CHAPTER: SECURITY Flashcards

1
Q

What is Encryption

A

it is the process of turning plain text into something that appears to be random and meaningless (cipher text)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Decryption

A

Decryption is the process of turning cipher text into plain text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Plain Text

A

It is the data before it is encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cipher Text

A

It is the data after an encryption algorithm is added to it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Four Security Concerns that are solved by encryption

A
  1. Confidentiality: only the intended recipient can view what the message says
  2. Authenticity: the receiver is sure of who the sender is

3, Integrity: cipher text mustnt be modified

  1. Non-Repudiation: neither sender nor receiver can state they didn’t take part in the transmission
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Symmetric Encryption

A

It is an encryption where the same key is used for encrypting and decrypting data. Symmetric Keys are shared

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Asymmetric Encryption

A

It is an encryption where two different keys are used.
The public key of the receiver encrypts the data and the private key of the reliever is used to decrypt the data (message)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Public Key

A
  • widely available
    -used to encrypt messages
    -only owner of private key can decrypt the data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Private Key

A
  • key that is used to decrypt the encrypted data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Similarities between the Keys

A

Both keys are used in asymmetric encryption
Both keys use hashing algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Difference between the Keys

A

The private key is only available to the owner of the key whereas the public key is shared

Messages are encrypted using the public key of the receiver

Message digests are encrypted using the sender’s private key to form digital signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Purpose of Quantum Cryptography

A
  • sends virtually unhackable messages using the laws of physics
  • detects eavesdropping as that changes the properties of the photons
  • allows to protect data being transmitted over fibre optic cables
  • allows for the use of longer keys
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Advantages of Quantum Cryptography

A
  • no eavesdropping
  • virtually unhackable
  • integrity of keys is guaranteed once transmitted
  • it is more secure as it uses the laws of physics as opposed to maths
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Disadvantages of Quantum Cryptography

A
  • lacks vital features like digital signatures
  • high cost of purchasing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Digital Certificate

A

ensures a document being transmitted is authentic and has not been altered during transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Contents of Digital Certificate

A

Digital Signature produced by CA
Certificate Serial Number
Subject Name
Hashing Algorithm
Date of Expiriy

17
Q

How to issue a Digital Certificate

A
  • the user starts an application for the Digital certificate on the computer
  • on the computer a key pair is generated
  • the user submits the application along with the required details and the public key
  • the data is encrypted using the CA’s public key
  • CA then created digital document with required details and signs using their private key
  • sends the certificate back to the user
18
Q

Digital Signature

A

it is a encrypted message digest that ensures if a document is authentic

19
Q

Issuing a Digital Signature

A

-CA uses a hashing algorithm
- generates message digest from particular certificate
- message digest encrypted using CA’s private key

20
Q

How Digital Signature is produced for transmission with message

A
  • message hashed with the agreed hashing algorithm to create the message digest
  • it is then encrypted using sender’s private key so digital signature can be decrypted with sender’s public key
21
Q

Differences between Digital Certificate and Signature

A

Certificate is from an issuing authority while Signature is created from the message
Certificate provides authentication of owner while Signature provides authentication of messages from owner
Certificate remains unchanged while valid while new signature for every message sent

22
Q

How server and browser establish secure connections for online transactions

A
  • browser requests the server to identify itself
  • server sends its digital certificate to browser
  • browser then checks the certificate against CA
  • if browser trusts then a symmetric session key is then generated
  • encrypted using the server’s public key and sent to server and server decrypts using its private key
23
Q

Descrive the process for esnureing software is unaltered and authentic

A
  • software put through hashing algortihm
  • hashtotal encrypted with private key and put in DS
  • DS sent to receiver
  • receiver decrypts using server’s public key
  • if sent has and received hash are the same, software unaltered and authentic
24
Q

What is a protocol:

A

it is a known set of rules
an agreed method of transmission

25
Q

Purpose of SSL and TLS

A
  • provides communication security ver a network
  • provides encryption
  • enables parties to identify and authenticate each other
  • and communicate with confidentiality and integrity
26
Q

Uses of SSL and TLS

A
  • online banking
    -online shoppin
  • private email
  • secure file transfer
27
Q

How SSL and TLS protocols used when between client and server

A
  • every new session begins with a handshake
  • client requests a digital certificate from the server
  • client verifies the digital certificate of the server
  • and obtains a public key
  • encryption algorithm agreed on and symmetric keys are generated
28
Q

Virus

A
  • it tries to attach and replicate itself inside other programs
  • it attacks files used to run and install software
  • to prevent install antivirus software and opt for daily scans
29
Q

Worm

A
  • it runs independently; propogates to other netowk hosts and reproduces itself
  • it attacks shared networks
  • to prevent set up firewalls to protect from external networks
30
Q

Spyware

A

it collects information from they typing of the keyboard and transmits to other systems

  • it usually attacks the in the background processes
  • to prevent install and use real time spyware protection