Network Security Flashcards
What is the process of developing a digitial signature ?
A user will have a memo, this memo will be hashed with their private key, this will be the signature, this is sent to the other user, this will be decrypted with the public key, this is how they will found out, to check message integrity the memo will be hashed again and then the digest will be compared
What is a symmetric key encryption ?
Where the same key that is used to encrypt will decrypt the data
What is public key encryption ?
Where a user will have a public and a private key, they will share the public key, their data will be encrypted using their private key and will decrypt their data using the public key
What is monoalphabetic encryption ?
One letter is swapped for another
What is polyalphaebtic encryption ?
Where there are multiple monoalphabetic encryption methods used within data.
What is the AP1.0 ?
Where a user will say that they are who they say they are
What are the ways in which mono and polyalpahbetic encryption can be broken ?
Known cipher attack, Chosen cipher attack, Cipher text attack
What is known cipher text attack ?
An intruder will make someone say something that will enable them to obtain the cipher forms of all the letters in the alphabet
What is a cipher text attack ?
Statistical analysis as well as brute force will be used to break the encryption method
What is a NONCE ?
This is a once in a lifetime protocol number that is used when using end user auth
What are the principles of network security ?
End user authentication, data integrity and confidentiality
What are the 3 methods of SSL and what do they include ?
Data transfer, key derivation and SSL handshaking
What is the reason for VPNS ?
For hosts and servers to communicate securely
What are the two ways someone can establish a VPN ?
Creating a standalone network or creating a network on top of the public internet
What is IPSEC ?
A protocol suite used in the network layer to secure network layer datagrams
What kind of coverage is this said to have ?
Blanket converage
What are the two protocols used in IPSEC ?
AH (authentication header )and ESP (Encapuslated security payload )
What is the authentication header protocol ?
Provides source and destination authentication and data integrity
What is ESP better the AH ?
Because ESP provides confidentiality
What is a SA?
Security Association
What is the characteristic of a securirty association ?
Two way conncetion between a host and a server
What were the downfalls of 802.11 ?
Single authentication method, no use of keys, weak encryption methods
How does 802.11i make up for 802.11 ?
Uses authentication methods to identify hosts and severs.
How do the access points nodes and severs authenticate each other ?
They use public key techniques