Final Flashcards
Three Modes/Use Cases for VPN
host to host, host to LAN, LAN to LAN
VLAN
virtual local area network, virtually isolated networks from each other in a LAN
three kinds of ciphers in cryptogtaphy
symmetric, public-key, one-way hashes
VPN: full tunnels vs. split tunnels
full tunnel encrypts all traffic, split tunnels only select traffic
proxy
a gateway/sever between the internet and users that processes your traffic and gives response back to you
what does cryptography do/help with?
data protection, authentication, digital signature, data integrity
public-key ciphers
two keys (public and private) undo whatever the other key did and vice versa (reversible)
symmetric-key cipher
secret codeword/key both locks and unlocks data which is being protected (reversible)
one-way hash / message digest
mapping functions from large set to a smaller set, collisions inevitable, but not predictable, it is irreversible…ex: SHA256, MD5(not used), SHA1(not used)
block cipher vs stream cipher
block cipher from plain text to fixed size, stream encrypts one bit at a time (variable length)
DMZ
Demilitarized Zone, is like a buffer zone between a private/internal network and the outside world, typically the internet. It’s designed to provide an extra layer of security for sensitive systems within a network.
ways to break crypto
brute force, implementation mistakes, knowing some of the message, denial of service, social engineering( rubber-hose cryptography)
cryptography authentication
can use certificates
midterm: 3 ways to authenticate
something you know(passwords, personal IDs) , are(fingerprint, iris), have(phone, email)
how do cryptosystems work to do message encryption
they take a low entropy text and turn it into a high entropy ciphertext which is mathematically indistinguishable from random data, in public keys, encrypt message using recivers public key, and decrypt with recievers private key