security Flashcards
list 5 things that hackers / unauthorized users can do
disable operations
gain unauthorized access
install malicious code
steal identities
launch denial of service attacks
what is encryption
use of complex mathematical algorithms and encryption keys to alter a message into a form that is not understandable to an unauthorized person
how does encryption prevent unauthorized access
only the person with the correct key can decode the message and read it
what are the two different types of encryption
symmetric key
asymmetric key
how does asymmetric key encryption work
uses a public key for encryption and a private key for decryption
these two keys are mathematically linked
when is asymmetric key encryption used
SSL (secure socket layer) and TLS (transport layer security)
does what is symmetric key encryption work
the same key is used for encryption and decryption
each device has an secret code that is used to encrypt a message before it is sent off to a network
the receiving device should know and use the code to decode the message
adv of asymmetric key encryption
the two sides don’t need to have already shared their secret key to communicate
disadv of asymmetric key encryption
messages take more time to encrypt, decrypt
authenticity of the public key needs to be verified
adv of symmetric key encryption
encryption key is faster than asymmetric encryption
uses less computer resources
disadv of symmetric key encryption
keys must be shared before they can be used
if the key becomes known by other unauthorized users, it must be changed
list some methods of network security
use a password-protection
install an anti-virus software to detect malicious software
use software firewall to help keep intruders gaining access
enable/disable SSID broadcast
block access to wireless devices using MAC address
prevent physical access
use encryption
what is enabling/disabling SSID broadcast
a wireless router broadcasts its wireless network name (SSID)
all wireless devices in the range can identify it
by disabling this broadcast, devices in the range can’t identify it unless they enter the SSID manually
how can you secure a device using MAC address
every network interface card has a unique MAC address when manufactured
MAC address is a string of 12 characters, 48 bits
can permit access to only specific mac addresses
what is disadv of mac address
can be difficult to maintain a list of up-to-date MAC addresses