Information Security & Protection Flashcards

1
Q

“C” in the CIA triad

A

Confidentiality- Preserving authroized restrictions on information access and disclosure, including means for protecting personal privace and proprietary information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

“I” in the CIA triad

A

Integrity- Guarding against improper information modification or destruction, including ensuring information non repudiation and authenticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

“A” in the CIA triad

A

Availability- Ensuring timely and reliable access to and use of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define the AAA services

A

Identification: provides an identity to a system to start the process of AAA
Authentication: Ensures that the individual is who she claims to be (the authentic or genuine person) and not an imposter
Authorization: Providing permission or approval to specific technology resources
Auditing: provides a means of tracking and recording of user action
Accountability: holding users accountable for their actions
Nonrepudiation: subject of malicious activity cannot deny that the event occured.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Quantitative vs Qualitative Analysis

A

Quantitative analysis: concrete probability percentages that assign a dollar value to each asset
Qualitative analysis: assigns subjective and intangible value to each asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Columnar Transposition

A

refer to word doc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Rotational Cipher

A

C = (P + R) mod 26
A = 0, B = 1, etc.
Ex : P = A, R = 3, C = (0 + 3) mod 26, = 3 (D)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Symmetric Encryption/Decryption Process

A

Plaintext gets encrypted using a key that both the sender and receiver have, but the cipher-text gets transmitted to the other user where they can decrypt the message using the key used to encrypt the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Asymmetric Encryption/Decryption Process

A

Plaintext’s get encrypted using the receiver’s public key, then the cipher-text get transmitted to the receiver then decrypted using their private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Digital Signature Process

A

Sender hashes their plaintext message which generates a digest, then the sender encrypts that digest using their private key (that is the digital signature). The receiver can then decrypt the message using the sender’s public key, and makes his own message digest using the same hashing algorithm the sender used. If the digests match, then that confirms the message was actually sent by the expected sender.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Diffie-Hellman Exchange

A

Allows two users to generate the same secret key and establish a secure connection, refer to doc for example

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ECC

A

Elliptic Curve Cryptography - Users agree on using the same elliptic curve and the same starting point, but the private key generated should have a lot of entropy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Diffie-Hellman vs El Gamel - 3 differences

A

DH used for key exchange and ELgamal used for sending encrypted messages
1st user decides on G and P
2nd user creates ephemeral and sessions keys for each message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

TLS Handshake Process

A

TLS - Transport Layer Security

  1. Request for Resource
  2. Server presents its own host certificate
  3. Client verifies server authenticity
  4. Validate server FQDN
  5. Request for client own host certificate
  6. Client presents its own host certificate
  7. Server verifies client authenticity
  8. Validate Client FQDN
  9. Client sends pre-shared session key
  10. Access to restricted resource
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

IPsec’s two modes of operation

A

Transport mode: Used to protect a conversation between two specific hosts on a network; only the packet payload is encrypted (peer-to-peer)
Tunnel mode: Used to establish a site-to-stie VPN; entire packet is encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly