Network Security Flashcards
What is the process of developing a digitial signature ?
A user will have a memo, this memo will be hashed with their private key, this will be the signature, this is sent to the other user, this will be decrypted with the public key, this is how they will found out, to check message integrity the memo will be hashed again and then the digest will be compared
What is a symmetric key encryption ?
Where the same key that is used to encrypt will decrypt the data
What is public key encryption ?
Where a user will have a public and a private key, they will share the public key, their data will be encrypted using their private key and will decrypt their data using the public key
What is monoalphabetic encryption ?
One letter is swapped for another
What is polyalphaebtic encryption ?
Where there are multiple monoalphabetic encryption methods used within data.
What is the AP1.0 ?
Where a user will say that they are who they say they are
What are the ways in which mono and polyalpahbetic encryption can be broken ?
Known cipher attack, Chosen cipher attack, Cipher text attack
What is known cipher text attack ?
An intruder will make someone say something that will enable them to obtain the cipher forms of all the letters in the alphabet
What is a cipher text attack ?
Statistical analysis as well as brute force will be used to break the encryption method
What is a NONCE ?
This is a once in a lifetime protocol number that is used when using end user auth
What are the principles of network security ?
End user authentication, data integrity and confidentiality
What are the 3 methods of SSL and what do they include ?
Data transfer, key derivation and SSL handshaking
What is the reason for VPNS ?
For hosts and servers to communicate securely
What are the two ways someone can establish a VPN ?
Creating a standalone network or creating a network on top of the public internet
What is IPSEC ?
A protocol suite used in the network layer to secure network layer datagrams