Security Architecture and Engineering Flashcards

1
Q

ESA

A

Enterprise security architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ESA Building Blocks

A
  1. Boundary control services
  2. Access control services
  3. Integrity services
  4. Cryptography services.
  5. Auditing and Monitoring services
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Boundary control services

A

Determine how/when information moves from one system to another. (Physical, network and process)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Access control services

A

Limit access to data/system to only authorized users systems or processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Integrity services

A

Focus on keeping your data and your systems correct and free of corruption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cryptography services

A

Provide for confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Auditing and monitoring services

A

view what attempts are made against the systems and data you are trying to protect. This includes intrusion detection systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Stream cipher

A

Encrypts data 1 bit at a time, ciphertext is same size as the original text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Block Cipher

A

Encrypts data one 64 bit block at a time. More secure but slower then Stream encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Block Cipher Examples

A

IDEA, RC5, DES, AES, Blowfish, Twofish

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

TCP

A

Transmission control protocol: Establishes, maintains and terminates a connection session. A lot of overhead, slow connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

UDP

A

User datagram protocol: connectionless protocol that is fast er then TCP. Does not send an acknowledgement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Ip

A

Internet protocol: allows for global communications using logical addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ICMP

A

Internet control messages protocol: Used by network devices to communicate network conditions and conduct diagnostic tests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

IGMP

A

Internet group management protocol: Used with IP multicasting to indicate when a device is joining a multicast enabled application data stream

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ARP

A

Address resolution protocol: used in the TCP/IP model to resolve known IP addresses to unknown MAC addresses.

17
Q

OSI Model

A

Physical, Data link, Network, Transport, Session, Presentation, Application

18
Q

PGP

A

Pretty good privacy: publicly available email security and authentication utility that uses a variation of public key cryptography to encrypt emails