Various Concepts x2 Flashcards
A solution that provides real time or near real time analysis of security alerts generated by network hardware and applications.
SIEM
A class of security tools the help facilitate incident response, threat hunting, and security configuration by orchestrating automated runbooks and delivering data enrichment. AKA next generation SIEM.
SOAR
commonly used to gather information about routers, switches, and other network devices including status indicators, and CPU and memory utilization.
SNMP
Inactive data that is archived
Data at Rest
Data that is crossing the network or that resides in the computer’s memory.
Data in Transit
Data that is undergoing change.
Data in Use
an algorithm that performs the encryption or decryption.
Cipher
A single key encrypts and decrypts the data.
Symmetric Encryption
One key encrypts and a second key decrypts the data.
Asymmetric Encryption
encrypts data bit by bit using a mathematical XOR function to create the cipher text. (Symmetric).
Stream cipher
breaks the input into fixed-length blocks of data and performs encryption on the blocks of data.
Block Cipher
breaks the input into 64-bit blocks and uses transposition and substitution to create the cipher text and a key strength of only 56-bits. Considered insecure.
DES - Symmetric cipher
uses 3 separate symmetric keys to encrypt, decrypt, and then encrypt the cipher text to increase the strength of its predecessor.
3DES - Symmetric cipher
block cipher which uses 64-bit blocks to encrypt plaintext to cipher text.
IDEA symmetric
block cipher that uses 128, 192, or 256-bit blocks and a matching key size to encrypt plain text to cipher text. The standard for U.S. government.
AES Symmetric
block cipher uses 64-bit blocks and a variable length key to encrypt plain text to cipher text.
Blowfish symmetric
block cipher that replaced blowfish and uses 128-bit blocks and 128, 192, of 256-bit keys to encrypt plain text to cipher text.
Twofish symmetric
stream cipher using a variable key size from 40 to 2048-bits that is used in SSL and WEP.
RC4 Symmetric
block cipher using key sizes up to 2048-bits.
RC5 symmetric
block cipher introduced as a replacement for DES, but AES was chosen instead.
RC6 symmetric
State the symmetric algorithms (9):
DES, 3DES, AES, Twofish, Blowfish, IDEA, RC4, RC5, and RC6
Asymmetric algorithms are also known as this:
Public Key Cryptography.
a hash digest of a message encrypted with the sender’s private key to let the recipient know that the document was created and sent by the person claiming to have sent it.
Digital Signature
Used to conduct key exchanges and secure key distribution over an unsecure network. Used to establish a VPN tunnel with IPSEC.
Diffie-Hellman Asymmetric Algorithm
relies on the mathematical difficulty of factoring large prime numbers. Supports key sizes from 1024 to 4096-bits.
RSA (Rivest, Shamir, and Adleman) Asymmetric Algorithm
based upon the algebraic structure of elliptic curves over finite fields to define the keys. More efficient than RSA. Commonly used in mobile devices and low-power computing devices.
ECC (Elliptic Curve Cryptography) Asymmetric
State the 3 Asymmetric algorithms
ECC, RSA, Diffie-Hellman
An encryption program used for signing, encrypting, and decrypting emails. Uses IDEA and hybrid encryption.
PGP (pretty good privacy)
Newer version of PGP that uses AES for its symmetric encryption functions. Also is cross platform (linux, windows, etc. ).
GNU Privacy Guard (GPG)
stream cipher using XOR that encrypts plaintext information with a secret random key that is the same length as the plaintext input.
One-Time Pad
PRNG
Pseudo Random Number Generator.
A shared, immutable ledger for recording transactions, tracking assets, and building trust.
Blockchain
a cryptographic key is generated for each execution of the key process. The keys last a “short” time.
Ephemeral
allows calculations to be performed on data without it being decrypted. Used for privacy preserving data in cloud storage and outsourced computations.
Homomorphic encryption
a one-way cryptographic function which takes an input and produces a unique message digest.
Hashing
occurs when 2 files create the same hash digest
Collision
fixed-length 128-bit hash value unique to the input file.
MD5
fixed-length 160-bit hash value unique to the input file. Replaced MD5 to reduce collisions.
SHA-1
family of algorithms with longer hash digests that include SHA-224, SHA-256, SHA-348, and SHA-512
SHA-2
hash digests between 224 and 512-bits.
SHA-3
open-source algorithm that creates unique 160,256, or320-bit hash message digests for each input file.
RIPEMD
hashing algorithm used to create a level of assurance as to the integrity and authenticity of a given message or file.
HMAC
original version of password hashing used by Windows that uses DES and is limited to 14 characters.
LANMAN Hash(LM hash)
replacement to LM Hash that uses RC4 and released with Windows 3.1 in 1993.
NT LAN Manager Hash (NTLM Hash)
replaced NTLM and uses HMAC-MD5 and is considered difficult to crack.
NTLMv2 Hash
A technique that allows an attacker to authenticate to a server or service by using the underlying NTLM or LM hash instead or requiring the plaintext password.
Pass the Hash
a technique used to mitigate a weaker key by increasing the time needed to crack it,
Key Stretching
adding random data into a one-way hash to help protect against password cracking techniques.
Salting
An entire system of hardware, software, policies, procedures, and people that is based on asymmetric encryption.
PKI
digitally signed electronic documents that bind a public key with a user’s identity.
Certificates
digital certificate standard used in PKI that contains owner, user, and certificate authority information.
X.509
allow all the subdomains of a website to use the same public key certificate and have it displayed as valid.
Wildcard certificates
Allows a certificate owner to specify additional domains and IP addresses to be supported.
SAN Subject Alternate Name
only require the server to be validated
Single-sided certificates
require both the server and the user to be validated.
Dual-sided certificates
standard that contains encoding methods that include BER, CER, and DER.
X.690
original ruleset covering the encoding of data structures for certificates where several different encoding types can be used.
BER (Basic Encoding Rules)
A restricted version of BER that only allows one encoding type.
CER (Canonical Encoding Rules)
restricted version of BER that has one encoding type and stricter rules for length, character strings, and how elements of digital certificate are stored in x.509
DER (Distinguished Encoding Rules)
used to verify information about a user prior to requesting that a CA issue the certificate.
Registration Authority (RA)
the entity that issues certificates to a user
CA Certificate Authority
online list of digital certificates that the CA has revoked.
CRL Certificate Revocation List
a protocol that allows you to determine the revocation status of a digital certificate using its serial number.
OCSP Online Certificate Status Protocol
allows the certificate holder to get the OCSP record from the server at regular intervals and include it as part of the ssl or tls handshake.
OCSP Stapling
allows an https website to resist impersonation attacks by presenting a set of trusted public keys to the user’s browser as part of the HTTP header.
Public Key Pinning
occurs when a secure copy of a user’s private key is held in case the user accidentally loses their key. Usually require 2 persons (separation of duties) to retrieve the key.
Key Escrow
a specialized type of software that allows the restoration of a lost or corrupt key.
Key Recovery Agent
a decentralized trust model that addresses issues associated with the public authentication of public keys within a CA-based PKI system and is a concept used in PGP and GNuPg.
Web of Trust
is a web of trust. Peer to peer self-signed certificate where the more people know you, the more people will trust you. Examples include the ebay seller rating system.
PGP (Pretty Good Privacy)
a standard that provides cryptographic security for electronic messaging, email.
S/MIME secure multipurpose internet mail extensions
a protocol that encrypts PPP packets and sends data as encrypted traffic. It also can use CHAP based authentication which is considered insecure.
PPTP port1723. PPTP
is a tunneling protocol used to support virtual private networks (VPNs) or as part of the delivery of services by ISPs.
LT2P port1701
A TCP/IP protocol that authenticates and encrypts IP packets and effectively secures communications between devices using this protocol. It also provides CIA, confidentiality through encryption, integrity through hashing, and authentication through a key exchange.
IPSec
method used by IPSec to create the vpn tunnel by encrypting the connection between authenticated peers.
IKE Internet Key Exchange