Various Concepts x2 Flashcards
A solution that provides real time or near real time analysis of security alerts generated by network hardware and applications.
SIEM
A class of security tools the help facilitate incident response, threat hunting, and security configuration by orchestrating automated runbooks and delivering data enrichment. AKA next generation SIEM.
SOAR
commonly used to gather information about routers, switches, and other network devices including status indicators, and CPU and memory utilization.
SNMP
Inactive data that is archived
Data at Rest
Data that is crossing the network or that resides in the computer’s memory.
Data in Transit
Data that is undergoing change.
Data in Use
an algorithm that performs the encryption or decryption.
Cipher
A single key encrypts and decrypts the data.
Symmetric Encryption
One key encrypts and a second key decrypts the data.
Asymmetric Encryption
encrypts data bit by bit using a mathematical XOR function to create the cipher text. (Symmetric).
Stream cipher
breaks the input into fixed-length blocks of data and performs encryption on the blocks of data.
Block Cipher
breaks the input into 64-bit blocks and uses transposition and substitution to create the cipher text and a key strength of only 56-bits. Considered insecure.
DES - Symmetric cipher
uses 3 separate symmetric keys to encrypt, decrypt, and then encrypt the cipher text to increase the strength of its predecessor.
3DES - Symmetric cipher
block cipher which uses 64-bit blocks to encrypt plaintext to cipher text.
IDEA symmetric
block cipher that uses 128, 192, or 256-bit blocks and a matching key size to encrypt plain text to cipher text. The standard for U.S. government.
AES Symmetric
block cipher uses 64-bit blocks and a variable length key to encrypt plain text to cipher text.
Blowfish symmetric
block cipher that replaced blowfish and uses 128-bit blocks and 128, 192, of 256-bit keys to encrypt plain text to cipher text.
Twofish symmetric
stream cipher using a variable key size from 40 to 2048-bits that is used in SSL and WEP.
RC4 Symmetric
block cipher using key sizes up to 2048-bits.
RC5 symmetric
block cipher introduced as a replacement for DES, but AES was chosen instead.
RC6 symmetric
State the symmetric algorithms (9):
DES, 3DES, AES, Twofish, Blowfish, IDEA, RC4, RC5, and RC6
Asymmetric algorithms are also known as this:
Public Key Cryptography.
a hash digest of a message encrypted with the sender’s private key to let the recipient know that the document was created and sent by the person claiming to have sent it.
Digital Signature
Used to conduct key exchanges and secure key distribution over an unsecure network. Used to establish a VPN tunnel with IPSEC.
Diffie-Hellman Asymmetric Algorithm