security Flashcards

1
Q

list 5 things that hackers / unauthorized users can do

A

disable operations
gain unauthorized access
install malicious code
steal identities
launch denial of service attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is encryption

A

use of complex mathematical algorithms and encryption keys to alter a message into a form that is not understandable to an unauthorized person

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

how does encryption prevent unauthorized access

A

only the person with the correct key can decode the message and read it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what are the two different types of encryption

A

symmetric key
asymmetric key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

how does asymmetric key encryption work

A

uses a public key for encryption and a private key for decryption
these two keys are mathematically linked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

when is asymmetric key encryption used

A

SSL (secure socket layer) and TLS (transport layer security)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

does what is symmetric key encryption work

A

the same key is used for encryption and decryption
each device has an secret code that is used to encrypt a message before it is sent off to a network
the receiving device should know and use the code to decode the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

adv of asymmetric key encryption

A

the two sides don’t need to have already shared their secret key to communicate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

disadv of asymmetric key encryption

A

messages take more time to encrypt, decrypt
authenticity of the public key needs to be verified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

adv of symmetric key encryption

A

encryption key is faster than asymmetric encryption
uses less computer resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

disadv of symmetric key encryption

A

keys must be shared before they can be used
if the key becomes known by other unauthorized users, it must be changed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

list some methods of network security

A

use a password-protection
install an anti-virus software to detect malicious software
use software firewall to help keep intruders gaining access
enable/disable SSID broadcast
block access to wireless devices using MAC address
prevent physical access
use encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is enabling/disabling SSID broadcast

A

a wireless router broadcasts its wireless network name (SSID)
all wireless devices in the range can identify it
by disabling this broadcast, devices in the range can’t identify it unless they enter the SSID manually

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

how can you secure a device using MAC address

A

every network interface card has a unique MAC address when manufactured
MAC address is a string of 12 characters, 48 bits
can permit access to only specific mac addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is disadv of mac address

A

can be difficult to maintain a list of up-to-date MAC addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly