Security

Description

Datakomm Flashcards on Security, created by Emma Tysk on 19/11/2017.
Emma Tysk
Flashcards by Emma Tysk, updated more than 1 year ago
Emma Tysk
Created by Emma Tysk over 6 years ago
16
1

Resource summary

Question Answer
Give examples of what kind of attacks a network can be subjected to *Sniffing - make copies of packets as they travel across a link *Modification, insertion, and deletion of message content *Masquerading - The attacker pretends to be something that it is not
In Public Key Cryptography: Which key is used for decryption, and for encryption? Either of the keys can be used to encrypt a message; the opposite key from the one used to encrypt the message is used for decryption.
How does Public Key Cryptography achieve Confidentiality? For example, if Bob wants to send sensitive data to Alice, and wants to be sure that only Alice may be able to read it, he will encrypt the data with Alice's Public Key. Only Alice has access to her corresponding Private Key and as a result is the only person with the capability of decrypting the encrypted data back into its original form.
Why is it hard to figure out the private key if you have the public key in RSA? In RSA you Multiply two large primes (easy!), but it is difficult to determine the original numbers from the total factoring
What is SSL? SSL (Secure Sockets Layer) is the standard security technology for establishing an encrypted link between a web server and a browser. This link ensures that all data passed between the web server and browsers remain private and integral.
Block Cipher A block cipher takes a block of plaintext bits and generates a block of ciphertext bits,
What determines the strength of a Block Cipher? The strength of cipher depends up on the key length.
Why should you avoid small block sizes in the Block Cipher? Say a block size is m bits. Then the possible plaintext bits combinations are then 2m. If the attacker discovers the plain text blocks corresponding to some previously sent ciphertext blocks, then the attacker can launch a type of ‘dictionary attack’ by building up a dictionary of plaintext/ciphertext pairs sent using that encryption key
Show full summary Hide full summary

Similar

CCNA Security Final Exam
Maikel Degrande
Security Guard Training
Summit College
ISACA CISM Exam Glossary
Fred Jones
Security
annelieserainey
Securities Regulation
harpratap_singh
2W151 Volume 1: Safety and Security - Quiz 7
Joseph Whilden J
Security Quiz Review
Rylan Blah
Security Policies
indysingh7285
2W151 Volume 1: Safety and Security - Quiz 6
Joseph Whilden J
Security (2)
Daniel Freedman
Certified Security Compliance Specialist
jnkdmls