Information Security & Protection Flashcards
“C” in the CIA triad
Confidentiality- Preserving authroized restrictions on information access and disclosure, including means for protecting personal privace and proprietary information
“I” in the CIA triad
Integrity- Guarding against improper information modification or destruction, including ensuring information non repudiation and authenticity
“A” in the CIA triad
Availability- Ensuring timely and reliable access to and use of information
Define the AAA services
Identification: provides an identity to a system to start the process of AAA
Authentication: Ensures that the individual is who she claims to be (the authentic or genuine person) and not an imposter
Authorization: Providing permission or approval to specific technology resources
Auditing: provides a means of tracking and recording of user action
Accountability: holding users accountable for their actions
Nonrepudiation: subject of malicious activity cannot deny that the event occured.
Quantitative vs Qualitative Analysis
Quantitative analysis: concrete probability percentages that assign a dollar value to each asset
Qualitative analysis: assigns subjective and intangible value to each asset
Columnar Transposition
refer to word doc
Rotational Cipher
C = (P + R) mod 26
A = 0, B = 1, etc.
Ex : P = A, R = 3, C = (0 + 3) mod 26, = 3 (D)
Symmetric Encryption/Decryption Process
Plaintext gets encrypted using a key that both the sender and receiver have, but the cipher-text gets transmitted to the other user where they can decrypt the message using the key used to encrypt the message
Asymmetric Encryption/Decryption Process
Plaintext’s get encrypted using the receiver’s public key, then the cipher-text get transmitted to the receiver then decrypted using their private key
Digital Signature Process
Sender hashes their plaintext message which generates a digest, then the sender encrypts that digest using their private key (that is the digital signature). The receiver can then decrypt the message using the sender’s public key, and makes his own message digest using the same hashing algorithm the sender used. If the digests match, then that confirms the message was actually sent by the expected sender.
Diffie-Hellman Exchange
Allows two users to generate the same secret key and establish a secure connection, refer to doc for example
ECC
Elliptic Curve Cryptography - Users agree on using the same elliptic curve and the same starting point, but the private key generated should have a lot of entropy
Diffie-Hellman vs El Gamel - 3 differences
DH used for key exchange and ELgamal used for sending encrypted messages
1st user decides on G and P
2nd user creates ephemeral and sessions keys for each message
TLS Handshake Process
TLS - Transport Layer Security
- Request for Resource
- Server presents its own host certificate
- Client verifies server authenticity
- Validate server FQDN
- Request for client own host certificate
- Client presents its own host certificate
- Server verifies client authenticity
- Validate Client FQDN
- Client sends pre-shared session key
- Access to restricted resource
IPsec’s two modes of operation
Transport mode: Used to protect a conversation between two specific hosts on a network; only the packet payload is encrypted (peer-to-peer)
Tunnel mode: Used to establish a site-to-stie VPN; entire packet is encrypted