Security Flashcards
What is encryption at rest?
The encryption of persistent data
What contains an Access Token?
The security credentials for a login session
What is SOCKS
An internet protocol that exchanges packets from client to server through a proxy
What type of attack does HTTPS protect from?
Man-in-the-middle attacks
What is a public key certificate?
An electronic document used to prove the ownership of a public key
What is TLS?
Transport Layer Security
Cryptographic protocols used to provide security over a computer network.
What is SSL replaced by?
TLS
What are the 2 layers of the TLS protocol?
TLS record
TLS handshake
What protocol is responsible for encryption in HTTPS?
TLS
What type of cipher is used in public key cryptography?
Asymmetric
What entity assigns digital certificates?
CA (certificate authority)
What is the control protocol called at the beginning of a TLS connection?
Handshake
This protocol is used to exchange all the information required by both sides for the exchange of the actual application data by TLS
What proves the ownership of a public key?
A digital certificate
Through what is Alice’s message transferred to Bob?
The medium
Who is the attacker?
Eve