Cryptography Flashcards

1
Q

Cleartext Protocols

A

Transmits data over the network without any kind of transformation (encryption). Should only be used on “trusted” networks.

Attack Landscape: Easy to eavesdrop on, intercept, or modify

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cryptographic Protocols

A

Transform (encrypt) the information transmitted to protect communication. There are many goals of these protocols but one is to prevent eavesdropping.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What should you do if you need to run a clear-text protocol on an untrusted network?

A

You can wrap (tunnel) a clear-text protocol in a cryptographic one.

Example: VPN - protocol tunneling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Virtual Private Network (VPN)

A

Uses Cryptography to extend a private network over a public one, like the internet.

The extension is made by performing a protected connection a private network. From the client point of view, being in the VPN is the same as being directly connected to the private network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly