CHAPTER 8 SECURING INFORMATION SYSTEMS Flashcards
Protocol used for encrypting data flowing over the internet; limited to individual messages
S-HTTP (Secure Hypertext Transfer Protocol)
Enables client and server computers to manage encryption and decryption activities as they communicate with each other during a web session
SSL (Secure Sockets Layer)
Data file used to establish the identity of users and electronic assets for protection of online transactions. Uses certification authority (CA) to validate a user’s identity. CA verifies user’s identity, stores information in CA server, which generates encrypted digital certificate containing owner ID information and copy of owner’s public key
Digital certificate
- Uses two, mathematically related keys: public key and private key
- Sender encrypts message with recipient’s public key
- Recipient decrypts with private key
Public key encryption
Use of public key cryptography working with certificate authority. Widely used in e-commerce
Public key infrastructure (PKI)
Sender and receiver use single, shared key
Symmetric key encryption
Two methods of encryptions are:
- Symmetric key encryption
- Public key encryption
Transforming text or data into cipher text that cannot be read by unintended recipients
Encryption
Are products that include multiple security features integrated into one box
Unified Threat Management (UTM) systems
Check computers for presence of malware and can often eliminate it as well. Require continual updating.
Antivirus and antispyware software
Monitor hot spots on corporate networks to detect and deter intruders. Examine events as they are happening to discover attacks in progress.
Intrusion detection systems
Combination of hardware and software that prevents unauthorized access to network
Firewall
Uses systems that read and interpret individual human traits, such as fingerprints, irises, and voices, in order to grant or deny access
Biometric authentication
A device about the size of a credit card that contains a chip formatted with access permission and other data
Smart card
A physical device, similar to an identification card, that is designed to prove the identity of a single user
Token
Authentication is often established by using passwords known only to authorized users
Passwords