Security Flashcards
CIA
Confidentiality
Integrity
Availability
Symmetric Encryption
Same key is used to encrypt and decrypt
Ciphertext
encrypted text
What did Rivest-Shamir-Adleman create
Asymmetric encryption
Asymmetric Encryption
Uses a Public Key and a Private Key, which together are known as a key pair. The public key can only encrypt. The Private key can only decrypt. People exchange public keys to communicate.
popullar hash algoithmes
md5
sha-1
RADIUS
An AAA that uses UDP ports 1812-1813 or UDP ports 1645-1646.
TACACS+
An AAA that uses TCP port 49
Kerberos
Authentication of local area networks.
It handles authentication and authorization for wired networks.
It relies heavily on time stamps
key Distribution Center (KDC)
Consists of two services: AS and TGS.
AS: Authentication Service
TGS: Ticket-Granting Service
Extensible Authentication Protocol (EAP)
enables flexible authentication