Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
26 Cards in this Set
- Front
- Back
DES
|
Symmetric Algorithm.
Insecure, unreliable. Replaced by 3DES |
|
3DES
|
outdated and slow.
Symmetric |
|
AES
|
Symmetric
Very Strong |
|
IDEA
|
Symmetric.
PGP uses to ensure email security. operates using 64-bit blocks and a 128-bit key |
|
RC5
|
fast, variable-length, variable block symmetric cipher.
|
|
RC5
|
RSA Security developed RC5
|
|
Advantages of Symmetric
|
Faster and easier to implement
Lower overhead on system resources |
|
advantages of Asymmetric
|
Scalable and does not require much administration
Easier for users to use |
|
DES
|
weak key length (56 bits)
|
|
RSA
|
asymmetric key
transport protocol that can be used to transmit private keys between hosts. |
|
Diffie-Hellman
|
asymetric key.
exchange keys. uses logarithms vulnerable to man-in-the-middle |
|
El Gamal
|
asymetric.
extension of Diffie-Hellman includes encryption and digital signatures |
|
MD5
|
most commonly used hash protocol.
128 bit digest. very fast open source |
|
SHA-1
|
more secure hashing protocol.
pads a message |
|
Secure message format works by encrypting a message with the ---------- ensuring confidentiality but not integrity
|
public key of the intended recipient,
|
|
. Why is a hash more difficult to decipher than a standard encryption protocol?
|
Because a hash is a one-way function, the only way to decipher it is to try a large number of hashes of cleartext until one matches the original hash
|
|
S/MIME,
|
, provides basic cryptographic services for email sent via the Internet. Most popular browsers and email clients support S/MIME, making it among the more popular cryptographic email security services available.
|
|
MOSS
|
a less-common, more extensive suite of security services for email.
|
|
PEM
|
provides 3DES encryption for email.
|
|
PGP,
|
open-source and extremely popular email security suite that uses IDEA to encrypt email and validate signatures.
|
|
Open relays
|
email servers that forward email without any kind of authentication.
A good email security setup always includes a non-open relay server (or authenticated relay server). |
|
SSL
|
connection-oriented standard designed to allow for secure cryptographic communication between two hosts via the Internet. TLS is the newest version of SSL.
|
|
S-HTTP
|
connectionless standard that provides for symmetric encryption, message digests, and client-server authentication.
|
|
screening router
|
he router acts as the sole gateway and gatekeeper between the un-trusted, outside network (i.e. the Internet) and the trusted network (i.e. LAN).
|
|
Active v. Passive IDS
|
: An active IDS will attempt to thwart any kind of detected attacks without user intervention. A passive IDS simply monitors for malicious activity
|
|
Network v. Host IDS:
|
A network-based IDS is one that operates as its own node on a network, while host-based IDS systems require agents to be installed on every protected host.*
|