Security Flashcards
CIA Triad
Confidentiality
Integrity
Availability
Symmetric Encryption
One key for sender and receiver
DES
56 bit key
Used by SNMPv3
Considered weak today
Symmetric
3DES
Three 56bit keys (168 bit)
Encrypt, decrypt, encrypt
Symmeyric
AES (Advanced Encryption Standard)
Preferred symmetric encryption
Used in WPA2
128, 192 or 256 bit key
Symmetric
RSA
Asymmetric
PKI to exchange key
Asymmetric Encryption
2 keys
Public and private
Hashing
An algorithm that runs a string of data and creates a hash or hash digest
Servers as a unique fingerprint for a file.
MD5
128 bit hash digest
Can have hash collisions
SHA-1
160 bit hash digest
Less collison
SHA-256
256 digest
CRAMMD5
Commonly used for emails
DoS attack
Floods victim server with service requests, cause memory shortage and crash
TCP SYN Flood
Variant of DoS. Attacker initiates multiple tcp sessions but never finishes the handshake
Smurf
Sends a ping to the broadcast address, devices all reply and takes up bandwidth