Security Architecture and Engineering Flashcards
ESA
Enterprise security architecture
ESA Building Blocks
- Boundary control services
- Access control services
- Integrity services
- Cryptography services.
- Auditing and Monitoring services
Boundary control services
Determine how/when information moves from one system to another. (Physical, network and process)
Access control services
Limit access to data/system to only authorized users systems or processes
Integrity services
Focus on keeping your data and your systems correct and free of corruption
Cryptography services
Provide for confidentiality
Auditing and monitoring services
view what attempts are made against the systems and data you are trying to protect. This includes intrusion detection systems.
Stream cipher
Encrypts data 1 bit at a time, ciphertext is same size as the original text
Block Cipher
Encrypts data one 64 bit block at a time. More secure but slower then Stream encryption
Block Cipher Examples
IDEA, RC5, DES, AES, Blowfish, Twofish
TCP
Transmission control protocol: Establishes, maintains and terminates a connection session. A lot of overhead, slow connection
UDP
User datagram protocol: connectionless protocol that is fast er then TCP. Does not send an acknowledgement.
Ip
Internet protocol: allows for global communications using logical addresses
ICMP
Internet control messages protocol: Used by network devices to communicate network conditions and conduct diagnostic tests
IGMP
Internet group management protocol: Used with IP multicasting to indicate when a device is joining a multicast enabled application data stream
ARP
Address resolution protocol: used in the TCP/IP model to resolve known IP addresses to unknown MAC addresses.
OSI Model
Physical, Data link, Network, Transport, Session, Presentation, Application
PGP
Pretty good privacy: publicly available email security and authentication utility that uses a variation of public key cryptography to encrypt emails