Week 4 (Security in the Data Domain) Flashcards

1
Q

Name the 7 Security Domains.

A

Organization, End-Users, Physical Access, System, Software, Network, Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Explain Scytale.

A

It is one of the oldest military ciphering methods used in 400 BC - Used by the Spartans.
It is the method of using a narrow strip of leather or cloth going around a cylindrical rod and the message is written across the adjoining sides.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Cryptography?

A

Scrambling information so it appears unreadable. It Transforms information into secure form.
Science of transforming information into a secure form while being transmitted or stored.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Encryption and Decryption?

A

Encryption: Changing original text into a secret message using cryptography.
Decryption: Changing secret messages back into original form.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Plaintext and Ciphertext?

A

Plaintext: is the Data to be encrypted. It is input into an encryption algorithm.
Ciphertext: Data that was encrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a key?

A

A key is a mathematical value entered into the algorithm to produce ciphertext and vice versa.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the five basic information protections Cryptography can provide?

A

Confidentiality,
Integrity,
Availability,
Authenticity of the Sender, and
Nonrepudiation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does Cryptography provide Confidentiality?

A

It ensures only the authorized parties can view the data. Encrypted information can only be viewed by those who have been provided the key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does Cryptography provide Integrity?

A

Ensures information is correct and unaltered. Encrypted information cannot be changed except by authorized users who have the key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does Cryptography provide Availability?

A

Authorized users can access it. Authorized users are provided the decryption key to access the information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does Cryptography provide Authenticity of the Sender?

A

It refers to the proven fact that something is legitimate or real. Cryptography can prove the sender was legitimate and not an imposter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does Cryptography provide Nonrepudiation?

A

Proves that a user performed an action. Cryptographic nonrepudiation prevents an individual from fraudulently denying they were involved in a transaction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Explain Symmetric Encryption Algorithms.

A

It uses the same shared secret key to encrypt and decrypt information. The Secret key cannot be made public and must only be known to the sender and receiver.
Needs to use a secure channel to distribute the key.
It performs faster than most public key cryptographic algorithms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Explain Asymmetric Encryption Algorithms.

A

Also known as public key cryptography.
Uses two mathematically related keys.
Public key available to everyone and freely distributed.
Private key known only to individual to whom it belongs.
Only the Private key can decrypt what has been encrypted with the Public key and vice versa.
Key pairs. For every additional user, there is an additional keypair.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the mathematical equations for number of keys for both Symmetric and Asymmetric Algorithms?

A

Symmetric: N(N-1)/2, where N is the number of users and N-1 is the number of additional links.
Asymmetric: 2N, where N is the number of users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the two symmetric algorithm categories?

A

Based on the amount of data processed over time:
Stream cipher: Encrypts data one bit (or character) at a time as it becomes available.
Block Cipher: Works on entire block of plaintext at a time. Separate blocks of 8 to 16 bytes encrypted independently, and the blocks are randomized for additional security.

17
Q

What are two types of Ciphers?

A

Substitution Cipher - Caesar Cipher - moves the letters up the alphabet by a specific number of letters
Transposition Cipher - Rearranges letters without changing them.

18
Q

Explain the Transposition Cipher.

A

Rearranges letters without changing them.
Lowercase letters has Higher Precedence in the Key.
Determine Key
Assign number value
Record plaintext by row.
Extract by column

19
Q

Final Step in most symmetric ciphers?

A

Combine Cipher Stream with Plaintext to create the ciphertext.

20
Q

Give examples of Symmetric Algorithms.

A

Data Encryption Standard (DES)
Triple Data Encryption Standard (3DES) - Uses three rounds of encryption, ciphertext of first round becomes input for second iteration, most secure versions use different keys used for each round.
Advanced Encryption Standard (AES) - Performs three steps on every block of plaintext, designed to be secure well into the future.
RC4
Rivest Cipher (RC)
International Data Encryption Algorithm (IDEA) - block cipher processing 64 bits with a 128-bit key with 8 rounds.
Blowfish - Block cipher operating on 64-bit blocks with key lengths from 32-448 bits. No significant weaknesses have been identified.

21
Q

Popular Asymmetric algorithm:

A

RSA
2048, 1024

22
Q

Explain Hash Algorithms.

A

A cryptographic hash algorithm produces an irreversible fixed length string or hash from a variable length message.
It is extremely unlikely that different messages produce the same hash value.
Used for confidentiality (to store passwords securely) and for authentication, nonrepudiation, and integrity (as part of a digital signature)

23
Q

What are some common Hash Algorithms?

A

Message Digest 5 (MD5)
Secure Hash Algorithm (SHA)

24
Q

Explain the Digital Signature.

A

Private key to Encrypt, Public Key to Decrypt. (This is the only case the Private key is used to encrypt the message)
Verifies the sender (Authenticity)
Used to prove a document originated from a valid sender
Prevents sender from disowning the message (nonrepudiation)
Proves message integrity

25
Q

Explain Stenography.

A

Hiding the existence of data
Embedding messages into image, audio, or video files
Achieved by dividing data and hiding in unused portions of the image
Invisibly altering the structure of a digital image

26
Q

What is hashing used for?

A

Only for comparisons - hash the message one side then hash the message the other side and compare.

27
Q

Cryptography can be applied through:

A

Hardware or Software