Computer Networks 8

 0    19 fiche    tkrucz
Télécharger mP3 Imprimer jouer consultez
 
question English réponse English
Trust
commencer à apprendre
assumption made about how external actors and internal components will behave
Threat
commencer à apprendre
potential failure scenario that a system is designed to prevent or mitigate
Cryptographic (encryption) algorithm
commencer à apprendre
set of steps that can be used to convert plain text into cipher text, consists of ciphers and cryptographic hashes
cipher
commencer à apprendre
used for encryption and decryption
cryptographic hash function
commencer à apprendre
used for integrity and authentication
Block Cipher
commencer à apprendre
as an input takes plaintext block, encrypt it and return ciphertext (which can be decrypted only by using decryption key)
Secret-Key (Symmetric) Ciphers
commencer à apprendre
message is encrypted using a particular key, the same key is required for decrypting the message, fast and efficient
Public-Key (Asymethric) Ciphers
commencer à apprendre
uses a pair of related keys, one for encryption and a different one for decryption, slower than symmetric approach
Authenticators
commencer à apprendre
value included in transmitted message, used to verify authenticity, data integrity of a message and prevent message tampering
Session key
commencer à apprendre
used to secure a session (single episode of communication), each session uses a new session key, typically symmetric keys
Publick Key Infastructure (PKI)
commencer à apprendre
framework for certifying bindings between public keys and identities, defines what key belongs to whom
Firewall
commencer à apprendre
system that typically sits at some point of connectivity between a site it protects and the rest of the network. By default it blocks traffic unless that traffic is specifically allowed to pass through
Techniques for authentication
commencer à apprendre
Authenticator + Timestamp, Authenticator + Nonce
Pretty Good Privacy (PGP)
commencer à apprendre
approach providing security for email. It provides authentication, confidentiality, data integrity, and nonrepudiation
Secure Shell (SSH)
commencer à apprendre
protocol used to provide a remote login service, remotely execute commands and transfer files. Is most often used to provide strong client/server authentication/message integrity and confidentiality
Transport Layer Security (TLS)
commencer à apprendre
standard of Secure Socket Layer (SSL) used to ensure confidentiality, integrity, and authentication in Web transactions
IP Security (IPsec)
commencer à apprendre
framework provides three degrees of freedom: highly modular, many security properties, works for different streams
Highly Modular
commencer à apprendre
allow users to select from a variety of cryptographic algorithms and specialized security protocols
Security Properties
commencer à apprendre
e. g: access control, integrity, authentication, originality and confidentiality

Vous devez vous connecter pour poster un commentaire.