Security Flashcards

1
Q

Encryption

A

Modifying data to make it unreadable to miscreants

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Nonrepudiation

A

The process that guarantees that the data is the same as original sent, came from the bona fide source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Authentication

A

Verifying that whoever is accessing the data is who they claim to be. The computer that is trying to connect must present some form of credential to be allowed access to the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Authorization

A

Verifying that whoever is accessing the data should be able to do so. Once authenticated, the computer determines what the device can and cannot do on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Accounting

A

The logging of authentications and authorizations. The authenticating server should do some form of accounting fo who is logging in and when, number of unsuccessful logins, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cipher

A

A series of algorithms (complex and hard to reverse) that is run on data to encrypt it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Complete algorithm

A

A combination of a cipher and an implementation method for it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

XOR

A

“eXclusive OR.” A logical operation that compares to inputs and outputs true (i.e. “1”) if both inputs differ, otherwise it outputs false (i.e., “0”).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Brute force

A

The process of testing every possible combination of characters to determine an answer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Ciphertext

A

The result when cleartext/plaintext is run through a cipher algorithm using a key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Symmetric encryption

A

Any encryption implementation that uses the same key for encryption and decryption. Inherently weak since the key must be shared and can be lost. E.g., DES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Asymmetric encryption

A

Any encryption implementation that uses different keys for encryption and decryption (e.g., a public/shared key and a private/secret key)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Block cipher

A

Any cipher that encrypts data in discrete blocks/chunks (e.g., a cipher encrypting discrete IP packets). E.g., AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Stream cipher

A

Any cipher that encrypts data on the fly. Common on wireless networks and mobile phone data networks. E.g., RC4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DES

A

Data encryption standard. Symmetric key algorithm and block cipher. Encrypts data using a 56-bit key, in 64-bit blocks. Very vulnerable due to the short key length. More modern variants: 3DES, IDEA, Blowfish

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

RC4

A

Rivest Cipher 4. Symmetric key algorithm and stream cipher. Today it is very vulnerable to attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

AES

A

Advanced encryption standard. Block cipher. Encrypts data in 128-bit blocks. Can use a 128- 192-, or 256-bit key. Very fast. For now, virtually uncrackable. Very popular today, usually the only cipher that is recommended

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Safest and most secure encryption algorithm today

A

AES. The longer the key, the better. 256-bits is the longest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Inventors of asymmetric public key cryptography

A

Whitfield Diffie, Martin Hellman, Ralph Merkle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Common name for public key asymmetric key implementation

A

Diffie-Hellman Key Exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Private key

A

One of the two keys created in asymmetric encryption. Kept strictly secret; never revealed to anyone. Used only to decrypt data encrypted with the matching public key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Public key

A

One of the two keys created in asymmetric encryption. Can be freely shared with anyone. Used to encrypt data that can only be decrypted with the matching private key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Encryption at OSI Layer 1

A

None; no common encryption on the physical layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Encryption at OSI Layer 2

A

Lots of encryption at the Data Link layer using proprietary devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Encryption at OSI Layer 3

A

Only IPSec encryption occurs (currently) at the network layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Encryption at OSI Layer 4

A

None; no common encryption at the transport layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Encryption at OSI Layer 5

A

None; no common encryption at the session layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Encryption at OSI Layer 6

A

None; no common encryption at the presentation layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Encryption at OSI Layer 7

A

Common layer for encryption (e.g., SSL/TLS, etc.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Hash

A

A one-way mathematical function run on data (regardless of its content or length) that creates a fixed length result called a checksum or a digest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Checksum

A

The output of a hash. Also called a digest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

MD5

A

Message-digest algorithm version 5. Common hashing algorithm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

SHA

A

Secure hash algorithm. Another common hashing algorithm. Two versions: SHA-1, SHA-2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

CRAM-MD5

A

Challenge-Response Authentication Mechanism MD5. Used as a special form of server authentication, especially for SMTP servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Digital signature

A

Created by the sender of data (typically email), usually by hashing the message with a private key. Allows the holder of the public key to verify the identity of its sender.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Certificate

A

Standardized digital signature that allows proof of nonrepudiation of data (i.e., that the sender of the data is who they claim to be, and that the data is what it is supposed to be). Also used to verify the exchange of public keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

PKI

A

Public key infrastructure. The tree of root certificate authorities (VeriSign, DigiCert, etc.), intermediate authorities, etc.

38
Q

Self-signed certificate

A

An unsigned certificate issued by someone other than a root or intermediate certificate authority.

39
Q

PGP

A

Pretty good privacy. Web-of-trust peer group verification system for email.

40
Q

NAC

A

Network access control. Generic term for series of security applications. A common one prevents computers lacking anti-malware from accessing the network, create policies defining what systems can do on the network, etc.

41
Q

ACL

A

Access control list. A defined list of permissions that specify what an authenticated user can do on a shared resource or network

42
Q

MAC security access model

A

Mandatory access control. Every resource is assigned a label that defines its security level. If the user lacks that level he does not get access. Old model; no longer common

43
Q

DAC security access model

A

Discretionary access control. Every resource has an owner who has discretion to assign access to it. More flexible than MAC

44
Q

RBAC security access model

A

Role based access control. Defines access based on roles of each user. Often organized by group. Very common today.

45
Q

The three security access models for access control

A

MAC, DAC, and RBAC

46
Q

PPP

A

Authentication protocol. Stands for “Point-to-Point”. Enables two devices to connect and authenticate to each other. Old.

47
Q

Initiator

A

The device asking for the connection in a PPP connection

48
Q

Authenticator

A

The device containing the list of usernames and passwords (or hashes) in a PPP connection

49
Q

PAP

A

Password authentication protocol. Original method within PPP to authenticate usernames and passwords. Stored and sent in plaintext. Very insecure.

50
Q

CHAP

A

Challenge handshake authentication protocol. Replacement for PAP. More secure authentication. Relies on hashes based on a shared secret. Actual password never transmitted. Periodically repeats entire process.

51
Q

MS-CHAP

A

Version of CHAP released by Microsoft. MS-CHAPv2 still the most common authentication protocol for dialup PPP connections

52
Q

AAA

A

The philosophy that a proper authentication protocol should provide for authentication, authorization, and accounting.

53
Q

RADIUS

A

Remote Authentication Dial-In User Service. An AAA standard. Users are authenticated and authorized by a central server that tracks logins and attempts. Supports PAP, CHAP, and MS-CHAP.

54
Q

Three components of a RADIUS environment

A

The RADIUS server, the Network Access Servers that control the modems, and the hosts that connect to the modems

55
Q

NAS [in the context of RADIUS]

A

Network Access Server. Controls the modems in a RADIUS setting. [Don’t confuse with Network Attached Storage!]

56
Q

IAS

A

Internet Authentication Service, Microsoft’s implementation of a RADIUS server

57
Q

TACACS+

A

Terminal Access Controller Access Control System Plus. Cisco (proprietary), supports AAA in a network with lots of routers and switches. Similar to RADIUS, but uses TCP Port 49. Can use Kerberos for authentication as well as PAP, CHAP

58
Q

Kerberos

A

Authentication protocol for TCP/IP clients connected to a single authenticating server. Unconnected with PPP. Default protocol for Windows domains; also used in TACACS+

59
Q

KDC

A

Key distribution center. The centerpiece of the Kerberos system. Consists of the Authentication Server and the Ticket Granting Service.

60
Q

Kerberos AS

A

Authentication Server. Receives login request, compares the hash to its stores and, if they match, sends a time-stamped TGT (Ticket Granting Ticket) to the host, who then sends it to the TGS.

61
Q

Kerberos TGT

A

Ticket Granting Ticket. What the authentication server gives a host who has presented a valid hash. The host takes the TGT to the TGS for access to the network.

62
Q

Kerberos TGS

A

Ticket Granting Service. Receives a TGT from the host and (if valid) issues a timestamped service ticket (aka token, access token).

63
Q

Kerberos Service Ticket (aka token, access token)

A

Used by a host on a Kerberos system to access network resources. When a host tries to access a folder, printer, etc., it must present the token.

64
Q

SID

A

Security Identifier. The name for a Kerberos token in Windows.

65
Q

Duration of a Kerberos service ticket

A

8 hours.

66
Q

EAP

A

Extensible Authentication Protocol. Essentially a PPP wrapper that allows EAP-compliant applications to accept one of many types of authentication. Primarily used in wireless networks.

67
Q

EAP-PSK

A

EAP-Personal Shared Key. Shared secret key stored on a WAP and a wireless client, usually encrypted with AES.

68
Q

EAP-TLS

A

EAP-Transport Layer Security. Wireless authentication protocol that requires a RADIUS server, and that both the client and server have valid certificates. Very robust but difficult to set up.

69
Q

EAP-TTLS

A

EAP-Tunneled Transport Layer Security. Wireless authentication protocol that requires a RADIUS server, and that the server have a valid certificate. No client certificate needed.

70
Q

EAP-MS-CHAPv2

A

EAP with MS-CHAPv2 authentication through an encrypted TLS tunnel. Also called Protected Extensible Authentication Protocol.

71
Q

EAP-MD5

A

EAP that uses only an MD5 has for transferring login credentials. Very weak security, rarely used

72
Q

LEAP

A

Lightweight EAP. Cisco (proprietary) authentication protocol for wireless. A combination of MS-CHAP authentication and RADIUS server methods

73
Q

IEEE 802.1x

A

Formal protocol that combines RADIUS-style AAA with EAP versions to make a complete solution. Only really used in wireless.

74
Q

Encryption used by SSH

A

PKI, with public/private keys

75
Q

Tunnel

A

An encrypted link between to programs on two separate computers

76
Q

SSL/TLS

A

Secure Sockets Layer. Superseded by Transport Layer Security. Requires a server with a certificate. Current version of TLS is 1.2

77
Q

IPSec

A

Internet Protocol Security. Combined authentication and encryption that works at the network layer. Works in either transport or tunnel mode.

78
Q

Two modes of IPSec

A

Transport mode (headers sent in plaintext but data is encrypted); Tunnel mode (headers and data both encrypted). In IPv6, transport mode is enabled by default.

79
Q

IPSec authentication header (AH)

A

Used in IPSec for authentication

80
Q

IPSec encapsulating security payload (ESP)

A

Used in IPSec for implementing authentication and encryption

81
Q

IPSec ISAKMP

A

Internet security association and key management protocol. Used for establishing security associations, defining things like the protocol used for exchanging keys.

82
Q

IPSec Internet Key Exchange

A

key exchanging protocol

83
Q

IPSec KINK

A

Kerberized Internet Negotiatino of Keys. IPSec key exchanging protocols

84
Q

SCP

A

Secure copy protocol. Transfers data securely between two hosts. No ability to see files on the other computer. Predecessor to SFTP

85
Q

SFTP

A

Secure FTP. Also known as SSH FTP. A way to run FTP through an SSH tunnel.

86
Q

SNMP

A

Simple network management protocol. Queries the state of SNMP capable network devices, reporting things like CPU usage, network utilization, firewall hits, etc. Uses agents to collect data from a Management Information Base (MIB)

87
Q

SNMP Port

A

UDP Port 161

88
Q

LDAP

A

Lightweight directory access protocol. A tool used by programs to query and change information in network databases.

89
Q

LDAP Port

A

TCP port 389.

90
Q

NTP

A

Network time protocol. Gives the current time. Important for Kerberos.

91
Q

NTP port

A

UDP port 123.