• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/26

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

26 Cards in this Set

  • Front
  • Back
DES
Symmetric Algorithm.
Insecure, unreliable.
Replaced by 3DES
3DES
outdated and slow.
Symmetric
AES
Symmetric
Very Strong
IDEA
Symmetric.
PGP uses to ensure email security.
operates using 64-bit blocks and a 128-bit key
RC5
fast, variable-length, variable block symmetric cipher.
RC5
RSA Security developed RC5
Advantages of Symmetric
Faster and easier to implement
Lower overhead on system resources
advantages of Asymmetric
Scalable and does not require much administration
Easier for users to use
DES
weak key length (56 bits)
RSA
asymmetric key
transport protocol that can be used to transmit private keys between hosts.
Diffie-Hellman
asymetric key.
exchange keys.
uses logarithms
vulnerable to man-in-the-middle
El Gamal
asymetric.
extension of Diffie-Hellman
includes encryption and digital signatures
MD5
most commonly used hash protocol.
128 bit digest.
very fast
open source
SHA-1
more secure hashing protocol.
pads a message
Secure message format works by encrypting a message with the ---------- ensuring confidentiality but not integrity
public key of the intended recipient,
. Why is a hash more difficult to decipher than a standard encryption protocol?
Because a hash is a one-way function, the only way to decipher it is to try a large number of hashes of cleartext until one matches the original hash
S/MIME,
, provides basic cryptographic services for email sent via the Internet. Most popular browsers and email clients support S/MIME, making it among the more popular cryptographic email security services available.
MOSS
a less-common, more extensive suite of security services for email.
PEM
provides 3DES encryption for email.
PGP,
open-source and extremely popular email security suite that uses IDEA to encrypt email and validate signatures.
Open relays
email servers that forward email without any kind of authentication.
A good email security setup always includes a non-open relay server (or authenticated relay server).
SSL
connection-oriented standard designed to allow for secure cryptographic communication between two hosts via the Internet. TLS is the newest version of SSL.
S-HTTP
connectionless standard that provides for symmetric encryption, message digests, and client-server authentication.
screening router
he router acts as the sole gateway and gatekeeper between the un-trusted, outside network (i.e. the Internet) and the trusted network (i.e. LAN).
Active v. Passive IDS
: An active IDS will attempt to thwart any kind of detected attacks without user intervention. A passive IDS simply monitors for malicious activity
Network v. Host IDS:
A network-based IDS is one that operates as its own node on a network, while host-based IDS systems require agents to be installed on every protected host.*