IS3220 CHAPTER 3 Flashcards
A set of rules and procedures, usually mathematical in nature. This can define how the encryption processes operate. Often very complex, many are publicly known; anyone can investigate and analyze the strengths and weaknesses of what is called an___?
ALGORITHM
A means of encoding and decoding information using related but different keys for each process is called ___?
FYI
(A key used to encode cannot decode, and vice versa. This is based on algorithms that use either key pairs or some other special mathematical mechanism. Different keys serve different purposes. Different keys are used by different members of the communication session. some systems use something different from keys altogether)
ASYMMETRIC CRYPTOGRAPHY
Examples of this include:
RADIUS, TACACS, and directory services such as LDAP and Active Directory.
This is called ___?
AUTHENTICATION, AUTHORIZATION, AND ACCOUNTING (AAA) SERVICES
The process of confirming the identity of the combination of authentication and access control/authorization that provides either the identity of the sender of a message or controls who is to receive a message. This is called ___?
AUTHENTICITY
A common feature of hash algorithms. this effect ensures that small changes in the input data produce large changes in the outputted hash value. A single binary digit change in a file should produce a clearly recognizable difference in the resultant hash value. This is called ___?
AVALANCHE EFFECT
A trusted third-party entity that issues digital certificates to verify and validate identities of people, organizations, systems, and networks digitally is called ___?
CERTIFICATE AUTHORITY (CA)
A communication pathway, circuity, or frequency dedicated or reserved for a specific transmission is called ___?
CHANNEL
The seemingly random and unusable output from a cryptographic function applied to original data is called ___?
(This is the result of encryption. Decryption converts this back into plain text)
CIPHERTEXT
This is created between a client and a server either within the same local network or across a WAN link or intermediary network and is called ___?
This will support secure client interaction with the services of a resource host.
CLIENT-TO-SERVER VPN
Removal of redundant or superfluous data or space to reduce the size of a data set is called___?
This consumes less storage space and increased the speed of data transmission.
COMPRESSION
An appliance firewall placed on the border or edge of an organization’s network is called ___?.
CORPORATE FIREWALL
The art and science of hiding information from unauthorized third parties is called ___?
This is divided into two main categories: encryption and decryption.
CRYPTOGRAPHY
The process of converting cipher text back into plain text is called___?
DECRYPTION
A network connection that is always on and available for immediate transmission of data is called ___?
Most leased lines are this.
DEDICATED CONNECTION
A network connection that is always on and available for immediate transmission of data is called ___?
AKA a dedicated connection.
DEDICATED LEASED LINE
An electronic proof of identity issued by a certificate authority is called ___?
This is an entity’s public key encoded by the CA’s private key.
DIGITAL CERTIFICATE
A secure communication based on public-key cryptography that encodes a message or data with the public key of the intended recipient is called ___?
DIGITAL ENVELOPE
A public-key cryptography-based mechanism for proving the source (and possibly integrity) of a signed data set or message is called ___?
This uses the private key of a sender.
DIGITAL SIGNATURE
A LAN whose components are in multiple places that are interconnected by WAN VPN links is called ___?
DISTRIBUTED LAN
The act of listening in on digital or audio conversations is called ___?
Network types usually require a sniffer, protocol analyzer, or packet capturing utility. This may be able to access unencrypted communication, depending on where it occurs.
EAVESDROPPING
A router positioned on the edge of a private network is called ___?
This is usually the last device owned and controlled by an organization before an ISP or telco connection.
EDGE ROUTER
This is used to grant outside entities access into a perimeter network and is called ___?
This is used to host resources designated as accessible to a limited group of external entities, such as business partners or suppliers, but not the general public.
EXTRANET VPN
______ occurs when a data set is too large for maximum supported size of a communication container, such as a segment, packet, or frame.
The original divides into multiple sections or fragments for transmission across the size-limited medium, then reassembles on the receiving end.
It can sometimes corrupt or damage data or allow outsiders to smuggle malicious content past network filters.
FRAGMENTATION
This requires a line between each business location and allows for a direct communication between one site and another. This is called ___?
FULL MESH
A dedicated device hosting VPN software. It can connect hosts and/or networks. This is also known as an appliance VPN and is called ___?
HARDWARE VPN
The unique number produced by a hash algorithm when applied to a data set is called ___?
This verifies the integrity of date.
HASH/HASH VALUE
A set of mathematical rules and procedures that produce a unique number from a data set is called ___?
HASH ALGORITHM
The process of verifying data integrity. It uses hash algorithms to produce unique numbers from datasets, known as hash values. If before and after hash values are the same, the data retain integrity and is called ___?
HASHING
A VPN endpoint located on a host client or server is called___?
It relies on either a native feature of the operating system or a third-party application.
HOST VPN
A VPN model where the remote client connects to the VPN server to gain access to the internal network is called ___?
HOST-TO-HOST VPN
A VPN created between a host and a network across a local or intermediary network is called ___?
(AKA a remote access VPN.)
HOST-TO-SITE VPN
A form of VPN establishing a secure VPN over trust VPN connections is called ___?
HYBRID VPN
The act of authentication that confirms the identity of a user or host is called ___?
IDENTITY PROOFING
Any network, network link, or channel located between the endpoints of a VPN is called ___?
(Often the Internet)
INTERMEDIARY NETWORK
The unique number used to guide an algorithm in the encryption and decryption process is called ___?
A valid key must be within the key space of an algorithm.
KEY/ENCRYPTION KEY
The cryptographic function ensuring that both endpoints of a commutation have the same symmetric key is called ?
It occurs by simultaneous key generation or with a digital envelope.
KEY EXCHANGE
The set of associated keys including a public key and a private key used by public key cryptography is called ___?
Only the public key can decrypt data encrypted by the private key, and vice versa.
KEY PAIR
The range of valid keys used by an algorithm is called ___?
This is the bit length of the keys supported by the algorithm.
KEY SPACE