Revision Lecture Flashcards
what is the CIA Triad?
confidentiality
integrity
availability
what is the CIA Triad: Availability ?
- Data is available when required.
- Enforced through redundancy,
- Violations: Hardware damage,
DoS
what is the CIA Triad: Integrity?
*Accuracy and completeness of data, assurance that data has not been modified or omitted,
* Enforced through hashes,
* Violations: modifications of data during transfer.
what is the CIA Triad: Confidentiality ?
- Ensuring data is hidden, only visible to authorized users,
- Enforced through encryption,
- Violations: packet sniffing , breaking encryption,unintentional human errors
Identity Access Management (IAAA): Identification
- Identify an entity: I am John
- Possible to identify yourself without authentication
Identity Access Management (IAAA): Authethication
- Password PIN biometric,
- Authentication can be only done after identification
- No-repudiation
Identity Access Management (IAAA): Authorization
Access control list
* Clearances
* Authorization is consulted after authentication
Identity Access Management (IAAA): Accountablity
- Account audits
- Log reviews
Authentication Factors
- Type I: Something that you KNOW(weak)
Password
PIN - Type II: Something that you HAVE
PIN Sentry
Mobile SIM - Type III: Something that you ARE (Strong)
Retina Pattern
Fingerprint
What is Multifactor Authethication(MFA)
Single factor authentication, e.g., password – weak
MFA combines more than one type of authentication
Often Type I and Type II are combined
✓ Type I: something that you know (e.g., password)
✓ Type II: something that you have (e.g., Mobile
SIM, SMS)
✓ 2FA: Two factors combined
✓ 3FA: Three factors combined
What are the 5 primary functions of cryptography?
- Privacy/confidentiality: Ensuring that no one can read the message except the intended receiver.
- Authentication: The process of proving one’s identity.
- Integrity: Assuring the receiver that the received message has not been altered in any way from the original.
- Non-repudiation: A mechanism to prove that the sender really sent this message.
- Key exchange: The method by which crypto keys are shared between sender and receiver.
what is symmetric cryptography?
Same key used for encryption and decryption, i.e., symmetric,
* Same cipher (algorithm) used for encryption and decryption,
* Key length determines the strength of encryption, the longer is better,
* Popular private-keys ciphers are AES (AES-128, AES-192, and
AES-256), RC5, Twofish, and many more.
What is asymmetric cryptography?
Public key used for encryption and private key used for decryption, i.e., asymmetric,
* Private key is completely different than public key
* Data encrypted by public key CANNOT be decoded with public key and must use the private key.
* If a sender uses his private key to encrypt then it is not for secrecy, but for digitally signing the document
example: RSA
Symmetric vs Asymmetric
Symmetric:
Same key used for encryption and decryption
Encryption and decryption algorithms are same
Cannot always exchange keys safely
Fast
Similar key size offers strong encryption
Asymmetric:
Different keys (Public and Private) used for encryption and decryption
Encryption and decryption algorithms are different
Can be done even in public networks
Slow
Longer keys required to ensure strong encryption
Explain hashing terms
Message digest: Hashing creates a fixed size “summary”
Input/Output Size: Fixed-size message digest for any size of input
One-way function: impossible to recover the original
Unique: Different documents lead to different hashes
Collision: Different documents lead to same message digest
hashing file integrity
- Source calculates file hash and includes it with file
- User downloads file and its hash
- User recalculates the hash of the downloaded file independently
- User compares the downloaded hash and the calculated one to check the integrity