Domain 3 Flashcards
Algorithm is now considered as insecure
Merkle-Hellman Knapsack
Access data on 1 account/customer and cannot access other accounts
Brewer Nash
DNS Poisoning can result to
Man in the Middle
two modes that provide both confidentiality and data authenticity
GCM
Maximum bit SHA can provide
256
doubles the length of any message it encrypts
El Gamal
Cipher mode allows you to break encryption into multiple independent steps
CBC
Poses greater risk of accidental discharge in Data Center
Wet Pipe
Is best type water based fire suppression for a computer facility
Preaction
proprietary system that uses unpublished protocols
Closed system
DOS Attack uses ICMP echoes and work in Layer 3
Smurf Attack
DOS Attack uses UDP works in Layer 4
Fraggle Attack
attack causing type of external fault such as application high voltage electricity
Fault Injection
Attack rely on flaw in the cryptographic algorithm
Implementation Attack
Syn Attack is working in which OSI Layer
Layer 4
Contains list of public key that has been revoked
CRL
CRL disadvantage introduce
Latency
RSA use Cipher or Prime Numbers
Prime numbers
is a security standard that is focused on security governance
ISO27001 or ISO27002
ISO 27001
Is security standard based on industry standard security based control
ISO 27002
Linear cryptanalysis is known
Plaintext attack
Too much data sent to the same memory location
Buffer overflow
allows the exchange of symmetric encryption keys betweeen two parties over an insecure channel
DH
provides confidentiality integrity and authentication
AES
are outdated and no longer considered secure
DES and 3DES
Used to increase the strength of cryptography by creating a unique ciphertext every time the same message is encrypted with the same key
IV
Digital signature provides which of the following?
Integrity
Authentication
Confidentiality
Integrity
strong star states that enforces that a subject can only perform both read/write within same security level
Bell Lapadula