Frage |
Antworten |
|
Lernen beginnen
|
|
assumption made about how external actors and internal components will behave
|
|
|
|
Lernen beginnen
|
|
potential failure scenario that a system is designed to prevent or mitigate
|
|
|
Cryptographic (encryption) algorithm Lernen beginnen
|
|
set of steps that can be used to convert plain text into cipher text, consists of ciphers and cryptographic hashes
|
|
|
|
Lernen beginnen
|
|
used for encryption and decryption
|
|
|
cryptographic hash function Lernen beginnen
|
|
used for integrity and authentication
|
|
|
|
Lernen beginnen
|
|
as an input takes plaintext block, encrypt it and return ciphertext (which can be decrypted only by using decryption key)
|
|
|
Secret-Key (Symmetric) Ciphers Lernen beginnen
|
|
message is encrypted using a particular key, the same key is required for decrypting the message, fast and efficient
|
|
|
Public-Key (Asymethric) Ciphers Lernen beginnen
|
|
uses a pair of related keys, one for encryption and a different one for decryption, slower than symmetric approach
|
|
|
|
Lernen beginnen
|
|
value included in transmitted message, used to verify authenticity, data integrity of a message and prevent message tampering
|
|
|
|
Lernen beginnen
|
|
used to secure a session (single episode of communication), each session uses a new session key, typically symmetric keys
|
|
|
Publick Key Infastructure (PKI) Lernen beginnen
|
|
framework for certifying bindings between public keys and identities, defines what key belongs to whom
|
|
|
|
Lernen beginnen
|
|
system that typically sits at some point of connectivity between a site it protects and the rest of the network. By default it blocks traffic unless that traffic is specifically allowed to pass through
|
|
|
Techniques for authentication Lernen beginnen
|
|
Authenticator + Timestamp, Authenticator + Nonce
|
|
|
Pretty Good Privacy (PGP) Lernen beginnen
|
|
approach providing security for email. It provides authentication, confidentiality, data integrity, and nonrepudiation
|
|
|
|
Lernen beginnen
|
|
protocol used to provide a remote login service, remotely execute commands and transfer files. Is most often used to provide strong client/server authentication/message integrity and confidentiality
|
|
|
Transport Layer Security (TLS) Lernen beginnen
|
|
standard of Secure Socket Layer (SSL) used to ensure confidentiality, integrity, and authentication in Web transactions
|
|
|
|
Lernen beginnen
|
|
framework provides three degrees of freedom: highly modular, many security properties, works for different streams
|
|
|
|
Lernen beginnen
|
|
allow users to select from a variety of cryptographic algorithms and specialized security protocols
|
|
|
|
Lernen beginnen
|
|
e. g: access control, integrity, authentication, originality and confidentiality
|
|
|