Security Flashcards
What is encryption at rest?
The encryption of persistent data
What contains an Access Token?
The security credentials for a login session
What is SOCKS
An internet protocol that exchanges packets from client to server through a proxy
What type of attack does HTTPS protect from?
Man-in-the-middle attacks
What is a public key certificate?
An electronic document used to prove the ownership of a public key
What is TLS?
Transport Layer Security
Cryptographic protocols used to provide security over a computer network.
What is SSL replaced by?
TLS
What are the 2 layers of the TLS protocol?
TLS record
TLS handshake
What protocol is responsible for encryption in HTTPS?
TLS
What type of cipher is used in public key cryptography?
Asymmetric
What entity assigns digital certificates?
CA (certificate authority)
What is the control protocol called at the beginning of a TLS connection?
Handshake
This protocol is used to exchange all the information required by both sides for the exchange of the actual application data by TLS
What proves the ownership of a public key?
A digital certificate
Through what is Alice’s message transferred to Bob?
The medium
Who is the attacker?
Eve
In cryptography, does Even access to the medium?
Yes
What is the goal of cryptography?
Protect the plaintext against Eve
What is the plaintext letter in cryptography?
p
What is the ciphertext letter in cryptography?
c
What is the cipher?
The algorithm used to convert the plaintext to the ciphertext
What is the key?
Information only known by Alice and Bob
What is p – c?
Encryption
What is c – p?
Decryption
What does the cipher typically use for encryption?
The key
How do you call the study of codebreaking?
Cryptanalysis
How do you call the study of codebreaking and encryption?
Cryptology
What is an alphabet in cryptography
The minimal information for information coding
What composes the CIA triad?
Confidentiality, Integrity, and Availability
What is commonly used for data integrity verification?
Hash values