Computer security Flashcards
What is authentication?
The process of verifying someone’s identity
How can you verify authentication?
What you know, who you are, or what you have
What is authorization?
Finding out if a person is permitted to access a resource
What is Access control?
Controlling access to a resource based on time of day, position, web browser, department, etc.
What are the three types of encryption?
Symmetric, Asymmetric, and hash
How many keys does symmetric encryption use?
1
How many keys does asymmetric encryption use?
2 - public and private
What are examples of symmetric encryption?
AES and 3DES
What are examples of Asymmetric encryption?
RSA and ECC
What are examples of Hash?
SHA1, MD5
What kinds of changes can be applied to symmetric keys?
Sub bytes, shift rows, mix columns, add round key
What are the three phases of asymmetric encryption?
Key change, negotiation, communication
How does hashing work?
Hash(message, salt)=hash value (256 bit)
What is the salt?
The salt is mixed in with the message so it becomes impossible to unhash. Otherwise it could be done using Google
What does CIA stand for?
Confidentiality - how do we keep something secret
Integrity- How do we prevent modification/control
Availability - How to ensure something is ready when needed