- (malicious software) software that has a nefarious purpose, designed to cause problems to you as an individual or your system (Viruses and Worms) malware
- 5 core functions of NIST Cybersecurity Framework Identify, Protect, Detect, Respond, Recover
- a concept that when something fails, it should do so in a safe state fail-safe defaults
- a message in its original form Plaintext (or cleartext)
- a message in the encrypted form Ciphertext
- a protection mechanism should deny access by default, and grant access only when explicit permission exists default (implicit) deny
- A special mathematical function that performs one-way encryption Hashing
- a subject (user, application, or process) should have only necessary rights and privileges to perform its tasks with no additional permissions least privilege
- a system for encryption and decryption Cryptosystem
- ability to verify that a message has been sent and received and that the sender can be identified (enforces ID) and verified nonrepudiation
- Agents intercept a message that is encrypted, and proceed to use various techniques to try and decipher the plain text message Cryptanalysis
- All of the following are asymmetric encryption RSA, ECC, ElGamal
- always using simple solutions when available Economy of mechanism
- An asymmetric encryption key that does have to be protected. private key
- An asymmetric encryption key that does not have to be protected. public key
- application of encryption verifies that a document was sent by the person it says it is from Digital signitures
- applies to situations involving both authorization and access implict deny
- attacks by a criminal organization which is characterized by a greater amount of planning, a longer period of time to conduct the activity, more financial banking to accomplish it, and possible corruption or collusion with insiders structured threat
- attacks on a system that are conducted over short periods of time, are usually done by an individual or small group, have little financial backing, and are accomplished by insiders or outsiders who do not seek collusion with insiders unconstructed threat
- attempts to break encryption algorithms Cryptanalyst
- characterized by a much longer period of preparation (years is not uncommon), tremendous financial backing and a large/organized group of attackers. highly structured threat
- communication between two parties; allows future activity without renewed authentication Session Management
- Confidentiality, Integrity, and Availability “CIA” of security
- controlling access to internal computers from external entities such as routers, firewalls, authentication hardware and software, encryption, and IDS network security
- Cryptographic algorithms are used for all of the following Confidentiality, Integrity, and Authentication
- Cryptography can be used to protect confidentiality and integrity as well as to implement nonrepudiation, authentication, key escrow, digital signatures, and digital rights management. True
- deals with the security of telecommunications systems COMSEC (Communication Security)
- design and operation of elements to ensure the proper functional environment of a system configuration management
- Designed for the integrity of a message.One way hash that can create a hash value that can be used with an encryption protocol, has 160-bit hash value. Secure Hash Algorithm (SHA)
- Developed by the Research and Development in Advanced Communication Technologies (RACE). The primary design feature is two different and independent parallel chains of computation, the results of which are then combined at the end of the process RIPEMD
- Encrypting a message by simply rearranging the order of the letters is a function of the Transposition Cypher
- Example of a shift cypher ROT13
- exception handling; system is more resilient exception management
- focuses on protecting each computer and device individually instead of addressing protection of the network as a whole host security
- for any given risk, more than one individual needs to be involved separation of duties
- has 224, 256, 334, 512 bit hash values SHA-2
- Hashing algorithms are most likely to be compromised by a collision attack
- holds that the protection of an object should not rely upon secrecy of the protection mechanism itself Open Design
- if we change a character of the plaintext, then several characters of the ciphertext should change, and similarly, if we change a character of the ciphertext, then several characters of the plaintext should change. Diffusion
- information being protected from unauthorized access or alteration and yet is available to authorized individuals when required Information Security
- is a common hashing algorithm that produces a 128-bit hash. Message Digest 5 (MD5)
- is a concept that complements the idea of various layers of security Diversity of Defense
- is a principle that is characterized by the use of multiple, different defense mechanism with a goal of improving the defensive response to an attack Defense in Depth
- is a property of a public key system in which a key derived from another key is not compromised even if the originating key is compromised in the future. perfect forward secrecy
- is the ability to control whether a subject can interact with an object Access Control
- is the latest, is more secure and produces a 128-bit hash. MD5
- is the masking of an item to render it unreadable, yet still usable obfuscation
- is to ensure that only those individuals who have the authority to view a piece of information may do so Confidentiality
- It takes plaintext of any length and creates a digest 128 bits in length. It then divides the plaintext into multiple 128-bit sections. Extra padding is added If the message is less than 128 bits. MD2
- Keeping a copy of an encryption key with a trusted third party Key escrow
- Message Digest 4: A hash that was created in 1990 for computers that process 32 bits at a time. MD4
- Operational Model of Security Protection=Prevention + (Detection + Response)
- Polyalphabetic substitution cipher The Vigenère cipher works as a(n)
- Produces a 160-bit hash value and is used in DSS SHA-1
- protection of data, hardware, and software computer security
- refers to the concept that each and every request should be verified Complete Mediation
- Refers to the users’ acceptance of security measures. psychological acceptability
- states that mechanisms used to access resources should be dedicated and not shared Least common mechanism
- states that the protection mechanism should be constructed so that it uses more than one piece of information to make access decisions separation of privilege
- the “hacking” of the systems and computers used by a telephone company used by a telephone company to operate its telephone network phreaking
- The “hacking” of the systems and computers used by a telephone company to operate its telephone network Phreaking
- The cipher that replaces each letter of the alphabet with a different letter (not in sequence) Substitution Cypher
- the matching of a user to an account through previously shared credentials Authentication
- the practice (or art) of using encryption to conceal text Cryptography
- The process for protecting intellectual property from unauthorized users Digital Rights Management
- the process of coding a message such that its meaning is concealed Encryption
- the process of transforming an encrypted message into the original form Decryption
- The science of encrypting, or hiding, information Cryptology
- This type of encryption uses the same key to encrypt and decrypt Symmetric Key
- to making the relationship between the key and the ciphertext as complex and as involved as possible. Confusion
- transforming plaintext of any length into a short code called a hash Hashing
- warfare conducted against the information and information processing equipment used by an adversary information warfare
- When a message sent by a user is digitally signed with a private key, the person will not be able to deny sending the message Nonrepudiation
- whether a control can be verified to be functioning properly auditability
- Which encryption method is based on the idea of two keys, one that is public and one that is private? Asymmetric encryption
- Which encryption method is based on the idea of using the same key for encryption and decryption of data Symmetric Cypher
Other Links:
See other websites for quiz:
Check on QUIZLET