Part 3 Flashcards
What are 3 data categories?
Data at rest - in an information system as a saved file form or database form
Data in use - currently open and being actively edited
Data in motion - data transmitted via telecommunication lines
what are procedures that apply to the protection of both transmitting and receiving equipment as well as the data transmitted between?
COMSEC
What is the branch of cryptology that treats the principles, means, and methods of designing and using cryptosystems?
Cryptography
What is the branch of knowledge that treats the principles of cryptography and cryptoanalysis; and the activities involved in SIGINT and maintaining COMSEC?
Cryptology
What is the analysis of encrypted messages; the steps or processes involved in converting encrypted messages into plain text without initial knowledge of the system or key employed in encryption?
Cryptoanalysis
What is a derivative of cryptography in the sense that data is hidden in a message, the data is imbedded into a file to become invisible, examples, changing a file extension type?
Steganography
What are 3 types of Meta Data?
Descriptive - describes a file for purposes - title, author, key word
Structural - how objects are put together - how pages are ordered into chapters
Administrative - information on how to handle a file - how it was created, who created it, who can access it, file type
What are some places to hide data?
Invisible context, headers, footers, notes, custom xml data, hidden rows and collumns
What is a type of algorithm that does not contain any encryption
Clear text
What type of encryption algorithm is cleartext that is to be encrypted?
Plain text
What are procedures for formulas to perform encryption?
Algorithm
What are mathematical values entered into the algorithm?
Keys
What is encrypted text?
Cipher text
What is it called when a hash is not unique and data cannot be deciphered into the origial version?
Collision
What are two types of Hash Algorithm?
MD5
SHA
What supports all 5 pillars of IA?
The use of cryptography
What is a “one way hash” and is the property of a hash function that is configured to make reversing of the hash algorithm mathematically infeasible?
Pre Image Resistance
What concept is where hash algorithms cannot be designed to produce fixed outputs?
Hash Originality
What are bytes of data within a transmission that is used to authenticate the message itself and ensures the data has not been modified in transit?
MAC - message authentication code
What type of encryption is one private key for both users?
Symetric Encryption
What is the original encryption method?
DES
What is the most secure encryption method?
AES
What uses two keys and provides non repudiation?
Asymetric Encryption
What is generated by using the private key of a key pair?
Digital signature
All naval networks are required to have digital signature sign ons for non repudiation
T or F
All hases are the same size regardless of the size of the text?
True
What is a trusted 3rd party agent that issues digital certificates
CA
What handles and processes certificate requests as well as authenticates users of the certificates?
RA
RA obtains public keys from the users and verifies the private keys associated with the public keys held
When a digital certifcate is expired or is no longer needed it is moved here to ensure it is no longer used…
CRL
What is a “holding tank” of certificates
CR
Centralized repository for storage and management of digital certificates
What are 2 files needed to run for trust structure for PKI?
A -alpha - DoD digital certificates for DoD root and intermediate CAs
E -echo - Extended Certificate Authority (ECA) root and intermediate CAs
If the certificate serial number … the response is?
Is listed on the CRL?
Is not listed on the CRL?
Is not found or accessible?
“REVOKED”
“GOOD”
“UNKNOWN”
What is a mathematical formula used to support the Digital Signature Standard (DSS) encryption method?
DSA
Where are documentation requirements for DSA found?
FIPS 186-4
What dictates the role of Public Key within the certificate?
Key Usage Extensions
What uses algorithms to validate authenticity and integrity of software or information?
Digital Signature
What are two types of Extended Key Usage?
Critical
Non critical - informational
What is a thumbprint algorithm?
Another name for SHA-1 hash function
What is used to hide actual key algorithms?
TLS used when McAfee talks to the ePO server
Key encipher
What is used to encrypt data in storage or transit but not cryptographic keys?
Data encipher
What is used in protocol handshake process?
Record Protocol
What allows encryption of telnet communications?
SSH
slogin
SCP
All port 22
Why are certificates revoked?
Expired, compromised, no longer needed
What are used if higher privlages or more security is required?
Alt tokens
NSS / Sipr tokens
What allows a grace period for a user to log on before certificate is revoked?
OCSP
Online Certificate Status Protocol
What ensures certificates are current and valid?
Axway VA
What is the 5 step process for CLO
1- CAC inserted
2- PIN entered
3- after PKI certificate is retreived from CAC it verifies it is valid and from a trusted issuer
4- workstation verifies the Domain Controller certificate is valid and from a trusted issuer
5- if both valid, user is automatically logged onto the network
What is a robust middleware suite designed to seamlessly intergrate between CAC and applications?
CAC SCM 90
What validates digital certificates in most frequently used Mircosoft Windows Applications?
Desktop Validator (DV)
Where are tokens enrolled?
Enterprise Security Client (ESC)
What is the 5 step process for the Token Management System?
1- Token Processing System interacts with CAC by helping it store keys and certificates
2- Token Key Service generates symetric keys used for communication between TPS and CAC
3- the CA creates and revokes certificates stored on the CAC
4- if necessary the DRM archives and recovers keys (as applicable)
What is the 6 step data flow process through the NCVI / CLO
1- application is presented a digital certificate
2- CAPI layer is tasked with validating the cert
3- request is transferred from CAPI to DV revocation trust provider which then moves the request onto the DV service running on the system
4- the DV service will first check to see if this cert has been accepted or revoked prior by checking its cache
5- a response by the DV is given or a decision is made that the request has been unable to be verified
6- the DV revocation trust provider then passes the request status back to the application that initiated the validation request
What are 2 types of log files
Validation Authority
- Admin log
- Server log
Desktop Validator