Shared Flashcard Set

Details

Computer Security
finals, flash cards
47
Computer Science
Undergraduate 4
05/07/2009

Additional Computer Science Flashcards

 


 

Cards

Term
name some three predecessor technologies to web services
Definition
CGI, RMI (remote machine), remote procedure calls, Dcomm(microsoft distributed)
Term
what is a web service?
Definition
internet api, executed on a remote machine
Term
what language is a webservice request and response messages made in
Definition
xml, extensible markup language
Term
what is W3C and what does it have todo with web service?
Definition
world wide web consortium and come up with standards, def of webs services
Term
name 3 predecessor technologies to the web
Definition
cgi (but not really)
java rmi
remote procedure calls
soap
dcomm
Term
how do u request a web service in VB?
Definition
write a method in access a service
Term
know how to generate using a public and private keys
Definition
find 2 prime numbers, p=3, q=7 n = p*q
find phi(N) =3-1 * 7-1 = 2*6 = 12
fine e&d so that e*d = 1 mod phi(N), e *d = 1 mod 12\
(e*d_/13, 25, e = 5, d = 5
encrypt: 2^5 mod 21 = 32 mod 21 = 11
decrypt 11^ 5 mod 21 = 2
*a^phi(n) = 1 mod N -> oliers theorem, a and N must be relatively prime
*message should be smaller and p & q
*multiplecharactersAB, (26^2) + 2
Term
know how to encrypt using public and private keys
Definition
*2 <--
2^5 mod 21
32 mod 21
= 11
11^5 mod 21 = 2
Term
what is a key
Definition
a number used to mix into the data to encrypt or decrypt the data
Term
what kind of key should be used for maximum security
Definition
the same length as the message your are encoding, should only be used once
Term
what is the difference between symmetric and asymmetric keys?
Definition
symmetric is encrypted/decrypted with the same key
asymmetric is encrypted/decrypted with other different keys
Term
how are keys exchanged using diffie-hellman key exchange?
Definition
M,N M^a mod N, M^b mod N, *m^b mod N(^a is the symmetric key
M(large number(*user1) sends M,N to another user(user2)
*user1)generates A, generated M^a mod n send to user 2
(user2) recieves M^b mod N and raise it to the power of a , generates M^ab mod N (key)
(user1) revieves M^b mod N takes M^b mod N and raises ittothe powerof b
generate M^ab mod N (key)
your key is M^ab mod N
Term
how do digital signatures work?
Definition
sign a some sort of data using a "website" public key and then verifying that information with their private key
*take the message
*problems: message could get corrupted in transition and not match
Term
how can public key encryption be used to ensure data integrity?
Definition
it does it with a signature
Term
how can public key encryption be used to ensure a non-repudiation?
Definition
the public keys must be truly public. they must have been passed around prior
Term
what is the difference between a block cipher and a stream cipher?
Definition
one process steam small groups of data and
one process large groups of data
Term
give an example of a block cipher and a stream cipher
Definition
stream cipher is used for real time encryption/decryption and a block cipher blow fish wofish is a keyed, symmetric block ciper, designed in 1993 by Bruce Schneier and included in a large number of cipher suites and encryption produces. Blowfish proves a good encryption rate in software and no effective cryptanalysis of it has been found to date. However. the Advanced Encryption Standard now receives more attention
Term
what is a one-way hash function and give an example of one
Definition
there is no inverse to the function. ex. SHA, MD5, NTLM, LM cannot send hash messages to receive original data/text/message
Term
what is a certificate?
Definition
a certificate is a mechanism used to verify an identity on a computer and/or over a computer network. You might call it a "digital identity
Term
what is a certificate authority?
Definition
certificate authority or certification authority (CA) is an entity,which is core to many PKI (public key infrastructure) schemes, whose purpose is to issue digital certificates to use by other parties, it exemplifies a trusted third party. some certification authority may charge a fee for their service while some other CAs are free. it is also not uncommon for government and institutions to have their own CAs
Term
what are certificates used for?
Definition
to authenticate a users on a network
Term
what is a "chain of trust" wrt certificates?
Definition
in a computer security, a chain of trust is established by validating each component of hardware and software from the bottom-up. it is intended to ensure that only trusted software and hardware can be used while still remaining flexible
Term
where are certificates stored
Definition
Hkey local machine
Term
what is a "root certificate authority"
Definition
one who issues a certificate
Term
who signs a certificate
Definition
a room certificate authority
Term
why is a hash function needed for a certificate?
Definition
certificate - > hashed certificate
signature -> decrypt with pk of signer -> stuff compared with above
certificates are hashed and compared to a decrypted signature
Term
what security mechanism does https use?
Definition
TLS - transport layer security - it negotiates the protocol its going to use for key transfer
the public key is the problem in https
Term
how does https exchange symmetric keys?
Definition
diffe-hillman
Term
what do u need to do with a web server to provide an https connection?
Definition
enter a certificate
Term
what do u need to do with a web server to provide an https connection?
Definition
enter a certificate
Term
when sniffing an https connection, why do you not see sometimes a public key exchange between the client and the server?
Definition
uses a different type of key exchange
Term
what is X.509?
Definition
a standard for public private key
Term
what is Active Directory?
Definition
manage information on a network
Term
what is a site, a domain, and an organizational unit
Definition
site - a local area network (LAN)
domain - a group of computers on a network
organizational unit - a subset of a domaino
Term
what is a group policy object?
Definition
a set of rules that apply to site, domain, and organizational unit
Term
what can a group policy object be associated with?
Definition
site, domain, organizational unit
Term
what is the order in which group policy objects are enforced?
Definition
local, site, domain, organizational unit
Term
what is a trust relationship within active directory?
Definition
trusted communication pass between different computers
Term
what is a forest ( with respect to active directory)
Definition
multiple trees
Term
when would you want to use a forest
Definition
when you have multiple domains
Term
why would you want more than one domain server for a domain?
Definition
backup or load balancing
Term
when you set up a domain server, what are your choices?
Definition
using a hub server as the administration server for both the public address book and your other databases.
using a dedicated registration server as the administration server for the public address book and one or more separate hub servers as an administration servers for your other databases
using a multi-function server as the administration server for the public address book, and distributing administration responsibilities for the other databases.
Term
what is LDAP?
Definition
lightweight directory access protocol
Term
what services does LDAP provide?
Definition
authentication, controls permissions to network file shares
Term
what is a distinguished name and how is it used in LDAP?
Definition
it is a unique identifier
Term
what are the difference(s) between LDAP and active directory?
Definition
LDAP is small and lightweight, AD can control everything
Term
what do LDAP and Active directory have in common?
Definition
both do authentication
Supporting users have an ad free experience!