MOD 6 - Network Security Flashcards
Name all 4 types of security threats and examples for each.
IIFM
- Interception/sniffing:
ex: Host A and Host B are doing a online transaction, but Host C sniffs and steals Host A’s credit card info - Interruptions:
when an asset is no longer available ex: Flooding the network - Fabrication:
An unauthorized user fabricates objects into the network
Ex: email spam - Modification:
Tampering information, ressources or services/ man in the middle attack
What are the 4 values of network security?
- Confidentiality
- Only sender and receiver should understand message contents (sender encrypts, receiver decrypts) - Authentication
- Sender and receiver can confirm each others identities - Message integrity
- Message was not altered before, during or after transit - Access and availability
- Services must be accessible
What are the 3 ways to break an encryption scheme?
1) ciphertext only attack (brute-force, stat analysis)
2) known plaintext attack (can determine pairings)
3) chosen plaintext attack (Trudy sends a plain text she knows, then gets back cypher text, can then determine pairings)
what is substitution cipher?
simple encryption scheme
replace one letter for another. Ex: h->o, i->q , plaintext = hi-> cyphertext= oq
what is ciphertext?
plain text that was encrypted with an encryption algorithm, to become ciphertext
what’s an encryption key?
unique string of bits used to transform plain-text to cipher-text or vise-versa
what is private key crypto?
-sender and receiver DO NOT share a key
-public key = (encryption) KNOWN TO ALL
-private key = (decryption) KNOWN ONLY TO RECEIVER(OWNER), SECRET
in the context of bob, what is K+B, K-B, K-B(m), and if K+B(K-B(m)) = m
K+B = bobs public key
K-B = bobs private key
K-B(m) = message m encrypted with bobs private key
K+B(K-B(m)) = m here we applied bobs public key to the message signed with his private key. If this is equal to m, this proves that bob indeed signed m with his private key
What is CA?
Certification Authority
- Binds public key to particular entity, E
- E (person/router) registers its public key with CA
ex:
-bob registers his public key with CA (with proof that hes bob)
-CA signs bobs public key with their private key
- Alice wants to send bob smt, and requests his public key
-bob sends Alice his public key signed by CA
-alice applies CA’s public key on bobs public key to decrypt it (to make sure its bob)
-now alice can use bobs public key to encrypt and send a message
Alice wants to send a secure email to Bob, explain the process.
Alice:
-Generates symmetric private key, Ks
-Encrypt message m with Ks : Ks(m)
-Also encrypts Ks with bobs public key : K+B(Ks)
Bob:
-Uses his private key to decrypt Ks (from K+B(Ks))
-Then uses Ks to decrypt message m
What is SSL?
Secure Socket Layer = widely deployed security protocol for TCP sockets.
what is a VPN
Virtual Private Network : secure and encrypted connection that allows users to access the internet as if they were connected to a private network
what is IPsec?
Suite of protocols that provide cryptographic security and integrity for internet communications
What are the 2 modes of IPsec operation? compare them
Transport mode = IPsec is applied on the DATA FROM TRANSPORT LAYER (payload) & sent and received by end system. Transport mode does not protect the IP header.
Tunneling mode = IPsec is applied on the ENTIRE PACKET & sent and received by end system. Tunneling mode protects the entire IP packet, then adds new IP header. (prof said: pushing packet through tunnel with new ip, idea is to hide the IP from another user)
SUMMARY: transport encrypts only IP payload, tunneling encrypts the entire IP packet and adds a new header
What are the 2 IPsec protocols?
AH = Authentication Header protocol
- provides source authentication and data integrity, but NOT confidentiality
ESP = Encapsulation Security Protocol
- provides source authentication, data integrity AND confidentiality (encryption)
-build upon AH and is more widely used
both protocols supports the 2 modes of IPsec transport (transport and tunneling)
Summary: AH provides source authentication & integrity, ESP additionally provides encryption