Network Security Flashcards

1
Q

What is the process of developing a digitial signature ?

A

A user will have a memo, this memo will be hashed with their private key, this will be the signature, this is sent to the other user, this will be decrypted with the public key, this is how they will found out, to check message integrity the memo will be hashed again and then the digest will be compared

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a symmetric key encryption ?

A

Where the same key that is used to encrypt will decrypt the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is public key encryption ?

A

Where a user will have a public and a private key, they will share the public key, their data will be encrypted using their private key and will decrypt their data using the public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is monoalphabetic encryption ?

A

One letter is swapped for another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is polyalphaebtic encryption ?

A

Where there are multiple monoalphabetic encryption methods used within data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the AP1.0 ?

A

Where a user will say that they are who they say they are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the ways in which mono and polyalpahbetic encryption can be broken ?

A

Known cipher attack, Chosen cipher attack, Cipher text attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is known cipher text attack ?

A

An intruder will make someone say something that will enable them to obtain the cipher forms of all the letters in the alphabet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a cipher text attack ?

A

Statistical analysis as well as brute force will be used to break the encryption method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a NONCE ?

A

This is a once in a lifetime protocol number that is used when using end user auth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the principles of network security ?

A

End user authentication, data integrity and confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the 3 methods of SSL and what do they include ?

A

Data transfer, key derivation and SSL handshaking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the reason for VPNS ?

A

For hosts and servers to communicate securely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the two ways someone can establish a VPN ?

A

Creating a standalone network or creating a network on top of the public internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is IPSEC ?

A

A protocol suite used in the network layer to secure network layer datagrams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What kind of coverage is this said to have ?

A

Blanket converage

17
Q

What are the two protocols used in IPSEC ?

A

AH (authentication header )and ESP (Encapuslated security payload )

18
Q

What is the authentication header protocol ?

A

Provides source and destination authentication and data integrity

19
Q

What is ESP better the AH ?

A

Because ESP provides confidentiality

20
Q

What is a SA?

A

Security Association

21
Q

What is the characteristic of a securirty association ?

A

Two way conncetion between a host and a server

22
Q

What were the downfalls of 802.11 ?

A

Single authentication method, no use of keys, weak encryption methods

23
Q

How does 802.11i make up for 802.11 ?

A

Uses authentication methods to identify hosts and severs.

24
Q

How do the access points nodes and severs authenticate each other ?

A

They use public key techniques

25
Q

What is a firewall ?

A

A device that monitors a network, that contains packet filtering systems, that will allow or disallow packets of data passing through. Protects on interal network from the outside internet

26
Q

What is stateful packet filtering ?

A

Where a packet filter will montior the TCP connection and detect behaviours of the packets recieved

27
Q

What is an application gateway and what does it do ?

A

Application gateways are gateways in which all application data must pass through, packets that pass through will be deeply inspected. As their protocols, their headers and application are inspected

28
Q

What are the 3 goals of firewalls ?

A

Allow traffic to pass through, must be impenetrable, authroized traffic must pass through.

29
Q

How can they make up for a digitial signature or a MAC

A

They can use the NONCE method

30
Q

What is the nonce method ?

A

They will use a once in a lifetime protocol code, Bob to authenticate alice will do this.

Alice will message bob
Bob will send the nonce (once in a lifetime code) to alice
Alice will encrypt it using her private key and send it back to bob
Bob will decrypt and then see the same code again
This will overcome a playback attack

31
Q

How do you authenticate a user ?

A

Digital signatures, Public key encryption

32
Q

How do you check for data integrity ?

A

Using message authentication codes

33
Q

What are the 3 forms of attacks ?

A

Brute force, Eavesdropping, replay attack, playback attack