Cryptography Flashcards
_ is the process of communicating confidential information In an unreadable format between legitimate users
Cryptography
Cryptography intercepts _ types of data’s accessibility
Unauthorised
What is the meaning of crypt?
Hidden and writing
What are applications of cryptography?
Digital signature
Authentication
Key generation
What principles of cryptography explains that transmitted data in air must be read by the authentic user
Privacy
Serves as a gateaway between a trusted and untrusted network that limited, authorised to untrusted hosts
Bastion hosts
A basic network mapping technique that helps narrow the scope all attack
Bridges
Layering model structured into four layers
TCP/IP or department of defense model
Provides connection - oriented data management and reliable data transfer
Transmission Control Protocol TCP
Provides a lightweight service for connectionless data transfer without error detection and correction
User datagram protocol UDP
A virtual private network (VPN) is an entrusted network tunnel two that allows to securely communicate over an untrusted network
True
The OSI model is broken into seven layers - name them
Application layer
Presentation layer
Session layer
Transport layer
Network layer
Data link layer
Physical layer
Firewalls as devices that enforce administrative security policies filtering incoming traffic based on a set of rules
True
Fibre channel over Ethernet (FCoE) is a statefull protocol that requires two communication channels
False
Transmission control protocol (TCP) provides connection-oriented data management and reliable data transfer
True
Hardware or software implementation of cryptography that transforms a message into ciphertext and back to plaintext
Cryptosystem
Instance of 2 different keys generating the same ciphertext from same plaintext
Key clustering
A range of possible values used to construct keys
Keyspace
Estimated time, effort or resources necessary to break a cryptosystem
Work factor