E5 Security Flashcards
Why are weak passwords a significant problem in networks?
Because hackers can get in and cause troubles
List three true measures of password quality.
Is it easy for you to remember? Is it difficult to guess? Is it difficult for others to remember?
What is a dictionary attack?
It is using a long list of likely passwords in hope of finding one that works
List two types of bad passwords.
(a) anything short, (b) anything in a dictionary
What do I recommend for a password?
Initials of a familiar phrase
What is a high-value password?
A password to protect a high-value asset.
What is a low-value password?
A password to protect a low-value asset
Does it matter if a low-value password is easy to guess?
Not much
List four ways to prove identity.
What you have. What you know. What you are. What you can do.
What is multi-factor authentication?
Several UNRELATED factors must be presented.
What is single sign-on?
You authenticate once and then receive credentials that are (a) used on related website (b) in place of authenticating again.
What is a hacker?
Someone that goes beyond the routine ways of using a tool.
Is hacking bad?
no
What does black hat mean?
It means a bad-guy hacker
What does white hat mean?
It means the good-guy (ethical) hacker
What is pen testing?
penetration testing
What are symmetric keys?
Encryption keys that cancel each other out are symmetric.
What does rot13 stand for?
rotate thirteen
How does rot13 work?
Each letter is replaced by the one 13 places away.
Who knows Alice’s public key?
everybody
Who knows Alice’s private key?
alice
How do you send a private message to Bob?
Encrypt it with Bob’s public key.
What is the purpose of encrypting a message?
Prevent others from understanding it.
What is the purpose of signing a message?
Prove authorship.
How do you sign a message?
Encrypt it with your private key.
How does signing prove authorship?
Only with the person with a private key could have encrypted it. They must be the source.
How can Bob send a private, authenticated message to Alice?
First, encrypt it with Bob’s private key to prove authorship. Second, encrypt the result with Alice’s public key to provide privacy.
Why are public-key systems special?
They let us create a shared secret between parties that did not already know each other.
Why is RSA special?
It easily creates good public key.
What is a prime number?
A number with no proper factors.
Why are prime numbers used in encryption?
It is easy to multiply two large prime numbers, but it is difficult to find the original numbers.
What does the RSA private key consist of?
Two large prime numbers are chosen.They are the private key
What does the RSA public key consist of?
The large number of the private key are multiplied together. The result is the public key
If RSA is so great, why are other things used?
other things are faster
Is http considered to be secure? Why?
No. Traffic (data) is not encrypted.
Is https considered to be secure? Why?
Yes. Traffic (data) is encrypted.
What does SSL stand for?
secure socket layers
What does TLS stand for?
transport layer security
How does SSL protect confidentiality of a TCP connection?
Traffic is encrypted to hide its meaning
What is an Outside Threat?
A threat by a machine outside your LAN
What is a botnet?
A network of computers comtrolled by a hacker, usually without the knowledge of their real owners.
For what two things are botnets commonly used?
Sending spam, Doing attacks
What does DDOS stand for?
distributed denial of service
What is a zombie?
a computer that is part of a botnet.
What does PWN stand for?
own
What is an Inside Threat?
A threat by a machine inside your LAN
What two things does server mean?
A program that provides service, a computer where such a program runs.
How can firewalls mitigate network attacks against servers?
They can control the number of incoming requests based on IP address.
How can firewalls mitigate network attacks against clients?
They can prevent all uninvited access from outside the LAN.
What does DMZ stand for?
demilitarized zone
What service does DMZ provide?
It directs unexpected network traffic on all ports to one designated machine.
What service does port forwarding provide?
It directs unexpected network traffic on a few ports to a designated machine.
How can sharing your Wi-Fi be dangerous?
Bad people might get directly into your LAN. This bypasses your main Firewall.