ECS - Week 4 Flashcards

1
Q

What is cryptography ?

A

Cryptography is the study of secure communications techniques that allow only the sender and intended recipient of a message to view its contents.

Cryptography is the art of keeping information secret and safe by transforming it into form that unintended recipients cannot understand.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 3 stages of data ?

A
  1. Data in rest - Data is stored in hard disk
  2. Data-in-motion - Data transferring on network
  3. Data in use - Data is use by applications, data in Ram,registers etc
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the special case of data at rest , securing data in motion ?

A

Data-at-rest can be thought of data flowing 10th temporally, data travel through time temporary .
Data at rest means data is in pendrive or hard disk, somebody stole your pen drive, then this should be considered as data at rest is in motion
You have a gmail password saved in textfile in pendrive, who stole pendrive can accesses gmail , two simultaneous logins at thr same time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is secure communication model ?

A

Confidentiality : Secure Channel,Encryption over Public Network
Integrity - Unchanged Data Data
Authenticity - User Exists on Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is confidentiality ?

A

Protecting data from unauthorised users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How we can confidentiality achieved ?

A

Securing communication channel medium ?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is encryption ?

A

Encryption is the method of encoding plain text into cypher text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is ciphertext ?

A

Encoded string of plain text
Encrypting the plain text with the shared key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Who is Auguste Kerckhoff?

A

Dutch Linguistic and cryptographer during 19th century

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Kerckhoffs’s principle

A

Kerckhoff’s principle is the concept that a Cryptographic system should be designed to be secure, even if all its details, except for the key, are publicly known. Only the key is kept secret
It means everything is known to public accept the key.
Keeping small keys secure is much easier than keeping the whole system secure
Changing the whole algorithm is a very hard task, but we can change the key on every time frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How many principles of wrote by Auguste Kerckhoff

A

Wrote six principles for practical cypher for design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which Kerckhoff principle is used in today cyber security

A

Second principle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are symmetric key algorithm

A

Symmetric key algorithm based on a simple principle,
The same key is used for encryption and decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the what is the drawback of symmetric key algorithm ?

A

Shared key should be pre-shared to get algorithms to work

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is data authentication

A

When communication is happening between A and B,
B want to verify that data is coming from actual source A.
This is called data authentication
Verifying the Actual Source of Data is coming from.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is call data origin authentication

A

Data integrity and data authentication is used together known as data origin authentication.
Data origin authentication request data should remain un-modified in transit, this is Data integrity
The receiver can verify the source of the message , this is authentication

17
Q

What is Data integrity

A

Unmodified data