Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

final IT sercuriyt

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Question
Answer
Cryptograpy   Code and Cipher systems; Aware of a secret message transmission  
🗑
Steganography   Hide a message in message; Unaware of tranmission  
🗑
Crypt analysis   The practice of breaking codes  
🗑
Ciphers   An Algorithm for performing encryption and decrytion  
🗑
Encrytion   convert plaintext to ciphertext.  
🗑
Decrytion   convert ciphertext to plaintext  
🗑
SIGINT   Intelligence from the interception of signals  
🗑
COMINT   Communications Intelligence  
🗑
ELINT   Electronic Intelligence  
🗑
DES   DATA Encryption Standard  
🗑
Data Encryption Standard   56key; 64 bit block; symmetric; one key encrytion  
🗑
DES Ciphers   Block: unvarying; fixed length; Stream: variable individual digits  
🗑
ECB   Electronic Codebook: two block cipher; Split in plain text blocks; encrypt seperatly  
🗑
CBC   Cipher Block Chaining; two block cipher XORed blocks  
🗑
OFB   output feedback; stream cipher; transforms a block cipher into synchronus  
🗑
CFB   cipher feedback;stream cipher; block cipher > self sync stream  
🗑
3DES   Triple data encryption; 112 or 168 bits: 64b block: symetric  
🗑
AES   Advanced Encryption Standard; 128,192,256 key length, symmetric, Rinjindael  
🗑
RSA   Rivest, Shamir, and Adleman; Asymmetrical key; private de-crypt text; public encrypts text  
🗑
DH   Diffie Hellman; key exchange shared secret key;  
🗑
KPA   Known-Plain Text Attacks; attacker has sample of both plaintext and encypted  
🗑
CPA   Chosen Plaintext Attack; attacker determines plaintext = cipherattacks  
🗑
COA   Ciphertext-Only Attack; only the encypted message is possessed  
🗑
CCA   Chosen-Ciphertext Attack;  
🗑
Hash   takes an arbitrary block of data and returns a fixed-size bit string; message digest or simply digest.  
🗑
Md5 hash   128 bit digests, message-digest algorithm  
🗑
SHA-1   160 bit digests, secure hash algorithm  
🗑
ECC   Elliptic Curve Cryptography: Asymmetrical more secure than RSA  
🗑
CA   Registration; initialization; certification; update; recovery; expiration; revocation  
🗑
feistel cipher   Iterated Block Ciphers; special class  
🗑
Meet-in-the-middle attack   MITM is a generic attack possession of pairs of plain texts and corresponding cipher texts  
🗑
Symmetric Encryption Algorithms   encryption/decryption keys are the same: DES; 3DES; AES  
🗑
Asymmetric Encryption Algorithms   encryption/decryption keys different Digital cert: DH; RSA; Elliptical  
🗑
PKI   public key encryption: key pair to encrypt and decrypt  
🗑
PGP   pretty good privacy, authentication for data communication  
🗑
DSA   Digital Signature Algorithm  
🗑
Anatomy of an attack   probe; penetrate; persist; propagate; paralyze  
🗑
DAC   Discretionary Access Control  
🗑
MAC   Manditory Access Control  
🗑
RBAC   Role Based Access Control  
🗑
RSBAC   Rule Set Based Access Control  
🗑
NIDS   Network Intrusion Detection System  
🗑
IdentityGuard   Two factor Auth, login with password and challenge  
🗑
Hardening   Reducing available vectors of attack  
🗑
DEP   Data Execution Prevention  
🗑
Steganalysis   Detect hidden information using a tool that Detects pixels changes  
🗑
Mis-configuration   A Secure AccessPoint(wpa wpa2) not properly configured, so it's insecure  
🗑
Mis-Association   Mistakenly associate your AP with another Accesspoint  
🗑
Wardriving   Roaming an area looking for insecure access point  
🗑
Malicious Association   A fake AccessPoint blocks the original and forces you to use thiers  
🗑
Rogue AP   An AccessPoint that is used without authorization. overpowering signal forces you onto it  
🗑
Airborne Virus   Worm infects computers over radio waves.  
🗑
Digest   Digest access authentication is one of the Agreed-upon methods a web server can use to negotiate credentials  
🗑
stream cipher mode   is a symmetric key cipher where plaintext digits are combined with a pseudorandom cipher digit stream  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: Tranith
Popular Computers sets