Network Security (Chapter 4) Flashcards
Types of Encryption
Symmetric Encryption
- Encryption and Decryption uses the same key
Asymmetric Encryption
- Uses a Public key to Encrypt and a Private key to Decrypt
Hashing
- a one way encryption, that is used to accompany the data to ensure its integrity
Digital Certificate
Is a document that contains a Public Key and some metadata.
Digital Certificate are issued by trusted certificate Authority
Public key Infrastructure
A trusted hierarchy system for generating and distributing certificate
- Root CA highest authority that assigns itself a certified as well as signs Subordinate CAs certificate
- Subordinate CA will create certificates for clients
Self Signed Certificate
A certificate generated by a user to be used on their private network, it is not signed by a certification authority
Digital Signatures
Is used to prove Identity and Integrity of data by using the signers private key and a hash
Identity and Access Management (IAM)
A framework of policies that ensures that the right individuals access the right resources at the right time and for the right reasons
-2 main principles: Authentication & Authorization
LDAP Authentication
Is a protocol used to access and manage directory services over a network. It’s a vender neutral authentication that validate users identities against a single source of truth
Single Sign-On Types of Services
OpenID Connect (OIDC)
- used for smart phone apps by logging on to Google rather than all separate apps
Security Assertion Markup Language (SAML)
- Older version of OIDC but has more features and is mainly used by corporates
Open Authorization (OAuth)
- used for authorization and allows third party to access protected resources
802.1x
Is a framework that requires devices/users to authenticate before connecting to a VLAN or LAN.
- Only Authentication traffic is allowed to pass through the network until the device/user is authorised