internet security Flashcards

1
Q

Methods of IntSec

A

Firewalls
Digital Signatures
Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Firewalls

A

Sits inbetween client and internet, regulating packets that pass through. Also acts as a proxy server which can perform packet filtering and stateful inspection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Packet Switching

A

Stateless method (doesn’t inspect contents of the packet)
Blocks packets based on the source IP address or port number (protocol its using)
IPs and Ports can be blacklisted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Stateful Inspection

A

Examines content in the payload
Can filter out packets based on current network activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Proxy Server

A

Sits between private and public networks
Manage individual packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Firewall Process

A

A transmits
Firewall’s IP is used to send
B’s firewall receives packets

Hence there’s a degree of anonymity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Types of encryption

A

Asymmetric
Symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Symmetric Encryption

A

Sender and receiver have same private key
Used to decrypt and encrypt at both ends

Key exchange could be intercepted - man in the middle attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Asymmetric Encryption

A

Encrypted with recipient’s public key
Can only be decrypted using the recipients private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Digital Signatures

A

Verifies the sender and integrity of the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Digital Signature Process

A
  1. Digest of a message is created (checksum or hashing)
  2. Encrypted with sender’s private key (anyone with recipient public key can decrypt)
  3. Encrypted with recipient’s public key
  4. Decrypted with recipients private key
  5. Decrypted with sender’s public key
  6. Carries out checksum/hashing to determine if message is intact
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Digital Certificate

A

Checks to see if the key pair being used is real
Stores: serial number, owner’s name, expiry date, public key and certificate authority signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Worms

A

Malicious software that can replicate between computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Trojans

A

Disguised as a file that users are tricked into clicking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Viruses

A

Require an executable host file to reside in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly