Section 10 Chapter 58 - Internet Security Flashcards
Firewall
A security checkpoint that prevents unauthorised access between two networks, often a local network and the internet
The uses firewalls (3)
- Packet filtering
- Stateful inspection
- Proxy server
Packet filtering
Controls network access by rejecting certain packets based on the contents of their header. It can look at the
Stateful inspection
Controls network access by inspecting the payload of packets. It can apply temporary rules based on the passage of previous packets in a conversation
Proxy server
Intercepts all packets entering and leaving a network and therefore hides the true network addresses from the recipient. It can also store a cache of recently viewed webpages to increase browsing speed
Encryption
The process of scrambling data so that it can only be read with the correct key
The type of key for symmetric encryption
private
Symmetric encryption
The same key is used to encrypt and decrypt the data.
Type of key for asymmetric encryption
public and private
Asymmetric encryption
There are two keys: public and private. The public key is used to encrypt and the private key is used to decrypt. Anyone can encrypt a message with the public key but only you can read it using your private key
How digital signatures work
A checksum is appended to the end of some data. This is then encrypted using the senders private key. When received, the checksum can be obtained by decryption through the use of the senders public key and then can be checked against the data. The signature may contain the time and date
Digital certificate
Issued by the Certificate Authorities and verifies that the public key for a digital signature is formally registered.
Worm
Standalone malware that can replicate itself and spread
Virus
Malware that requires a host to spread and replicate itself
Trojan
Malware that disguises itself as a legitimate program. Cannot replicate or spread