click below
click below
Normal Size Small Size show me how
Security Stack
final IT sercuriyt
Question | Answer |
---|---|
Cryptograpy | Code and Cipher systems; Aware of a secret message transmission |
Steganography | Hide a message in message; Unaware of tranmission |
Crypt analysis | The practice of breaking codes |
Ciphers | An Algorithm for performing encryption and decrytion |
Encrytion | convert plaintext to ciphertext. |
Decrytion | convert ciphertext to plaintext |
SIGINT | Intelligence from the interception of signals |
COMINT | Communications Intelligence |
ELINT | Electronic Intelligence |
DES | DATA Encryption Standard |
Data Encryption Standard | 56key; 64 bit block; symmetric; one key encrytion |
DES Ciphers | Block: unvarying; fixed length; Stream: variable individual digits |
ECB | Electronic Codebook: two block cipher; Split in plain text blocks; encrypt seperatly |
CBC | Cipher Block Chaining; two block cipher XORed blocks |
OFB | output feedback; stream cipher; transforms a block cipher into synchronus |
CFB | cipher feedback;stream cipher; block cipher > self sync stream |
3DES | Triple data encryption; 112 or 168 bits: 64b block: symetric |
AES | Advanced Encryption Standard; 128,192,256 key length, symmetric, Rinjindael |
RSA | Rivest, Shamir, and Adleman; Asymmetrical key; private de-crypt text; public encrypts text |
DH | Diffie Hellman; key exchange shared secret key; |
KPA | Known-Plain Text Attacks; attacker has sample of both plaintext and encypted |
CPA | Chosen Plaintext Attack; attacker determines plaintext = cipherattacks |
COA | Ciphertext-Only Attack; only the encypted message is possessed |
CCA | Chosen-Ciphertext Attack; |
Hash | takes an arbitrary block of data and returns a fixed-size bit string; message digest or simply digest. |
Md5 hash | 128 bit digests, message-digest algorithm |
SHA-1 | 160 bit digests, secure hash algorithm |
ECC | Elliptic Curve Cryptography: Asymmetrical more secure than RSA |
CA | Registration; initialization; certification; update; recovery; expiration; revocation |
feistel cipher | Iterated Block Ciphers; special class |
Meet-in-the-middle attack | MITM is a generic attack possession of pairs of plain texts and corresponding cipher texts |
Symmetric Encryption Algorithms | encryption/decryption keys are the same: DES; 3DES; AES |
Asymmetric Encryption Algorithms | encryption/decryption keys different Digital cert: DH; RSA; Elliptical |
PKI | public key encryption: key pair to encrypt and decrypt |
PGP | pretty good privacy, authentication for data communication |
DSA | Digital Signature Algorithm |
Anatomy of an attack | probe; penetrate; persist; propagate; paralyze |
DAC | Discretionary Access Control |
MAC | Manditory Access Control |
RBAC | Role Based Access Control |
RSBAC | Rule Set Based Access Control |
NIDS | Network Intrusion Detection System |
IdentityGuard | Two factor Auth, login with password and challenge |
Hardening | Reducing available vectors of attack |
DEP | Data Execution Prevention |
Steganalysis | Detect hidden information using a tool that Detects pixels changes |
Mis-configuration | A Secure AccessPoint(wpa wpa2) not properly configured, so it's insecure |
Mis-Association | Mistakenly associate your AP with another Accesspoint |
Wardriving | Roaming an area looking for insecure access point |
Malicious Association | A fake AccessPoint blocks the original and forces you to use thiers |
Rogue AP | An AccessPoint that is used without authorization. overpowering signal forces you onto it |
Airborne Virus | Worm infects computers over radio waves. |
Digest | Digest access authentication is one of the Agreed-upon methods a web server can use to negotiate credentials |
stream cipher mode | is a symmetric key cipher where plaintext digits are combined with a pseudorandom cipher digit stream |