cloud exam Flashcards
Compare and contrast the DES and AES encryption algorithms in terms of maximum possible number of unique keys, plaintext block size, and number of cipher rounds.
AES is more secure than DES because it has larger key sizes, larger block sizes, and a greater number of rounds. DES has a smaller key size, a fixed block size of 64 bits, and uses 16 rounds. AES has variable key sizes of 128, 192, or 256 bits, a variable block size of 128 bits, and uses 10 to 14 rounds depending on the key size.
Explain how an email can be made ‘non-refutable’
Emails can be made non-refutable by using a digital signature, which is a mathematical technique used to verify the authenticity and integrity of digital messages. The sender of the email signs the message with their private key, which can be verified by the recipient using the sender’s public key. This ensures that the message has not been tampered with and was indeed sent by the claimed sender.
. List the main variables/parameters associated with any implementation of a Fiestel Cipher
Variables/parameters of a Fiestel Cipher include:
Block size
Key size
Number of rounds
Subkey generation algorithm
Feistel function
Round function
S-boxes
. Describe the difference between diffusion and confusion in terms of cryptography.
Diffusion refers to the process of spreading the influence of a single plaintext bit across many ciphertext bits. Confusion refers to the process of hiding the relationship between the plaintext and the key. Together, they provide the high level of security needed for modern encryption algorithms.
Describe the difference between an unconditionally secure cipher and a computationally secure cipher.
Unconditionally secure ciphers provide perfect secrecy and are impossible to break even with infinite computing power, while computationally secure ciphers provide high-level security against attacks, but not perfect secrecy and could be broken if an attacker has unlimited computing power.
Describe what is meant when an encryption algorithm is said to exhibit a ‘strong avalanche effect’
Strong avalanche effect means a small change in plaintext or key results in a significant and unpredictable change in ciphertext, making it hard for attackers to find patterns or relationships between input and output, providing a high level of security.
. Briefly explain why asymmetric encryption won’t replace symmetric encryption for all network security.
Asymmetric encryption is slower and requires more processing power than symmetric encryption, and is not practical for encrypting large amounts of data. Symmetric encryption is faster and more efficient for encrypting large amounts of data, while asymmetric encryption is better suited for tasks like key exchange and digital signatures. Thus, asymmetric encryption cannot replace symmetric encryption for all network security.
Explain why using one-time key encryption is said to be the strongest method of encryption
One-time pad encryption provides perfect secrecy, making it unbreakable and the strongest method of encryption. However, it is only practical for encrypting small amounts of data and requires a secret key that must be kept secure.
Describe what a digital signature is and briefly explain how one is constructed. (6 marks)
A digital signature is a mathematical technique that verifies the authenticity and integrity of digital messages. It is constructed using a hash function and a public key encryption algorithm such as RSA or DSA. The sender encrypts the hash value with their private key and the recipient verifies it using the sender’s public key.
Briefly explain how secure a computationally secure cipher actually is.
A computationally secure cipher provides a high level of security against current computing resources but is not unbreakable. Security depends on the key size and encryption algorithm.
Using a diagram and an example, briefly describe NAT and how it makes a network more secure.
NAT (Network Address Translation) is a technique that modifies IP addresses in transit across a network. It maps private IP addresses to a public IP address to allow a network to use a single public IP address to communicate with the internet. This makes a network more secure by hiding the private IP addresses of devices on the network from the internet, making it more difficult for attackers to directly target devices on the network.
Discuss 5 drawbacks of IPv4 and how IPv6 addresses those drawbacks. (10 marks)
IPv4 has limited address space, lacks built-in security, has complex network management, fragmentation issues, and requires manual configuration. IPv6 solves these issues with a larger address space, built-in security, hierarchical structure, avoidance of fragmentation, and auto-configuration features.
State the FIVE requirements that a public key cryptosystem must fulfil in order to be considered a secure algorithm
confidentiality
integrity
authencitiy
non-repudiation
key management
Briefly describe THREE of the major flaws in WEP’s encryption mechanism. (10 marks)
Three major flaws in WEP’s encryption mechanism are:
Weak key generation: WEP uses a weak key generation process that allows attackers to easily predict and reproduce the key, making it vulnerable to attacks.
Reuse of initialization vectors (IVs): WEP uses the same IVs for multiple packets, which can allow attackers to collect enough packets to crack the encryption key.
Lack of message integrity: WEP does not provide message integrity, allowing attackers to modify the message without being detected.
List the security threats categorised by the STRIDE model. (6 marks)
The STRIDE model categorizes security threats as follows:
Spoofing: an attacker pretends to be someone else to gain access to information or systems.
Tampering: an attacker alters data in transit or storage to manipulate system behavior.
Repudiation: an attacker denies involvement in an action or transaction.
Information disclosure: an attacker gains access to or discloses sensitive information.
Denial of service: an attacker disrupts normal system operation by overwhelming it with requests.
Elevation of privilege: an attacker gains unauthorized access to system resources or privileges.
List NINE potential confidentiality concerns associated with moving corporate data from a corporation’s own on-premises local network to a public Cloud. (9 marks)
Here are nine potential confidentiality concerns associated with moving corporate data from a corporation’s own on-premises local network to a public cloud:
Unauthorized access to data by cloud service provider staff.
Data leakage due to misconfiguration of cloud services.
Insider threats from employees of the cloud service provider.
Insecure data storage in the cloud.
Insufficient data encryption and key management in transit and at rest.
Lack of control over data backup and recovery in the cloud.
Cloud service provider’s lack of transparency on security practices.
Legal and regulatory compliance issues.
Loss of physical control over data storage and processing.
Outline FIVE additional security concerns to consider when using mobile phones for confidential business computing rather than using an in-house LANconnected corporate PC. (10 marks)
Here are five additional security concerns to consider when using mobile phones for confidential business computing rather than using an in-house LAN-connected corporate PC:
Loss or theft of mobile devices, which can result in unauthorized access to corporate data.
Insecure communication channels, which can make it easier for attackers to intercept data.
Limited control over mobile device security settings and configurations.
Insecure mobile applications that can lead to data breaches and other security incidents.
The potential for malware and other malicious software to compromise the security of mobile devices and the data they contain.