• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/69

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

69 Cards in this Set

  • Front
  • Back

Port # for SMTP

25

Port # for POP3

110

Port # for IMAP

143

Port for HTTP

80

Port for HTTPS or SSL

443

Port for FTP

20 - 21

RADIUS Default Port

UDP Port 1812

TCP

Transmission Control Protocol

UDP

User Datagram Protocol

What is the OSI Pneumonic

Please Do Not Throw the Sausage Pizza Away



(Physical, Datalink, Network, Transport, Session, Presentation, Application)

OSI Layers 1-3

Physical Layer


Data Link Layer


Network Layer

OSI Layers 4-7

Transport


Session


Presentation


Application

What are the 4 DOD Layers

Network Access


Internet


Transport


Application

What OSI Layer(s) is the same as the Network Access Layer of the DOD Model

Physical


Datalink

What OSI Layer(s) is the same as the Internet Layer of the DOD Model

The Network layer in the OSI Model is a one to 1 relationship to the Internet Layer in the DOD Model.

What OSI Layer(s) is the same as the Transport Layer of the DOD Model

The Transport Layer in the OSI Model is a 1 to 1 relationship to the Transport Layer in the DOD Model

What OSI Layer(s) is the same as the Application Layer of the DOD Model

The Session, Presentation, and Application layers in the OSI Model are the same as the Application layer in the DOD Model.

Algorithm based on fact that 2 large prime numbers can be multiplied easily but not factored easily. Used for digital signatures and key encryption

RSA

Encryption using 48 rounds of computation

3DES

Encryption using 168 bit Key

3DES

Encryption based on 128 bit Lucifer Algorithm

DES

Encryption using 14 rounds of computation

AES

Encryption using 16 rounds of computation

DES

Encryption using 128, 192, and 256 bit keys

AES

3 Core Cryptography Services

Encryption


Hashing


Authentication

CIA Triad

Confidentiality


Integrity


Availability

Two Open Source Encryption Products

TrueCrypt


PGP (Pretty Good Privacy)

Cryptographic Protocol and one of the oldest Key exchanges in field of cryptography

Diffie-Hellman

Cryptography used with fiber optic networks

Quantam Cryptography

PAP

Password Authentication Protocol

CHAP

Challenged Handshake Authentication Protocol

MSCHAP

Microsoft Challenge Handshake Protocol also Version II where both client and server are authenticated

EAP

Extensible Authentication Protocol

PPP

Point to Point Protocol (almost always protocol of choice) - Remote Connection Protocol

SLIP

Serial Line Internet Protocol - Remote Connection Protocol

Asyncronis Net Bouey

Microsoft Proprietary Protocol - Remote Connection Protocol

IPSec

Internet Protocol Security - encrypts all IP traffic and does not matter what application is

Two Modes for IPSec

Transport


Tunnel

Reasons for Using IPSect

Popular


Flexible


Robust


Encrypted

IPSec operates at which level of OSI Model

Network Layer

Mode in which only payload packet or data portion of packet is encrypted

Transport Mode of IPSec

Mode in which header of packet and header are encrypted

Tunnel Mode of IPSec

AH

Authenticating Header IPSec Protocol that is responsible for authenticating the sender with IPSec - used to ensure message integrity

ESP

Encapsulating Security Payload - responsible for encrypting the data in the packets to provide confidentiality

Derives a cryptographic Hash from data packet using a secret key known only by sending and receiving host to ensure that data was not modified along the way

AH

Adds 3 values to a packet

ESP adds header, trailer, integrity check value

Supported by ESP for Hashing and Encryption

SHA1


SHA2 through MD5


TripleDES


AES


SSL

Secure Sockets Layer - protocol for transmitting data in secure manner over internet.



Uses 2 keys to encrypt data - public and private keys - public known to everyone, private known only by recipient of data

What Layer of OSI model does SSL Operate

Application Layer of OSI Model

Advantages of SSL over IPSec

Simple Configuration


Better Protection

Disadvantage of SSL over IPSec

SSL does not have full network access

RADIUS

Remote Authentication Dial In User Service


Client/Server Protocol


Works at Application Layer


Provides Authentication and Authorization


Allows for accounting of users who have been granted or denied access

RADIUS Encrypts password using which protocol?

MD5

TACACS+

Terminal Access Controller Access Control System plus - AAA Protocol used by Cisco Supercedes original TACACS and XTACACS

XTACACS

Extended Terminal Access Controller Access Control System - a Central Authentication Service for Cisco devices.

SAML

Security Assertion Markup Language - allows for Single Sign On

Kerberos

Popular Mutual Authentication Protocol used by default in Active Directory environments

VPN Concentrator

Allows enterprise to centralize VPN Process by having external users log into the concentrator before accessing the internal network

Symetric Encryption

Also called Secret Key Encryption - Strengths - Fast, Difficult to Break, Cheaper than Asymetric Weakness - Needs to be secured properly, Complex Key Management, Does Not Provide Authentication

Asymetric Encryption

Also called Public Key Encryption - Strengths - Separate keys public and private, Authentication and Non-Repudiation, Better scalability, slower

Symetric Encryption Algorithyms

DES - Data Encryption Standard -



3DES - Triple Data Encryption Standard


AES - Advanced Encryption Standard



Larger the number of bits, stronger the encryption

XOR in Cryptography

Stands for Exclusive Or

DES Standard

64 bit block


56 bit key


8 parity bits


ECB - Electronic Code Book


CBC - Cipher Block Chaining Mode


CF - Cipher Feedback Mode


OF - Output Feedback Mode


CM - Counter Mode


3DES Standard

Uses 3 56 bit keys - encrypts 3 times with 3 keys


Heavy load on usage



4 Modes - DES-EEE3 - 3 keys used


DES-EDE3 - Plain txt encrypted 1 key - encryption process, then encrypted with 3rd key


DES-EEE2 - 1st,2nd,then 1st,


DES-EDE2 - 1st & 3rd key used

AES

Symetric Block Cipher


Based on Rjindael Algorithim


Key length & Block Size - 128, 192, 256 bits


10-14 Computational Rounds


128 bits - 10 rounds, 192 bits - 12 rounds, 256 bits - 14 rounds

AES Stages

Add Round Key


SubBytes


ShiftRows


MixColumns

AES Advantages and Disadvantages

Can be implemented in wide range of processors, hardware, and environments


Low Memory Requirements


Defend against Timing Attacks


192 and 256 bits can provide high level of security



Low number of computational rounds


Symetric Key Algorithms

CCMP


Rijndael


CAST - 128 and 256


SAFER


Blowfish - 64 bit block - key - 32 to 442 bits


Twofish - 128 bit block - key 156 bits


RC4


RC5

Asymetric Algorithms

RSA - Prime Numbers at Random


Compute value for prime numbers


RSA Used in SSL, PGP, IPSec, DES, AES


DSA - SHA-1


Elliptical Curve - Does Not create keys based on Prime Numbers


Transport,


Knapsack - Only concern is confidentiality of data.


ElGamal,


LUC - Secure alternative to RSA