Vulnerabilities and Security Risks Flashcards
What is contained in a cipher suite
Key exchange, authentication, encryption, integrity algorithms
Encryption Algorithms that are antiquated
RC4, Triple-DES(Data Encryption Standard), ‘NULL’ (data is sent in clear text)
Encryption algorithm to use
AES-128 or AES-256
TCP
Transmission Control Protocol that establishes connection between end-points. Guarantees the delivery of packets.
IP
Internet Protocol that is connectionless and provides routing of packets in a network.
UDP
User Datagram Protocol - connectionless protocol that does not guarantee delivery of packets but it gives it its best shot.
SYN
First part of a threeway handshake where a computer may reach out to a server to see if its available.
SYN/ACK
Second part of a threeway handshake where the server responds to the requesting device saying its available.
ACK
Final part of threeway handshake where the endpoint gives an acknowledgement (hence the ACK) to the server that it received back its message.