Computer Networks 8

 0    19 schede    tkrucz
Scarica mp3 Stampa Gioca Testa il tuo livello
 
Domanda English Risposta English
Trust
inizia ad imparare
assumption made about how external actors and internal components will behave
Threat
inizia ad imparare
potential failure scenario that a system is designed to prevent or mitigate
Cryptographic (encryption) algorithm
inizia ad imparare
set of steps that can be used to convert plain text into cipher text, consists of ciphers and cryptographic hashes
cipher
inizia ad imparare
used for encryption and decryption
cryptographic hash function
inizia ad imparare
used for integrity and authentication
Block Cipher
inizia ad imparare
as an input takes plaintext block, encrypt it and return ciphertext (which can be decrypted only by using decryption key)
Secret-Key (Symmetric) Ciphers
inizia ad imparare
message is encrypted using a particular key, the same key is required for decrypting the message, fast and efficient
Public-Key (Asymethric) Ciphers
inizia ad imparare
uses a pair of related keys, one for encryption and a different one for decryption, slower than symmetric approach
Authenticators
inizia ad imparare
value included in transmitted message, used to verify authenticity, data integrity of a message and prevent message tampering
Session key
inizia ad imparare
used to secure a session (single episode of communication), each session uses a new session key, typically symmetric keys
Publick Key Infastructure (PKI)
inizia ad imparare
framework for certifying bindings between public keys and identities, defines what key belongs to whom
Firewall
inizia ad imparare
system that typically sits at some point of connectivity between a site it protects and the rest of the network. By default it blocks traffic unless that traffic is specifically allowed to pass through
Techniques for authentication
inizia ad imparare
Authenticator + Timestamp, Authenticator + Nonce
Pretty Good Privacy (PGP)
inizia ad imparare
approach providing security for email. It provides authentication, confidentiality, data integrity, and nonrepudiation
Secure Shell (SSH)
inizia ad imparare
protocol used to provide a remote login service, remotely execute commands and transfer files. Is most often used to provide strong client/server authentication/message integrity and confidentiality
Transport Layer Security (TLS)
inizia ad imparare
standard of Secure Socket Layer (SSL) used to ensure confidentiality, integrity, and authentication in Web transactions
IP Security (IPsec)
inizia ad imparare
framework provides three degrees of freedom: highly modular, many security properties, works for different streams
Highly Modular
inizia ad imparare
allow users to select from a variety of cryptographic algorithms and specialized security protocols
Security Properties
inizia ad imparare
e. g: access control, integrity, authentication, originality and confidentiality

Devi essere accedere per pubblicare un commento.