Internet Security Flashcards
What is a firewall and what is it used for
A piece of software that sits between 2 networks.
It can prevent certain things from entering and leaving
What is static filtering
When a firewall checks packet headers arriving from untrusted networks against a set of rules or packet filters defined by the network administrator
What is packet filtering
When the firewall inspects packets to check which port they’re attempting to access
What is stateful Inspection/ dynamic filtering
When incoming & outgoing traffic is continuously monitored after a connection is established
Done via looking at contents of packet rather than header
What is required of the firewall for stateful inspection to occur
Requires the firewall to maintain a connection table which keeps track of all conversations going on between networks
What does a proxy server do
Sits between the client device and firewall.
Provides anonymity to the client keeping their true IP hidden.
Additional uses of a proxy server
- keeps a cache of websites, speeds up user access and reduces traffic
- logs all user activity e.g. recording a list of websites user has attempted to visit
- web filtering
What is symmetric encryption
uses the same key for encryption & decryption
What is asymmetric encryption
- Uses a public and private key. The keys work as a pair.
- one key is used to encrypt message and the other to decrypt.
- used to initiate TLS connections
Symmetric Vs Asymmetric encryption
- symmetric is faster as it uses less complex mathematical operations, allows for data to be encrypted and decrypted at suitable speeds
- Asymmetric is slower but allows the sender to be authenticated (more secure)
What is key exchange
When the communicating devices have to transfer the key between them so they can pass each other messages
What is a digital signature
A form of authentication to guarantee the integrity of the message and authenticate the sender
How is a digital signature created and used
- runs a hash function against the unencrypted message to produce a hash total
- encrypts the hash total with their private key, forming the digital signal
- the sender then bundles it with the message and encrypts it with the public key
How does the recipient decrypt the message and digital signature
- uses private key to decrypt the bundled digital signature & message
- use the public key to decrypt hash total
- run the hash function on the plaintext to see if it matches the hash total
- if the hashed message and hash total match then it verifies the integrity
What can a digital signature also include
A timestamp so that a false signature cannot be recreated at a later date