final IT sercuriyt
Quiz yourself by thinking what should be in
each of the black spaces below before clicking
on it to display the answer.
Help!
|
|
||||
---|---|---|---|---|---|
Cryptograpy | Code and Cipher systems; Aware of a secret message transmission
🗑
|
||||
Steganography | Hide a message in message; Unaware of tranmission
🗑
|
||||
Crypt analysis | The practice of breaking codes
🗑
|
||||
Ciphers | An Algorithm for performing encryption and decrytion
🗑
|
||||
Encrytion | convert plaintext to ciphertext.
🗑
|
||||
Decrytion | convert ciphertext to plaintext
🗑
|
||||
SIGINT | Intelligence from the interception of signals
🗑
|
||||
COMINT | Communications Intelligence
🗑
|
||||
ELINT | Electronic Intelligence
🗑
|
||||
DES | DATA Encryption Standard
🗑
|
||||
Data Encryption Standard | 56key; 64 bit block; symmetric; one key encrytion
🗑
|
||||
DES Ciphers | Block: unvarying; fixed length;
Stream: variable individual digits
🗑
|
||||
ECB | Electronic Codebook: two block cipher;
Split in plain text blocks; encrypt seperatly
🗑
|
||||
CBC | Cipher Block Chaining; two block cipher
XORed blocks
🗑
|
||||
OFB | output feedback; stream cipher;
transforms a block cipher into synchronus
🗑
|
||||
CFB | cipher feedback;stream cipher;
block cipher > self sync stream
🗑
|
||||
3DES | Triple data encryption;
112 or 168 bits: 64b block: symetric
🗑
|
||||
AES | Advanced Encryption Standard;
128,192,256 key length, symmetric, Rinjindael
🗑
|
||||
RSA | Rivest, Shamir, and Adleman;
Asymmetrical key; private de-crypt text; public encrypts text
🗑
|
||||
DH | Diffie Hellman; key exchange shared secret key;
🗑
|
||||
KPA | Known-Plain Text Attacks;
attacker has sample of both plaintext and encypted
🗑
|
||||
CPA | Chosen Plaintext Attack;
attacker determines plaintext = cipherattacks
🗑
|
||||
COA | Ciphertext-Only Attack;
only the encypted message is possessed
🗑
|
||||
CCA | Chosen-Ciphertext Attack;
🗑
|
||||
Hash | takes an arbitrary block of data and returns a fixed-size bit string; message digest or simply digest.
🗑
|
||||
Md5 hash | 128 bit digests, message-digest algorithm
🗑
|
||||
SHA-1 | 160 bit digests, secure hash algorithm
🗑
|
||||
ECC | Elliptic Curve Cryptography:
Asymmetrical more secure than RSA
🗑
|
||||
CA | Registration; initialization; certification; update; recovery; expiration; revocation
🗑
|
||||
feistel cipher | Iterated Block Ciphers; special class
🗑
|
||||
Meet-in-the-middle attack | MITM is a generic attack possession of pairs of plain texts and corresponding cipher texts
🗑
|
||||
Symmetric Encryption Algorithms | encryption/decryption keys are the same: DES; 3DES; AES
🗑
|
||||
Asymmetric Encryption Algorithms | encryption/decryption keys different
Digital cert: DH; RSA; Elliptical
🗑
|
||||
PKI | public key encryption: key pair to encrypt and decrypt
🗑
|
||||
PGP | pretty good privacy, authentication for data communication
🗑
|
||||
DSA | Digital Signature Algorithm
🗑
|
||||
Anatomy of an attack | probe; penetrate; persist; propagate; paralyze
🗑
|
||||
DAC | Discretionary Access Control
🗑
|
||||
MAC | Manditory Access Control
🗑
|
||||
RBAC | Role Based Access Control
🗑
|
||||
RSBAC | Rule Set Based Access Control
🗑
|
||||
NIDS | Network Intrusion Detection System
🗑
|
||||
IdentityGuard | Two factor Auth, login with password and challenge
🗑
|
||||
Hardening | Reducing available vectors of attack
🗑
|
||||
DEP | Data Execution Prevention
🗑
|
||||
Steganalysis | Detect hidden information using a tool that Detects pixels changes
🗑
|
||||
Mis-configuration | A Secure AccessPoint(wpa wpa2) not properly configured, so it's insecure
🗑
|
||||
Mis-Association | Mistakenly associate your AP with another Accesspoint
🗑
|
||||
Wardriving | Roaming an area looking for insecure access point
🗑
|
||||
Malicious Association | A fake AccessPoint blocks the original and forces you to use thiers
🗑
|
||||
Rogue AP | An AccessPoint that is used without authorization. overpowering signal forces you onto it
🗑
|
||||
Airborne Virus | Worm infects computers over radio waves.
🗑
|
||||
Digest | Digest access authentication is one of the Agreed-upon methods a web server can use to negotiate credentials
🗑
|
||||
stream cipher mode | is a symmetric key cipher where plaintext digits are combined with a pseudorandom cipher digit stream
🗑
|
Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Created by:
Tranith
Popular Computers sets