Confidentiality Flashcards

1
Q

Technology that supports confidentiality

A

Firewall, encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

DES

A

Data Encryption Standard

Symmetric, Weak, 56-bit key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

3DES

A

Tripe DES

Symmetric, Strong, three 56-bit (168-bit) keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AES

A

Advanced Encryption Standard

Symmetric, Preferred, 128/192/256-bit key options

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Symmetric Encryption

A

Same key used by sender and receiver. Faster than asymmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Asymmetric Encryption

A

Better security/slower than symmetric encryption. Not used for large quantities of real-time data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

RSA

A

Invented by Rivest, Shami, and Adleman

Assymmetric, used with PKI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

PKI

A

Public Key Infrastructure

uses digital certificates and CA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CA

A

Certificate Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Packet Capture

A

Packets captured using NIC placed in promiscuous mode. Protocols that send plan text are vulnerable (Telnet, HTTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Ping sweep / port scan

A

Reconnaissance Attacks Ping sweep finds network resources that are reachable. Range of ports scanned to find which services are available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Dumpster Diving

A

Rummaging through dumpsters to find confidential information that wasn’t properly shredded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

EMI

A

Electromagnetic Interference
Attackers intercept EMI emissions (emanations).
Tempest rooms keep emanations contained.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Wiretapping

A

Eavesdropping on a physical cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

MitM

A

Man-in-the-Middle

Attacker in between two devices communicating. Used with spoofing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Social Engineering

A

Social techniques used to get information.