Final Flashcards
Three Modes/Use Cases for VPN
host to host, host to LAN, LAN to LAN
VLAN
virtual local area network, virtually isolated networks from each other in a LAN
three kinds of ciphers in cryptogtaphy
symmetric, public-key, one-way hashes
VPN: full tunnels vs. split tunnels
full tunnel encrypts all traffic, split tunnels only select traffic
proxy
a gateway/sever between the internet and users that processes your traffic and gives response back to you
what does cryptography do/help with?
data protection, authentication, digital signature, data integrity
public-key ciphers
two keys (public and private) undo whatever the other key did and vice versa (reversible)
symmetric-key cipher
secret codeword/key both locks and unlocks data which is being protected (reversible)
one-way hash / message digest
mapping functions from large set to a smaller set, collisions inevitable, but not predictable, it is irreversible…ex: SHA256, MD5(not used), SHA1(not used)
block cipher vs stream cipher
block cipher from plain text to fixed size, stream encrypts one bit at a time (variable length)
DMZ
Demilitarized Zone, is like a buffer zone between a private/internal network and the outside world, typically the internet. It’s designed to provide an extra layer of security for sensitive systems within a network.
ways to break crypto
brute force, implementation mistakes, knowing some of the message, denial of service, social engineering( rubber-hose cryptography)
cryptography authentication
can use certificates
midterm: 3 ways to authenticate
something you know(passwords, personal IDs) , are(fingerprint, iris), have(phone, email)
how do cryptosystems work to do message encryption
they take a low entropy text and turn it into a high entropy ciphertext which is mathematically indistinguishable from random data, in public keys, encrypt message using recivers public key, and decrypt with recievers private key
digital signature
verifies authenticity (that the sender actually sent it), encrypt with private key, and decrypt with public key
trusted computing
belief computers will operate in a predictable manner with authenticated and protected data