Protection for Data in Transit Flashcards
What is PAP?
Password Authentication Protocol
What does PAP do?
Authenticates users based on their login credentials which is important
What is a Weakness of PAP?
The data being sent is in plain text format and not encrypted.
Who Designed IPSec?
IETF (Internet Engineering Task Force)
What does IPSec Do?
Provide encryption and decryption through certificates, tunnelling techniques and keys. In some services, it may utilise the Kerberos protocol.
What does IPSec Uses for Authentication in the Overheads of packets when sending data?
ESP (Encapsulating Security Payload) and AH (Authentication Header)
What does TLS/SSL do
Both these technologies are often used when accessing online services such as websites that use HTTPS to provide security and encryption when transmitting data to web servers.
What is SSH
Secure shell is used to provide a secure remote connection to networks, over a normally unsecure connection.
What is Digest Authentication?
An authentication method which widely used and so is compatible with many methods, such as HTTP.
What is Symmetric Encryption?
A symmetric key algorithm involves the use of a single key to encrypt and decrypt.
What are the disadvantages of symmetric encryption?
One of the disadvantages of this method is that both parties will have to share the same key.
What is Asymmetric Encryption?
Asymmetric on the other hand, has two separate keys for encrypting and decrypting. This is known as PK (Public Key) cryptography, as one party will have their unique key to encrypt data and the public can verify its authenticity and decrypt.
How are keys exchanged to allow for decryption?
Most files and documents are sent over the internet, so keys would need to be exchanged over a secure connection. There are protocols such as FTPS and HTTPS that go through SSL (Secure Socket Layer) that establishes a handshake and connection. RSA and EIGamal are asymmetric encryption algorithms.
What is Hashing?
A function used to transform data into a unique string of characters. One distinctive feature that separates hashing from encryption, is that the hashed value cannot be converted back (decrypted) to its original value. Common hashing algorithms include MD5 and SHA.
What does Data Integrity ensure when hashing?
That there are no interferences by ensuring the data is authentic and unique