IT-Security (Chapter 2) Flashcards

1
Q

Applications of Cryptographic Protocols

A

•Authentication
-Data origin authentication
-Entity authentication
•Key exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data origin authentication

A

• For ensuring integrity of data
• Via cryptographic protocols
MDCs or MACs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Entity authentication

A
  • Enables communication partners to verify each others identities
  • Fundamental as most security functionality is built on top
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Two Categories of Autehntication

A
Arbitrated Authentication (TTP involved)
Direct Authentication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does X.509 do?

A
  • Certification of public keys and certificate handling:
  • Certificate format
  • Certificate hierarchy
  • Certificate revocation lists
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Transport Layer

A

Transport layer provides end-to-end communication between application processes (SSL,TLS,DTLS,SSH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Transport layer security goals

A
  • Confidentiality

* Data integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SSL/TLS Security Services

A

• Peer entity authentication:
After successful completion, TLS session established between peers

• Data integrity (optional)
Message Authentication Code (MAC) computed by cryptographic hash function,
and that includes negotiated secret is appended to data

• Confidentiality (optional)
User data encrypted by a secret key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SSL/TLS Components

A
  • Record protocol
  • Handshake protocol
  • Change cipher spec protocol
  • Alert protocol
  • Application data protocol
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SSL/TLS Handshake Protocol

A
  • Peer authentication
  • Negotiation of pre-master secret
  • Negotiation of crypto protocols
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

two methods for establishing a pre-master secret

A

RSA

Diffie-Hellmann key exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Problems of Practical System Security

A

It is impossible to prove security of any moderately complex system

Software is at root of all common security problems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Main Techniques for Attacking Systems

A

Buffer Overflows
SQL-Injection
Placing Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Countermeasures to implementation flaws

A
Implementing it the right way!
Secure the weakest link
Practice defense in depth
Fail securely
Least privilege
Compartmentalize
Be careful with trust
How well did you know this?
1
Not at all
2
3
4
5
Perfectly