Wednesday, October 2, 2019
security terminology :: essays research papers
 Security  à  Ã  Ã  Ã  Ã  Ã  Ã  Ã  Ã  Ã  Ã  Ã  Ã  Ã  Ã  Ã  Ã  Ã  Ã  Ã  Ã  Ã  Ã  Ã  Ã  Ã  Ã  Ã  Ã  Ã  Terminology    Define the following terms:    1.à  Ã  Ã  Ã  Ã  Authentication ââ¬â ability to identify who it is  a.à  Ã  Ã  Ã  Ã   ACL ââ¬â (access control list) is associated w/ a given resource. Describes groups, users, machines and their permissions associated with that particular resource.  i.à  Ã  Ã  Ã  Ã  Token- one time only password key  b.à  Ã  Ã  Ã  Ã  CA- certificate of authority- creates certificates -system or entity trusted to generate and distribute digital certificates. Can be privately used or from a 3rd party e-commerce site. Verifies identity of user. Authentication method.  c.à  Ã  Ã  Ã  Ã  RA- Registration Authority-issues certificates-RA verifies credentials supplied by an agent and then sends the CA an okay to issue a certificate.  d.à  Ã  Ã  Ã  Ã  Ã  Ã  Ã  Ã  Ã  PKI- Public Key Infrastructure- Policies and behaviors that surround the deployment and management of key pairs. How you issue two keys at one time.  e.à  Ã  Ã  Ã  Ã  Ã  Ã  Ã  Ã  Ã   Kerberos- Authentication method used by Microsoft. Uses 3 different protocols, listed below  à  Ã  Ã  Ã  Ã  i.à  Ã  Ã  Ã  Ã  TGT- Ticket granting ticket. Allows you to request resources on the network from servers.  à  Ã  Ã  Ã  Ã  ii.à  Ã  Ã  Ã  Ã  TGS- Ticket granting server. Accesses a particular network server for tickets.  à  Ã  Ã  Ã  Ã  iii. AS- Authentication Server. Equivalent to a morning check-in at security desk of a hotel. Checks the identity of a server.  f.à  Ã  Ã  Ã  Ã  CHAP- Challenge handshake authentication protocol. Was designed to replace the PAP. Communication between server and client proving identity.  i.à  Ã  Ã  Ã  Ã  MS-CHAP- Microsoft CHAP  g.à  Ã  Ã  Ã  Ã  PAP- Password authentication protocol  h.à  Ã  Ã  Ã  Ã  X.509- digital certificate that uniquely identifies a party. Standard structure of a certificate.  i.à  Ã  Ã  Ã  Ã  KDC- Key distribution center  j.à  Ã  Ã  Ã  Ã  Biometrics- Authentications based on human anatomy.  k.à  Ã  Ã  Ã  Ã  Multifactor- Authentication based on 2 valid authentication methods.  l.à  Ã  Ã  Ã  Ã  Mutual Authentication- Client establishes identity to server. Server provides authentication information to client to ensure that illicit servers cannot masquerade as genuine servers. Both parties have to authenticate.  2.à  Ã  Ã  Ã  Ã  Encryption- hiding data using algorithms. protection, method of code, algorithms, formulas   a.à  Ã  Ã  Ã  Ã  Asymmetric keys- pair of key values one public and one private.  b.à  Ã  Ã  Ã  Ã  Symmetric keys- single encryption key generated.    c.à  Ã  Ã  Ã  Ã  DES- Data Encryption standard developed by government.    d.à  Ã  Ã  Ã  Ã  Diffie-hellman- encryption algorithm named after its two creators.    e.à  Ã  Ã  Ã  Ã  IPSec- used for encryption of TCP/IP traffic. Method of encrypting any IP transmissions.    f.à  Ã  Ã  Ã  Ã  PGP- Pretty good privacy- mainly used in email less secure than the PKI.    g.à  Ã  Ã  Ã  Ã  RSA- Rivest-Shamir-Adleman- encryption algorithm named after its 3 creators. Using two pair keys.    h.à  Ã  Ã  Ã  Ã  SSL- Secure Socket Loader- used mainly on web servers to transmit securely via HTTPS://    3.à  Ã  Ã  Ã  Ã  Network protocols and organization  a.à  Ã  Ã  Ã  Ã  DMZ- Demilitarized zone- Zone used for public access. Used with FTP, web servers and DNS servers.   b.à  Ã  Ã  Ã  Ã  IDS- Intrusion Detection System- 2 types: Active and Passive  c.à  Ã  Ã  Ã  Ã  NAT- Network Address Translation- Appends to your logical port. Protects internal hosts. Used with proxy servers. Translates internal IP to Real IP. Uses unique port table. There is 65,000 ports  d.à  Ã  Ã  Ã  Ã  Tunneling- ability to go to 1 point to another as though you are a single proprietary line.  					    
Subscribe to:
Post Comments (Atom)
 
 
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.