Week 2 - Cryptography Aplications Flashcards

1
Q

What is PKI (Public Key Infrastructure)?

A

a system that defines the creation, storage, and distribution of digital certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a digital signature?

A

a file that proves an entity owns a certain public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What 3 things does a certificate contain?

A
  1. Info on Public Key
  2. Registered Owner
  3. Digital Signature
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does CA stand for?

A

Certificate Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a CA responsible for?

A

storing, issuing, and signing certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does RA stand for?

A

Registration Authority
verifying the identities of any entities requesting certificates to be signed and stored with the CA (certificate authority)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does CRL stand for?

A

Certificate revocation list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does a CRL list provide?

A

a list of certificates that are no longer valid (certificate revocation list)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does the X.509 standard define?

A

defines the format of digital certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the fields are defined in a X.509 standard?

A

defines the format of digital certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the fields are defined in a X.509 standard?

A
  1. Version
  2. Serial number
  3. Certificate signature algorithm
  4. Issuer name
  5. Validity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the 9 fields defined in a X.509 certificate?

A
  1. Version
  2. Serial number
  3. Certificate signature algorithm
  4. Issuer name
  5. Validity
  6. Subject
  7. Subject public key info
  8. Certificate signature algorithm
  9. Certificate signature value
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does CRL stand for?

A

Certificate Revocation List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a certificate revocation list (CRL)?

A

distributes a list of certificates that are no longer valid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does the X.509 standard define?

A

defines the format of digital certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does HTTPS protect us on the internet?

A

encapsulates the HTTP traffic over an encrypted secure channel using TLS or SSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does HTTPS stand for?

A

HyperText Transport Protocol (Secure)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is HTTPS also called?

A

HTTP over SSL or TLS (what it uses to encapsulate traffic)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

When was SSL 3.0 deprecated?

A

2015

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is TLS?

A

Provides a secure channel for an application to communicate with the service

(that’s independent of HTTPS but is used with it)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are some examples that use TLS to secure communications? (4)

A

secure web browsing (HTTPS), email (SMTP/POP3 over TLS), online banking logins, and secure file transfers (FTPS) - any sensitive information

22
Q

What is a session key?

A

a temporary, randomly generated cryptographic key used to encrypt and decrypt data during a single communication session

23
Q

What is the session key derived from?

A

a master key using cryptographic algorithms

24
Q

How do you defend against having your session key compromised?

A

use HTTPS across their entire website and strengthen session management

25
Q

What does SSH stand for

A

Secure Shell

26
Q

What is SSH?

A

a network protocol that allows users to securely communicate and share data between two computers over an unsecured network

27
Q

What protocol is most commonly used for remote login to command-line-based system?

A

SSH (Secure Shell), which provides a secure way to access a remote computer’s shell and execute commands

28
Q

What key does SSH use to authenticate the remote machine the client is connecting to?

A

the remote machine’s public key

29
Q

What is PGP?

A

Pretty Good Privacy, a data encryption program that allows users to securely send and receive messages and files

30
Q

What does PGP do?

A

encrypts and decrypts messages, authenticates messages with digital signatures, and encrypts files

31
Q

What is PGP commonly used in?

A

Email encryption, File encryption, Digital signatures, Software signing

32
Q

How secure is PGP?

A

extremely safe, if used correctly and securely - uses algorithms that are considered unbreakable

33
Q

What does VPN stand for?

A

Virtual private network

34
Q

What does a VPN allow you to do?

A

Hide your identity, Encrypt your data, Protect your privacy, Protect business communications, Avoid surveillance, Manage your online bank accounts

35
Q

VPN is like an ____ ____ where…

A

encrypted tunnel” where your internet traffic is securely channeled through a remote server

36
Q

What is a point-to-point VPN connection?

A

a secure connection between two devices or networks over the internet that encrypts data to prevent it from being intercepted

37
Q

What does IPsec stand for?

A

Internet Protocol Security

38
Q

What is IPsec?

A

a group of protocols that encrypts and authenticates IP packets to secure communications over networks

39
Q

What 2 modes of operations does IPsec support?

A

transport mode and tunnel mode

40
Q

How does IPsec work?

(the process, where is it sent)

A

creating a secure “tunnel” between two devices, encrypting data packets before sending them across a network

41
Q

What’s the difference between transport mode and tunnel mode for IPsec?

A

Tunnel Mode provides end-to-end security by encrypting the entire IP packet, Transport Mode only encrypts the payload of the packet; Tunnel Mode is used for connecting entire networks, Transport Mode is used for host-to-host communication.

42
Q

OpenVPN operates over either ____ or ____

A

UDP (User Datagram Protocol) or TCP (Transmission Control Protocol)

43
Q

OpenVPN operates over port….?

A

UDP port 1194 by default, but can also use TCP port 443

44
Q

Where is a Trusted Platform Module located?

A

on a computer’s motherboard as a separate chip, but it can also be built into the chipset

45
Q

How does a TPM work?

A

A Trusted Platform Module (TPM) is a security chip that protects a computer or mobile device by storing and using cryptographic keys, and confirming the authenticity of the device’s software and firmware

46
Q

What is remote attestation?

A

a security mechanism that allows a remote device to prove its identity and integrity to a remote party

47
Q

What is data binding and sealing for TPM?

A

“data binding” refers to the process of encrypting data using a key generated by the TPM, essentially linking the data to that specific device, while “sealing” takes this a step further by only allowing decryption of the data if the system is in a specific configuration (like a certain set of platform measurements) at the time of decryption, effectively preventing access to the data if the system state has changed

48
Q

What is a secure element?

A

a microprocessor chip that protects and stores sensitive data in a device

49
Q

What is TEE?

A

Trusted Execution Environment (TEE) is a method of protecting sensitive data and operations in a device by isolating them in a secure area

50
Q

TPMs are most commonly used to: (3)

A

to help protect encryption keys, user credentials, and other sensitive data.

51
Q

What does FTE encrypt? [Full disk encryption]

A

all data on a disk drive, including the operating system, applications, and user data