Computer Networks 8

 0    19 flashcards    tkrucz
download mp3 print play test yourself
 
Question English Answer English
Trust
start learning
assumption made about how external actors and internal components will behave
Threat
start learning
potential failure scenario that a system is designed to prevent or mitigate
Cryptographic (encryption) algorithm
start learning
set of steps that can be used to convert plain text into cipher text, consists of ciphers and cryptographic hashes
cipher
start learning
used for encryption and decryption
cryptographic hash function
start learning
used for integrity and authentication
Block Cipher
start learning
as an input takes plaintext block, encrypt it and return ciphertext (which can be decrypted only by using decryption key)
Secret-Key (Symmetric) Ciphers
start learning
message is encrypted using a particular key, the same key is required for decrypting the message, fast and efficient
Public-Key (Asymethric) Ciphers
start learning
uses a pair of related keys, one for encryption and a different one for decryption, slower than symmetric approach
Authenticators
start learning
value included in transmitted message, used to verify authenticity, data integrity of a message and prevent message tampering
Session key
start learning
used to secure a session (single episode of communication), each session uses a new session key, typically symmetric keys
Publick Key Infastructure (PKI)
start learning
framework for certifying bindings between public keys and identities, defines what key belongs to whom
Firewall
start learning
system that typically sits at some point of connectivity between a site it protects and the rest of the network. By default it blocks traffic unless that traffic is specifically allowed to pass through
Techniques for authentication
start learning
Authenticator + Timestamp, Authenticator + Nonce
Pretty Good Privacy (PGP)
start learning
approach providing security for email. It provides authentication, confidentiality, data integrity, and nonrepudiation
Secure Shell (SSH)
start learning
protocol used to provide a remote login service, remotely execute commands and transfer files. Is most often used to provide strong client/server authentication/message integrity and confidentiality
Transport Layer Security (TLS)
start learning
standard of Secure Socket Layer (SSL) used to ensure confidentiality, integrity, and authentication in Web transactions
IP Security (IPsec)
start learning
framework provides three degrees of freedom: highly modular, many security properties, works for different streams
Highly Modular
start learning
allow users to select from a variety of cryptographic algorithms and specialized security protocols
Security Properties
start learning
e. g: access control, integrity, authentication, originality and confidentiality

You must sign in to write a comment