Storing and Transmitting Data Flashcards

1
Q

Process of encryption

A

An encryption algorithm is used to scramble the data (make it not understandable)
The original data is called the plain text
A key is used to encrypt the data by applying it to the plain text
Plain text is encrypted into cipher text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Process of decryption

A

An algorithm is used to decrypt the text
The encrypted data is called the cipher text
A key is used to decrypt the data by applying it to the cipher text
Cipher text is encrypted into plain text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Main uses of encryption

A

To store and transmit information securely.

To make data meaningless if intercepted or stolen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What’s a firewall

A

Can be software (installed on pc) or hardware (on router)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

6 things a firewall does

A
  1. Allows a user to set rules for network traffic
  2. Checks incoming and outgoing data meets specific criteria
  3. Acts as a filter for incoming and outgoing traffic
  4. Keeps a log of activity e.g. website requests
  5. Blocks unacceptable data and allows acceptable data through
  6. Helps prevent unauthorised access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What can firewalls block

A

certain websites (IP addresses)
hackers accessing the network
certain ports
malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

8 thing a proxy server does

A
  1. Prevents direct access to a web server
  2. Requests/responses are passed through the proxy server
  3. Examines and filters traffic
  4. Used to direct invalid traffic away from the webserver
  5. Rejects requests for data from the web server if invalid
  6. Can block certain IP addresses
  7. Can be used to prevent denial of Service attacks
  8. Can help prevent hacking of web server
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Extra functions of Proxy Servers

A

Used to hide the user IP address
Requests are anonymous
Can filter outgoing requests for content
Caches websites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Symmetric encryption

A

Uses an algorithm and a single shared key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Reducing risk of decryption

A

Increasing the length (number of bits) of the key
means there are more possible combinations for the key and less chance of decryption by brute force

When sending symmetrically encrypted data, they key must be sent separately to the cipher text
If the key is intercepted when being transmitted it is hard to decrypt the cipher text without the key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Drawbacks of symmetric decryption

A

Key distribution- hacker could intercept the key when sent over internet and decrypt the ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Asymmetric encryption

A

Uses an encryption algorithm and a public + private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How asymmetric encryption works

A

Everyone has their own public and private key
Private key is kept safe
Encryption algorithm and public keys are freely available
A message encrypted with a public key can only be decrypted with a private key
A message encrypted with a private key can only be decrypted with a public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SSL

A

secure socket layer
has two layers
1. handshake - exchange info
2. record layer - handles data and encryption
Security protocol used to encrypt data to provide a secure connection for the transmission of private data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How SSL works

A
  1. Browser requests web server to identify itself
  2. Web server sends its digital certificate to the browser
  3. Browser authenticates the digital certificate which contains the websites public key
  4. Once authenticated a connection is established
  5. All data sent is then encrypted using public and private keys and symmetric and asymmetric encryption
  6. If not authenticated a warning message is shown and open padlock is shown
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

TLS

A

Transport layer security
updated version of SSL
is more secure
allows for session caching(to connect quicker)
can be extended by new authentication methods

17
Q

Examples uses of SSL

A
Online banking
Online shopping
Cloud storage
Online gaming
Email
Video conferencing
18
Q

How do we know TLS/SSL is being used

A

protocol is HTTPS
Padlock icon is locked
Can view website certificate

19
Q

Authentication

A

Verifies data, coming from a trusted source

20
Q

How are digital signatures used

A
  1. The message is put through a hashing algorithm to generate a hash text
  2. The generated hash text is encrypted with the senders private key to get a digital signature
  3. The message and digital signature are sent to the receiver over the internet
  4. The receiver puts the message through the same hash algorithm to generate its own hash text
  5. The digital signature is decrypted using the senders public key to get the original hash text
  6. The original hash text is compared to the receivers calculated hash text
  7. If the hashes are the same then it is verified and has not been alerted
21
Q

How are users authenticated

A

Usernames
Passwords
Biometrics(fingerprint, retina, face and voice scans/recognitions)

22
Q

Hashing algorithm

A

Plain text is passed to a hashing algorithm which generates some hashed text
The process is one-way so you cannot get plain text from the hashed text
The process is repeatable so you always get the same hashed text from the plain text