Review Day Flashcards
what are the 3 uses for crypto tools
authentication, integrity, confidentiality
2 ways to hack a database
SQL injection and Access rights
What are the 4 phases of a virus
Dormant
Propogation
Triggering
Execution
Weak collision avoidance vs strong collision avoidance
weak collision: infeasable for attack to computer another message so that h(1) = h(2)
strong collision = infeasable to find any 2 messages h(x1) == h(x2)
what viruses mutate as the propogate
polymorphic
what is the way to avoid sqli
sanitize the input
what does a password policy use to weed out a common list of passwords not to use
a bloom filter
what type of protocol does remote authentication use
challenge response
the 4 typical access control techniques
MAC
DAC
RBAC
ABAC
what are subject and object tied toggether with
access rights
what can be used to prevent a replay attack
nonce
is it possible to sort an encrpyted db
no
what are 2 examples of a DNS attack
Cache poisioning, DDOS
what is used to cryptographically sign DNS records
DNSSEC
what is the DNSSEC chain of trust
a verified handshake at every DNS lookup node so nothing will get redirected to a bogus site