for host-to-site VPN.

51
Q

Remote-to-home VPN

A

A VPN used to connect a remote or mobile host into a home computer or network. Also known as a host-to-host VPN.

52
Q

Remote-to-office VPN Scalability

A

A VPN used to connect a remote or mobile host into office network workstation. Also known as a host-to-host VPN.

53
Q

Secured VPN

A

A VPN that uses encryption to protect the confidentiality of its transmissions.

54
Q

Site-to-site VPN

A

A VPN used to connect networks. Also known as a LAN-to-LAN VPN and WAN VPN.

55
Q

Software VPN

A

A VPN crafted by software rather than hardware. Software VPN may be a feature of the operating system or a third-party application.

56
Q

Split Tunnel

A

A VPN connection that allows simultaneous access to the secured VPN link and unsecured access to the Internet across the same connection.

57
Q

Symmetric cryptography

A

Cryptography based on algorithms that use a single shared secret key. The same key encrypts and decrypts data and the same key must be shared with all communication partners of the same session.

58
Q

Traffic congestion

A

The problem when too much data crosses a network segment. This results in reduced throughput, increased latency, and lost data.

59
Q

Trusted third party

A

A mechanism of authentication using a third entity known and trusted by two parties. The trusted third party allows the two communicating parties, who were originally strangers to each other, to establish an initial level of inferred trust.

60
Q

Trusted VPN

A

A VPN whose components are wholly owned by the organization it serves.

61
Q

Virtual private network (VPN) VPN appliance

A

A mechanism to establish a secure remote access connection across an intermediary network, often the Internet. This allows inexpensive insecure links to replace expensive security links. VPNs allow for cheap long-distance connections established over the Internet. Both endpoints need only a local Internet link. The Internet itself serves as a “free” long-distance carrier. VPNs employ encapsulation and tunneling protocols, such as IPSec.
A hardware VPN device

62
Q

WAN VPN

A

A VPN between two networks over an intermediary network. Also known as LAN-to-LAN VPN and site-to-site VPN.

63
Q

multi factor authentication

A

Authentication that requires multiple valid proofs of identity used in simultaneous combination.

64
Q

LAN-to-LAN VPN

A

A VPN between two networks over an intermediary network. Also known as WAN VPN and site-to-site VPN.

65
Q

compression

A

Removal of redundant or superfluous data or space to reduce the size of a data set. Compression consumes less storage space and increases the speed of data transmission.

66
Q

Cryptography

A

The art and science of hiding information from unauthorized third parties. Cryptography is divided into two main categories: encryption and decryption.