Computer Networks 8

 0    19 fiszek    tkrucz
ściągnij mp3 drukuj graj sprawdź się
 
Pytanie English Odpowiedź English
Trust
rozpocznij naukę
assumption made about how external actors and internal components will behave
Threat
rozpocznij naukę
potential failure scenario that a system is designed to prevent or mitigate
Cryptographic (encryption) algorithm
rozpocznij naukę
set of steps that can be used to convert plain text into cipher text, consists of ciphers and cryptographic hashes
cipher
rozpocznij naukę
used for encryption and decryption
cryptographic hash function
rozpocznij naukę
used for integrity and authentication
Block Cipher
rozpocznij naukę
as an input takes plaintext block, encrypt it and return ciphertext (which can be decrypted only by using decryption key)
Secret-Key (Symmetric) Ciphers
rozpocznij naukę
message is encrypted using a particular key, the same key is required for decrypting the message, fast and efficient
Public-Key (Asymethric) Ciphers
rozpocznij naukę
uses a pair of related keys, one for encryption and a different one for decryption, slower than symmetric approach
Authenticators
rozpocznij naukę
value included in transmitted message, used to verify authenticity, data integrity of a message and prevent message tampering
Session key
rozpocznij naukę
used to secure a session (single episode of communication), each session uses a new session key, typically symmetric keys
Publick Key Infastructure (PKI)
rozpocznij naukę
framework for certifying bindings between public keys and identities, defines what key belongs to whom
Firewall
rozpocznij naukę
system that typically sits at some point of connectivity between a site it protects and the rest of the network. By default it blocks traffic unless that traffic is specifically allowed to pass through
Techniques for authentication
rozpocznij naukę
Authenticator + Timestamp, Authenticator + Nonce
Pretty Good Privacy (PGP)
rozpocznij naukę
approach providing security for email. It provides authentication, confidentiality, data integrity, and nonrepudiation
Secure Shell (SSH)
rozpocznij naukę
protocol used to provide a remote login service, remotely execute commands and transfer files. Is most often used to provide strong client/server authentication/message integrity and confidentiality
Transport Layer Security (TLS)
rozpocznij naukę
standard of Secure Socket Layer (SSL) used to ensure confidentiality, integrity, and authentication in Web transactions
IP Security (IPsec)
rozpocznij naukę
framework provides three degrees of freedom: highly modular, many security properties, works for different streams
Highly Modular
rozpocznij naukę
allow users to select from a variety of cryptographic algorithms and specialized security protocols
Security Properties
rozpocznij naukę
e. g: access control, integrity, authentication, originality and confidentiality

Musisz się zalogować, by móc napisać komentarz.