chapter4 Flashcards

1
Q

IIS stands for

A

internet information server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

encryption technologies relies on

A

certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what does encryption mean

A

Ecryption means making data unreadable using a key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

give the 2 types of encryption

A

symmetric encryption, asymmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

explain symmetric encryption

A

Symmetric encryption is when both sides have the same identical key to encrypt/decrypt data, tha advantage of this is that it is fast and efficient enough for instant communication over the web, the disadvantage is how does one get the symmetric key safely to the other side/party, if the key is intercepted, all encryption is useless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

explain asymmetric encryption

A

Asymmetric encryption is when both sides have a different key from a so called key pair of two keys that belong together

Public key -> everything encrypted with public key can only be decrypted with a private key, the public key is sent to other parties and is publicy available, anyone can encrypt with the public key and send it to the server where only the server has the private key to decrypt and read this data = secure communication with the server

Private key -> everything encrypted with private key can be decrypted with a public key, the private key is never sent by the party that started using the key pair, data encrypted with the servers private key can be decrypted by anyone using the public key associated with that private key, this makes data readable by anyone, but if your private key fails you know the encrypted data did not come from the server as you think = cerntainty of where your message came from

Main advantage is that you can easily send the public key over the web to the other party, its the entire point of it, the big disadvantage is that the algorithm is slow, too slow to serve for constant instant communication over the web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

how can we verify that a certificate comes from a correct CA

A

All official CAs have a public key of their own for this purpose, they have encypted a piece of code using the corresponding private key and then attached that piece of code to all the certificates they issue, we call this piece of code the sign

All browsers have these public keys installed by default, so when a web server tries to decrypt the sign and it succeed, then the certificate has been issued by a legitimate CA, not possible ? then the certificate is not issued by a legitimate CA, and it is also called self-signed certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

HSTS stands for

A

HTTP strict transport security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

give the 3 directives included in the HSTS header

A

Max-age =<expire-time> -> the time in seconds that the browser should remember that a site is only to be accessed using HTTPS</expire-time>

includeSubDomains (optional) -> if this is specified, this rule applies to all of the site’s subdomains as well

preload (optional) -> browser will never try to connect to your domain using an insecure connection (denk ik)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is CSP and what does it stand for

A

CSP = content-security-protocol is the name of a HTTP
response header that modern browsers use to enhance the security of the document or web page. It allows you to restrict how resources such as javascript, css, or pretty much anything can be loaded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

give the 2 most relative points in secure cookies

A

HTTPonly -> By default, when there’s no restriction in place, cookies can be transferred not only by
HTTP, but any JavaScript files loaded on a page can also access the cookies. This
ability can be dangerous because it makes the page vulnerable to cross-site scripting
(XSS) attack.

Secure -> By default cookies are always sent on both HTTP and HTTPS requests. A malicious
attacker who can’t see encrypted traffic with HTTPS connection can easily switch to
HTTP connection and access the same cookie because it is not encrypted. Therefore,
the Secure flag is set to ensure that the cookie in encrypted when it’s created.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly