Protection for Data in Transit Flashcards

1
Q

What is PAP?

A

Password Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does PAP do?

A

Authenticates users based on their login credentials which is important

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a Weakness of PAP?

A

The data being sent is in plain text format and not encrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Who Designed IPSec?

A

IETF (Internet Engineering Task Force)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does IPSec Do?

A

Provide encryption and decryption through certificates, tunnelling techniques and keys. In some services, it may utilise the Kerberos protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does IPSec Uses for Authentication in the Overheads of packets when sending data?

A

ESP (Encapsulating Security Payload) and AH (Authentication Header)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does TLS/SSL do

A

Both these technologies are often used when accessing online services such as websites that use HTTPS to provide security and encryption when transmitting data to web servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is SSH

A

Secure shell is used to provide a secure remote connection to networks, over a normally unsecure connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Digest Authentication?

A

An authentication method which widely used and so is compatible with many methods, such as HTTP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Symmetric Encryption?

A

A symmetric key algorithm involves the use of a single key to encrypt and decrypt.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the disadvantages of symmetric encryption?

A

One of the disadvantages of this method is that both parties will have to share the same key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Asymmetric Encryption?

A

Asymmetric on the other hand, has two separate keys for encrypting and decrypting. This is known as PK (Public Key) cryptography, as one party will have their unique key to encrypt data and the public can verify its authenticity and decrypt.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How are keys exchanged to allow for decryption?

A

Most files and documents are sent over the internet, so keys would need to be exchanged over a secure connection. There are protocols such as FTPS and HTTPS that go through SSL (Secure Socket Layer) that establishes a handshake and connection. RSA and EIGamal are asymmetric encryption algorithms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Hashing?

A

A function used to transform data into a unique string of characters. One distinctive feature that separates hashing from encryption, is that the hashed value cannot be converted back (decrypted) to its original value. Common hashing algorithms include MD5 and SHA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does Data Integrity ensure when hashing?

A

That there are no interferences by ensuring the data is authentic and unique

How well did you know this?
1
Not at all
2
3
4
5
Perfectly