Securing TCP/IP Flashcards
regarding security what is : CIA
Confidentiality
Integrity
Availability
these uses keys to encrypt cleartext into cyphertext
Algorithms
An algorithm that uses the same key to encrpyt and decrypt is
Symmetric Encryption
This is any unencrypted data:
cleartext
this type of encryption uses a public and a private key:
asymmetric encyption
For 2 people to communicate, they must exchange:
Public keys
A ________ creates a fixed-size hash value
hash algorithm
You see a lot of Hash algorithms when:
downloading stuff
Examples of Hashes:
MD and SHA-1
These are used for verifying data, not for encryption:
Hashes
Hash values are always fixed:
in size
Authentication is first and uses
Identification or what or which user are you like your, user name
After you are identified as a valid user you then need to be
Authorized
What are the 3 parts to any form of authentication
identify yours self
a password
authorization - defines what exactly you can do
Authentication Attributes
Something you do
Something you exhibit
Someone you know
Somewhere you are
____________ is actually proving that or your identity
authentication