CIDS 435 Lecture 6

studied byStudied by 0 people
0.0(0)
get a hint
hint

Cryptography Goal

1 / 73

74 Terms

1

Cryptography Goal

Secure communication channel, even with eavesdroppers present.

New cards
2

Key Cryptographic

Use of keys for encryption, attributed to Leon Alberti during the Renaissance.

New cards
3

Stream Ciphers

encrypt digit by digit, fast but less secure

New cards
4

Block Ciphers

encrypt fixed-length blocks, slower but more secure.

New cards
5

Asymmetric Key Cryptography

Uses a pair of keys (public and private) for secure communication, based on hard-to-solve number theory problems.

New cards
6

Confidentiality

Ensuring that information is not disclosed to unauthorized individuals.

New cards
7

Authenticity

Verifying that both the sender and receiver are who they claim to be.

New cards
8

Integrity

Maintaining and assuring the accuracy and completeness of data.

New cards
9

Availability

Ensuring that authorized users have access to information and associated assets when required.

New cards
10

Security Goals

Confidentiality, Authenticity, Integrity, and Availability became essential.

New cards
11

Zero-Trust Network

Modern security requires that each device in a network be secured individually,

New cards
12

the principle of Zero-Trust

do not automatically trust anything inside or outside the network.

New cards
13

Network Components

Hardware or software piece that plays a specific role in connecting devices and ensuring data flow within a network.

New cards
14

Networking Devices

switches, bridges, and routers, and their roles in managing network traffic.

New cards
15

Network Security Layers

Firewalls: Prevent unauthorized access

Intrusion Detection: Monitor for attacks

Network Throttling: Control traffic flow

New cards
16

Firewalls

Separate device or part of a modem/router, filters packets, detects IP spoofing.

New cards
17

Intrusion Detection Systems (IDS)

Detect spam, spoofed addresses, and botnet connections.

New cards
18

Network Throttling

Manages network load and prevents overuse.

New cards
19

Early Networks

Refers to the initial stages of network development characterized by a focus on fast communication with minimal security measures in place.

New cards
20

Critical Infrastructure

The internet evolved into a vital component of modern society, necessitating measures for ensuring confidentiality, authenticity, integrity, and availability of data and services.

New cards
21

Network Security

Protocols, topology, and defenses protect networks.

New cards
22

Networking

Devices, protocols, and virtualization optimize connectivity.

New cards
23

Switches and Bridges

Efficiently process and forward network traffic.

New cards
24

Virtual Switches and Security Switches

Manage virtual traffic and enforce security.

New cards
25

Routers

Direct packets between network segments.

New cards
26

OSI Model

Organizes data exchange into layers.

New cards
27

Internet Protocol (IP)

Routes data packets using addresses.

New cards
28

IPv4 Addressing

Assigns network and subnet addresses.

New cards
29

Transmission Control Protocol (TCP)

Ensures reliable data transfer.

New cards
30

Packets and Layers

Data units in network communication.

New cards
31

Domain Name System (DNS)

Maps domain names to IP addresses.

New cards
32

DNS Security (DNSSEC)

Enhances DNS security.

New cards
33

VLANs and VPNs

Create virtual networks and secure connections.

New cards
34

Ethernet and Wi-Fi

Common local network technologies.

New cards
35

Wireless LANs (IEEE 802.11)

Standards for wireless networks.

New cards
36

Address Resolution Protocol (ARP)

Maps IP addresses to MAC addresses.

New cards
37

Dynamic Host Configuration Protocol (DHCP)

Automates IP address assignment.

New cards
38

Network Attacks

Malicious activities targeting networks.

New cards
39

Malware

Malicious software threats.

New cards
40

Distributed Systems

Independent sub-systems collaborating on tasks.

New cards
41

Race Conditions

Outcome depends on concurrent process instruction order.

New cards
42

Time of Check to Time of Use Flaws

System state changes between verification and action.

New cards
43

Citibank Casino Cash Caper

Example of a security protocol vulnerability allowing unlimited transactions in 60 seconds.

New cards
44

Concurrency

Can cause issues like outdated data, inconsistent updates, and deadlock.

New cards
45

Locking

Restricts resource access to prevent inconsistent updates.

New cards
46

Deadlock

Processes wait for each other indefinitely.

New cards
47

Order of Updates

Affects outcome, e.g., paying with insufficient funds.

New cards
48

ACID Transactions

Ensure atomicity, consistency, isolation, and durability.

New cards
49

Fault Tolerance

Essential for system functionality and recovery from failures.

New cards
50

Redundancy

Replicates components for resilience.

New cards
51

Denial of Service (DoS) Attacks

Overwhelm system with meaningless requests, impacting availability.

New cards
52

Distributed Denial of Service (DDoS) Attacks

Large-scale attacks using botnets.

New cards
53

Naming Objects

the process of assigning labels to objects in a distributed system.

New cards
54

Needham Naming Principles

Guidelines for naming in distributed systems.

New cards
55

Multilevel Security

System with different security levels, often in government contexts.

New cards
56

Mandatory Access Control (MAC)

Enforces access based on security classifications.

New cards
57

Bell LaPadula Security Policy Mode

Controls access based on security clearances and prevents unauthorized access.

New cards
58

Biba Model

Ensures data integrity and prevents corruption.

New cards
59

Multilateral Security

Various models ensuring security across different levels.

New cards
60

Compartmentation

Separates sensitive information using codewords.

New cards
61

Lattice Model

Access control model based on security levels.

New cards
62

Covert Channels

Unauthorized communication paths in multilevel systems.

New cards
63

Practicality of Multilevel Security

Balances security needs with implementation costs.

New cards
64

Classified Documents

Categorized into Top Secret, Secret, and Confidential levels.

New cards
65

Trusted Computer System Evaluation Criteria (TCSEC)

US DoD standards for computer security.

New cards
66

Access Control Modes

Different methods recommended for multiuser computers.

New cards
67

Operating System Security

Windows and Linux implement mandatory access control mechanisms.

New cards
68

Security Enhanced Linux (SELinux)

Kernel module developed by NSA for MAC.

New cards
69

Formal Mathematical Analysis

Precise security policy evaluation using mathematical methods.

New cards
70

Information Leaks

Breaches in government and military systems.

New cards
71

Protocol notation for sending an encrypted message

T → E: {M,T}k

New cards
72

RSA-N Number

positive integer which equals the product of two distinct prime numbers p and q

New cards
73
New cards
74
New cards

Explore top notes

note Note
studied byStudied by 251 people
Updated ... ago
5.0 Stars(5)
note Note
studied byStudied by 6 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 8 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 15 people
Updated ... ago
4.0 Stars(1)
note Note
studied byStudied by 60 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 15 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 14 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 12 people
Updated ... ago
5.0 Stars(1)

Explore top flashcards

flashcards Flashcard31 terms
studied byStudied by 28 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard54 terms
studied byStudied by 75 people
Updated ... ago
5.0 Stars(4)
flashcards Flashcard79 terms
studied byStudied by 7 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard61 terms
studied byStudied by 80 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard72 terms
studied byStudied by 5 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard120 terms
studied byStudied by 9 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard32 terms
studied byStudied by 38 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard300 terms
studied byStudied by 13 people
Updated ... ago
5.0 Stars(1)