Securing TCP/IP Flashcards

1
Q

5 areas of TCP/IP Security

A

Encryption - scramble, mix up or change data
Integrity - data is received is the same as data sent
nonrepudiation - person can not deny they took a specific action
authentication - verify person accessing data
authroization - what can authorized person do with data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

symmetric-key algorithm

A

same key for both encryption and decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

asymmetric-key algorithm

A

different key for encryption and decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

block cipehers

A

name of most symmetric key algorithms

- encrypt chunks of data of a certain length at a time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

DES

A

Data Encryption Standard
64 bit block
56 bit key
susceptible to brute-force attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

stream ciphers

A

takes a single bit and encrypts it on the fly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

RC4

A

Rivest Cipher 4

  • fast easy to use and free
  • stream cipher
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AES

A

Advanced Encryption Standards

  • block cipher
  • 128, 192 or 256 bit key size
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

public-key cryptography

A

primary asymmetric key algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

encryption at each layer

A

1 - no encryption at this layer except bigger WAN tech like SONET
2 - no encryption done at this layer
3 - only IPSec, typically software that encrypts the IP packet, new outer layer encapsulates and encrypts inner packet
4 - neither TCP or UDP offers any encryption
5, 6, 7 - important encryption standards such as SSL and TSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

hash

A

mathmatical function that you run on a string of binary digits of any length that results in a value of some fixed length (often called a checksum or message digest)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

cyptographic hash

A
  • one way function
  • hash is irreversible
  • can be used to verify file integrity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

md5

A

message-digest algorithm version 5

- 128-bit message digest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SHA

A

secure hash algorithm

  • includes sha-1, sha-2, and sha-3
  • sha-1 produces 160-bit message digest
  • sha-2 has four variants
    • sha-224 (224 bit message digest)
    • sha-256
    • sha-384
    • sha-512
  • sha-3 comes in 4 variants
    • sha3-224
    • sha3-256
    • sha3-384
    • sha3-512
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CRAM-MD5

A

tool for server authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

digital signature

A

a hash of the public key encrypted by the private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

certificate

A

standardized type of file that includes a public key with a digital signatuure, and the digital signature of a trusted 3rd party

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

NAC

A

Network Access Control

  • usually prevents computers lacking anti-malware and patches from accessing the network
  • creates policies that define what individiual systems can do on the network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

ACL

A

Access Control List

  • clearly defined list of permissions that specifies what an authenticated user may perform on a shared resource
  • three ACL models: mandatory, discretionary and role based
20
Q

Mandatory Access Control

A

MAC

  • every resource is assigned a label that defines it security level
  • if user lacks level, they don’t get access
  • used in OS to determine what programs have access to other programs stored in RAM
21
Q

Discretionary Access Control

A

DAC

- resource owner controls access

22
Q

Role-based Access Control

A

RBAC

- managed by groups

23
Q

PPP

A

Point-to-Point Protocol

  • enables to PPP devices to connnect, authenticate with a user/pass and netgotiate network protocol to use
  • two methods of authentication, PAP and CHAP
24
Q

PAP

A

Password Authentication Protocol

- PPP protocol that simply transmits the user/pass in plaintext

25
Q

CHAP

A

Challenge Handshake Authentication Protocol

  • PPP protocol relies on a shared secret, usually a password that both ends of the connection knows
  • client creates a hash of password, sends to host
  • host compares has to password
  • periodically repeats the entire process to prevent man-in-the-middle attacks
26
Q

Microsft CHAP

A

MS-CHAPv2

  • most common authentication method for dialup connections
  • offers most security
27
Q

AAA

A

Authentication, Authorization, and Accounting

  • port authentication
  • alooows remote users authentication to a particular point of entry (port) to another network
28
Q

RADIUS

A

Remote Authentication Dial-In User Service

  • created to support ISPs with thousands of modems to connect to a central database
  • consists of 3 devices
    • server that has access to a database of usernames and passwords
    • number of Network Access Servers (NASs) that control themodems
    • and a group of systems that in some way connect ot the network
29
Q

RADIUS server programs

A

IAS - Internet Authentication Service for MS Server

FreeRADIUS - Unix/Linux

30
Q

RADIUS ports

A

UDP port 1812 and 1813

UDP 1645 and 1646

31
Q

TACACS+

A

Terminal Access Controller Access Control SYstem Plus

  • created by cisco to support AAA in a network with many routers and switches
  • very similar to RADIUS but uses port 49 by default
  • separates AAA into 3 parts
  • uses PAP, CHAP and MD5, but can use Kerberos
32
Q

Kerberos

A

an authentication protocol for TCP/IP networks with many clients all connected to a single authenticating server, no PPP

  • used in MS domains
  • uses UDP or TCP port 88
  • KDC (key distribution center) has two process
    • Authentication Server (AS)
    • Ticket-granting Service (TGS)
    • token includes Security Identifier (SID) plus SIDs for groups the user is a member of
    • uses timestamps
    • if KDC goes down, no one has access
    • timestamps require everyones clocks are synced
33
Q

Single-sign On

A

ability to log in only one time and use the same token to access any resource

34
Q

SSH

A

Secure Shell

- use PKI in the form of an RSA key

35
Q

tunnel

A

secure links between tow programs on separate computers

36
Q

SSL

A

Secure Sockets LAyer

  • requires server with certificate
  • uses symmetic-key cipher
  • creates encrypted tunnel between SSL server and client
37
Q

TLS

A

Transport Layer Security

  • upgrade to SSL
  • works with almost any application
38
Q

IPsec

A

internet Protocol Security

  • works at internet/network layer
  • dominant encryption suite
  • works in transport mode and tunnel mode
    • transport - only payload of packet is encrypted
    • tunnel - entire packet is encrypted and placed inside another packet
39
Q

CRLs

A

Certificate Revocation Lists

- third party that tracks if certs have been revoked

40
Q

SCP

A

Secure Copy Protocol

- transfer data securely between two hosts using SSH

41
Q

SFTP

A

replacement for FTP

  • uses FTP over SSH
  • TCP port 23
42
Q

SNMP

A

Simple Network Management Protocol

  • queries state of SNMP capable devices
  • uses agents (special client programs) to collect network information from a management information base (MIB)
  • v1 & v2 unencrypted
  • v3 encrypted
43
Q

LDAP

A

Lightweight Directory Access Protocol
- tool that programs use to query aqnd change a database used by the network
- can talk to Active Directory and other directory service providers to query and change items
uses TCP and UDP port 389

44
Q

LDAPS

A
  • secure version of LDAP
  • now depricated
    used TCP port 636
45
Q

NTP

A

Network Time Protocol

- gives current time

46
Q

In PKI wihch key encrypts the data

A

public

47
Q

In order to have PKI, you must have

A

root authority