Section 1.4 Flashcards

1
Q

What does PKI stand for?

A

Public Key Infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What’s the purpose of the PKI?

A

Public Key Infrastructure (PKI) is a framework of policies, procedures, hardware, software, and people that enables the secure exchange of information over networks. It uses a system of digital certificates and public-private key pairs to authenticate the identity of users, devices, and services, ensuring secure communication and data integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Symmetric encryption?

A

Symmetric encryption means that anytime you are performing a decryption of some information, you’re using the same key that you used to encrypt that information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Asymmetric encryption?

A

Asymmetric encryption means that two (or more) keys are used, one for encryption and one key for decryption.

One becomes the private key and the other becomes the public key.

How does it work?
Anyone that has the public key, can encrypt data with that key and then send the encrypted data to you, and only the holder of the private key can decrypt the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is transport encryption and provide examples of it.

A

Transport encryption is encrypting data on the move.
For example browsers use https for encrypted data in transit.
VPNs encrypts all data transmitted over the network.
- Client based VPN use SSL/TLS
- Site to Site VPN use IPsec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Explain encryption algorithms

A

Encryption algorithm provides the formula to be used during the encryption and decryption process. Both sides, the encrypting side and decrypting side must use the same encryption algorithm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why are cryptographic key lengths important?

A

Brute force attacks are commonly used by attackers to find the key. This means that brute force attacks try every possible key combination. The longer the key, the more combination would be available, therefore more secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What’s a typical key length for symmetric encryption?

A

128-bit or larger symmetric keys are common

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What’s a typical key length for asymmetric encryption?

A

3072 bits or even larger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is meant by key stretching /strengthening?

A

This means that in order to make a key more secure, you would hash a password, and then hash the hash of the password, and hash the hash … and continue

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Out-of-band key exchange?

A

This means that the key is shared through means that are not in the internet. This would be through in person, over a telephone and so on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is In-band key exchange?

A

This means that the key is shared through the network. This would use additional security such as:
- If the goal is to share a symmetric key, then this key can be encrypted with a asymmetric key, and then send the key along with the asymmetric public key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Explain session keys

A

Session keys are used for temporary basis for a specific session.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Explain the key exchange algorithms.

A

Key exchange algorithms means the following:
System A has its own private key.
System B has its own private key.
If system A wants to send information to system B, then it can combine its private key with System B public key.
Then when the information is received in system B, system B can combine its private key with System A public key.
Now the two systems can securely communicate with each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a TPM?

A

Its a Trusted Platform Module (TPM) to provide cryptographic functions for a specific computer.

It can create keys.
It can store keys such as bitlocker keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a HSM?

A

Hardware Security Module (HSM) is used for large environments such as thousands of servers. HSM is used to store all the encryption keys for all of those servers.

17
Q

What is a secure enclave?

A

A secure enclave is a hardware processor, which is isolated from the main processor and provides extensive security features such as:
- Has its own boot ROM
- Monitors the system boot process
- Random number generator
- Real time memory encryption
- Root cryptographic keys
- Performs AES encryption in hardware and more

18
Q

What is obfuscation?

A

It’s the process of making something unclear, but not impossible to understand.
A type of obfuscation is Steganography, which means hiding information inside of an image.

19
Q

What is Steganography?

A

Steganography is security through obscurity.

It can be in an image data, or the actual image itself.
It can be on network bits, or audios.

20
Q

What is tokenization?

A

Tokenization refers to replacing sensitive data with a non sensitive placeholder.
For example it can be taking a SSN number and providing a new number that the system understands how to revert it back to the original number.

21
Q

What is data masking?

A

Data masking means that we hide part of the information and only display part of the information. An example is showing only the last 4 digits of a credit card number and hiding the rest of them using *.

22
Q

What is SHA256 Hash?

A

It’s a popular hashing algorithm

23
Q

What is hashing used for?

A
  1. Verify downloaded file.
  2. Password storage
24
Q

What does salt means in hashing process?

A

It’s random data added to a password when hashing. Makes the hash stronger especially against attacks such as rainbow tables or brute force.

25
Q

What is blockchain technology?

A

It’s a distributed ledger to keep track of transaction. Everyone’s transactions are public.
Makes it perfect for:
- Payment processing
- Digital identification
- supply chain monitoring
- digital voting

26
Q

What is a digital certificate?

A

A digital certificate is a file that contains a public key and a digital signature.

27
Q

What is the purpose of X.509?

A

This is the standardized format for a digital certificate.

28
Q

What information is stored in the digital certificates?

A

Serial number
version
signature algorithm
issuer
name of the cert holder
public key
extensions
and more

29
Q

What is meant by the root of trust?

A

The root of trust is an inherently trusted component meaning that if a third party trusts a specific website the we can also trust this website.

These third party component can be hardware, software, firmware or other component such as Certificate Authority (CA).

30
Q

What is a CSR?

A

A CSR is a certificate signing request.

31
Q

What is a CRL?

A

Certificate Revocation List. This is a list of all of the certificates that have been revoked.

32
Q

What is OCSP Stapling?

A

OCSP Stapling (Online Certificate Status Protocol Stapling) is a method used to improve the efficiency and performance of checking the revocation status of SSL/TLS certificates.