Domain 3 - Security Architecture and Engineering Flashcards

1
Q

Caesar Cipher

A

Simple substitution cipher – Moved character 3 spaces

Subject to package analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Symmetric Vs Asymmetric

A

Symmetric - same key to encrypt and decrypt

Asymmetric - different keys to encrypt and decrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Vignere cipher

A

First polyalphabetic cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Enigma machine

A

used by Japan during WWII

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

PAIN of cryptography

A
PAIN 
Privacy
Authenticity
Integrity
Non-repudiation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Initialization vector

A

Random bit string added that is the same length as the block size. XOR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Name a stream cipher

A

RC4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Symmetric

A

Relies on the use of a shared secret key

Pros
-Fast 
-Good strong privacy 
Cons
-out of band key distribution
-doesn't scale well
-does not provide non-repudiation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Symmetric cipher types

A

Stream

Block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Asymmetric cryptography

A

Every user has a key pair - private and public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Asymmetric Algorithms

A

SA’s
E’s
DH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Asymmetric Algorithms

A
SA's
RSA & DSA 
ECC & El Gamal
DH (Dougie Houseer has a backpack)
Diffie Hellman & Knapsack
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Standard for digital signatures

A

RSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What algorithm uses factorization

A

RSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

First asymmetric algorithm

A

Diffie Hellman

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ECC

A

Elliptical Curve Cryptography

Based on points on a curve
Very efficient but only for key agreement (digital signatures)
Used on handheld devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Usually the standard and answer for any Symmetric questions….

A

AES

Unless PGP then its IDEA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What keys are mathematically related

A

Asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Birthday attack

A

attempts to find collisions in hash functions

20
Q

MD-5 how many bits

A

128

21
Q

SHA-1 how many bits

A

160

22
Q

SHA-2 how many bits

A

256, 384, 512….

23
Q

Transposition cipher

A

uses an encryption algorithm to rearrange the letters of a plaintext message

24
Q

Stream ciphers

A

Caesar - one
Vignere - word or sentence
One-time pad - key as long as the message itself

25
Q

zero - knowledge proof

A

enables one to prove knowledge of a fact without revealing the fact itself

26
Q

split knowledge

A

ensures that no single person has sufficient privileges to compromise the security of an environment

27
Q

Work function/Work factor

A

Time and effort required to break a protective mechanism

28
Q

DES and 3DES modes

A

Electronic Codebook Mode (ECB). Simplest and least secure

Cipher Block Chaining (CBC).

Cipher Feedback (CFB) .. uses chaining so error propagate

29
Q

XOR Cipher

A

Flipping of bits

binary values match = 0
don’t match = 1

30
Q

IPSEC two modes

A

Transport Mode
Tunnel Model

Protocols - Authentication Header (AH)
Encapsulating Security Protocol (ESP)

31
Q

Replay attack

A

an attempt to reuse authentication requests

32
Q

Security Models

A

Integrity (focus)

  • Biba (State machine model)
  • Clark-Wilson - access control triple—question is about lattice
  • Goguen-Meseguer

Confidentiality
-Bell-LaPadula - no read up, no read down-state machine that enforces confidentiality..uses MAC to enforce security policy

  • Brewer and Nash
  • Take Grant
33
Q

Bell LaPadula security model

A

Enforces confidentiality
Uses MAC to enforce DoD multilevel security policy (Gov)

Cannot read up
Cannot write down

34
Q

Biba security model

A

Integrity
No read down
No write up

35
Q

Clark-Wilson

A

Integrity
No read down
No write down

36
Q

Take Grant model

A

confidentiality based

supports four basic operations - take, grant, create, and revoke

37
Q

Brewer and Nash (Chinese Wall)

A

Confidentiality based

developed to prevent conflict of interest

38
Q

Graham-Denning model

A

Focused on the secure creation and deletion of both data and subjects

39
Q

Trusted Platform Module

A

Chip that resides on the motherboard chip

40
Q

Access control types

A

Mandatory (MAC) - enforces policy that is determined by the system, not the object owner. Relies on classification labels.

41
Q

Discretionary Access Control (DAC)

A

Permits the owner or creator of an object to control and define its accessibility

42
Q

Non-discretionary access control

A

Enables the enforcement of system-wide restrictions that override object-specific access control.

43
Q

Rule based access control

A

Usually found in firewalls

44
Q

Role-Based Access Control

A

Uses well-defined collection of named job-roles that have specific permissions.

45
Q

Techniques for ensuring CIA.

A

Confinement - restricts a process to reading from and writing to certain memory locations.

Bounds - limits of memory a process cannot exceed when reading or writing.

Isolation - the mode a process runs in when it is confined through the use of memory bounds.