click below
click below
Normal Size Small Size show me how
Security Stack
final IT sercuriyt
| Question | Answer |
|---|---|
| Cryptograpy | Code and Cipher systems; Aware of a secret message transmission |
| Steganography | Hide a message in message; Unaware of tranmission |
| Crypt analysis | The practice of breaking codes |
| Ciphers | An Algorithm for performing encryption and decrytion |
| Encrytion | convert plaintext to ciphertext. |
| Decrytion | convert ciphertext to plaintext |
| SIGINT | Intelligence from the interception of signals |
| COMINT | Communications Intelligence |
| ELINT | Electronic Intelligence |
| DES | DATA Encryption Standard |
| Data Encryption Standard | 56key; 64 bit block; symmetric; one key encrytion |
| DES Ciphers | Block: unvarying; fixed length; Stream: variable individual digits |
| ECB | Electronic Codebook: two block cipher; Split in plain text blocks; encrypt seperatly |
| CBC | Cipher Block Chaining; two block cipher XORed blocks |
| OFB | output feedback; stream cipher; transforms a block cipher into synchronus |
| CFB | cipher feedback;stream cipher; block cipher > self sync stream |
| 3DES | Triple data encryption; 112 or 168 bits: 64b block: symetric |
| AES | Advanced Encryption Standard; 128,192,256 key length, symmetric, Rinjindael |
| RSA | Rivest, Shamir, and Adleman; Asymmetrical key; private de-crypt text; public encrypts text |
| DH | Diffie Hellman; key exchange shared secret key; |
| KPA | Known-Plain Text Attacks; attacker has sample of both plaintext and encypted |
| CPA | Chosen Plaintext Attack; attacker determines plaintext = cipherattacks |
| COA | Ciphertext-Only Attack; only the encypted message is possessed |
| CCA | Chosen-Ciphertext Attack; |
| Hash | takes an arbitrary block of data and returns a fixed-size bit string; message digest or simply digest. |
| Md5 hash | 128 bit digests, message-digest algorithm |
| SHA-1 | 160 bit digests, secure hash algorithm |
| ECC | Elliptic Curve Cryptography: Asymmetrical more secure than RSA |
| CA | Registration; initialization; certification; update; recovery; expiration; revocation |
| feistel cipher | Iterated Block Ciphers; special class |
| Meet-in-the-middle attack | MITM is a generic attack possession of pairs of plain texts and corresponding cipher texts |
| Symmetric Encryption Algorithms | encryption/decryption keys are the same: DES; 3DES; AES |
| Asymmetric Encryption Algorithms | encryption/decryption keys different Digital cert: DH; RSA; Elliptical |
| PKI | public key encryption: key pair to encrypt and decrypt |
| PGP | pretty good privacy, authentication for data communication |
| DSA | Digital Signature Algorithm |
| Anatomy of an attack | probe; penetrate; persist; propagate; paralyze |
| DAC | Discretionary Access Control |
| MAC | Manditory Access Control |
| RBAC | Role Based Access Control |
| RSBAC | Rule Set Based Access Control |
| NIDS | Network Intrusion Detection System |
| IdentityGuard | Two factor Auth, login with password and challenge |
| Hardening | Reducing available vectors of attack |
| DEP | Data Execution Prevention |
| Steganalysis | Detect hidden information using a tool that Detects pixels changes |
| Mis-configuration | A Secure AccessPoint(wpa wpa2) not properly configured, so it's insecure |
| Mis-Association | Mistakenly associate your AP with another Accesspoint |
| Wardriving | Roaming an area looking for insecure access point |
| Malicious Association | A fake AccessPoint blocks the original and forces you to use thiers |
| Rogue AP | An AccessPoint that is used without authorization. overpowering signal forces you onto it |
| Airborne Virus | Worm infects computers over radio waves. |
| Digest | Digest access authentication is one of the Agreed-upon methods a web server can use to negotiate credentials |
| stream cipher mode | is a symmetric key cipher where plaintext digits are combined with a pseudorandom cipher digit stream |