Revision Lecture Flashcards
what is the CIA Triad?
confidentiality
integrity
availability
what is the CIA Triad: Availability ?
- Data is available when required.
- Enforced through redundancy,
- Violations: Hardware damage,
DoS
what is the CIA Triad: Integrity?
*Accuracy and completeness of data, assurance that data has not been modified or omitted,
* Enforced through hashes,
* Violations: modifications of data during transfer.
what is the CIA Triad: Confidentiality ?
- Ensuring data is hidden, only visible to authorized users,
- Enforced through encryption,
- Violations: packet sniffing , breaking encryption,unintentional human errors
Identity Access Management (IAAA): Identification
- Identify an entity: I am John
- Possible to identify yourself without authentication
Identity Access Management (IAAA): Authethication
- Password PIN biometric,
- Authentication can be only done after identification
- No-repudiation
Identity Access Management (IAAA): Authorization
Access control list
* Clearances
* Authorization is consulted after authentication
Identity Access Management (IAAA): Accountablity
- Account audits
- Log reviews
Authentication Factors
- Type I: Something that you KNOW(weak)
Password
PIN - Type II: Something that you HAVE
PIN Sentry
Mobile SIM - Type III: Something that you ARE (Strong)
Retina Pattern
Fingerprint
What is Multifactor Authethication(MFA)
Single factor authentication, e.g., password – weak
MFA combines more than one type of authentication
Often Type I and Type II are combined
✓ Type I: something that you know (e.g., password)
✓ Type II: something that you have (e.g., Mobile
SIM, SMS)
✓ 2FA: Two factors combined
✓ 3FA: Three factors combined
What are the 5 primary functions of cryptography?
- Privacy/confidentiality: Ensuring that no one can read the message except the intended receiver.
- Authentication: The process of proving one’s identity.
- Integrity: Assuring the receiver that the received message has not been altered in any way from the original.
- Non-repudiation: A mechanism to prove that the sender really sent this message.
- Key exchange: The method by which crypto keys are shared between sender and receiver.
what is symmetric cryptography?
Same key used for encryption and decryption, i.e., symmetric,
* Same cipher (algorithm) used for encryption and decryption,
* Key length determines the strength of encryption, the longer is better,
* Popular private-keys ciphers are AES (AES-128, AES-192, and
AES-256), RC5, Twofish, and many more.
What is asymmetric cryptography?
Public key used for encryption and private key used for decryption, i.e., asymmetric,
* Private key is completely different than public key
* Data encrypted by public key CANNOT be decoded with public key and must use the private key.
* If a sender uses his private key to encrypt then it is not for secrecy, but for digitally signing the document
example: RSA
Symmetric vs Asymmetric
Symmetric:
Same key used for encryption and decryption
Encryption and decryption algorithms are same
Cannot always exchange keys safely
Fast
Similar key size offers strong encryption
Asymmetric:
Different keys (Public and Private) used for encryption and decryption
Encryption and decryption algorithms are different
Can be done even in public networks
Slow
Longer keys required to ensure strong encryption
Explain hashing terms
Message digest: Hashing creates a fixed size “summary”
Input/Output Size: Fixed-size message digest for any size of input
One-way function: impossible to recover the original
Unique: Different documents lead to different hashes
Collision: Different documents lead to same message digest
hashing file integrity
- Source calculates file hash and includes it with file
- User downloads file and its hash
- User recalculates the hash of the downloaded file independently
- User compares the downloaded hash and the calculated one to check the integrity
Hashing: Digital Signature
- Source calculates file hash
- Source signs with his private key (digital signature)
- User downloads file and signed hash
- User recalculates the hash of the downloaded file independently
- User decrypts the signed hash using source’s public key and compares the hashes
IPSec: Virtual Private Networks (VPNs)
VPN extends a private network over public networks e.g., internet
VPN achieves this by encrypting the traffic to/from the remote users
Effectively creates a tunnel using encryption
IPSec Modes of operation:
Modes of operation:
* Transport mode: Encapsulates only the data (payload), used for device-to-device secure communication
* Tunnel mode: Encapsulates entire IP packet (incl. headers), used for gateway-to-gateway secure tunnels
IPSec Protocols:
Protocols:
* AH (Authentication header): Focused on authentication
* ESP (Encapsulating Security Payload): Authentication and
confidentiality
IPSec Protocols:
Protocols:
* AH (Authentication header): Focused on authentication
* ESP (Encapsulating Security Payload): Authentication and
confidentiality
IPSec: Transport Mode
Transport Mode:
* Mostly used for host-to-host i.e., app-to-app communication
* Encrypts only the data, not the IP header
* Not encrypting IP header allows to end-to-end routing
IPSec : Tunnel mode
Tunnel Mode:
* Used in VPNs to connect to corporate network
* Encrypts the entire packet including IP Header, thus routing
requires a new encrypted IP header (corporate gateway IP)
NAT Network Address Translation
NAT is used on network gateways and offers:
* A single public IP address to handle thousands of systems
* Use of private IP address
* Hiding IP addresses from internet
* Prevent connection initiation from outside