Storing and Transmitting Data Flashcards
Process of encryption
An encryption algorithm is used to scramble the data (make it not understandable)
The original data is called the plain text
A key is used to encrypt the data by applying it to the plain text
Plain text is encrypted into cipher text
Process of decryption
An algorithm is used to decrypt the text
The encrypted data is called the cipher text
A key is used to decrypt the data by applying it to the cipher text
Cipher text is encrypted into plain text
Main uses of encryption
To store and transmit information securely.
To make data meaningless if intercepted or stolen
What’s a firewall
Can be software (installed on pc) or hardware (on router)
6 things a firewall does
- Allows a user to set rules for network traffic
- Checks incoming and outgoing data meets specific criteria
- Acts as a filter for incoming and outgoing traffic
- Keeps a log of activity e.g. website requests
- Blocks unacceptable data and allows acceptable data through
- Helps prevent unauthorised access
What can firewalls block
certain websites (IP addresses)
hackers accessing the network
certain ports
malware
8 thing a proxy server does
- Prevents direct access to a web server
- Requests/responses are passed through the proxy server
- Examines and filters traffic
- Used to direct invalid traffic away from the webserver
- Rejects requests for data from the web server if invalid
- Can block certain IP addresses
- Can be used to prevent denial of Service attacks
- Can help prevent hacking of web server
Extra functions of Proxy Servers
Used to hide the user IP address
Requests are anonymous
Can filter outgoing requests for content
Caches websites
Symmetric encryption
Uses an algorithm and a single shared key
Reducing risk of decryption
Increasing the length (number of bits) of the key
means there are more possible combinations for the key and less chance of decryption by brute force
When sending symmetrically encrypted data, they key must be sent separately to the cipher text
If the key is intercepted when being transmitted it is hard to decrypt the cipher text without the key
Drawbacks of symmetric decryption
Key distribution- hacker could intercept the key when sent over internet and decrypt the ciphertext
Asymmetric encryption
Uses an encryption algorithm and a public + private key
How asymmetric encryption works
Everyone has their own public and private key
Private key is kept safe
Encryption algorithm and public keys are freely available
A message encrypted with a public key can only be decrypted with a private key
A message encrypted with a private key can only be decrypted with a public key
SSL
secure socket layer
has two layers
1. handshake - exchange info
2. record layer - handles data and encryption
Security protocol used to encrypt data to provide a secure connection for the transmission of private data
How SSL works
- Browser requests web server to identify itself
- Web server sends its digital certificate to the browser
- Browser authenticates the digital certificate which contains the websites public key
- Once authenticated a connection is established
- All data sent is then encrypted using public and private keys and symmetric and asymmetric encryption
- If not authenticated a warning message is shown and open padlock is shown