Term
| name some three predecessor technologies to web services |
|
Definition
| CGI, RMI (remote machine), remote procedure calls, Dcomm(microsoft distributed) |
|
|
Term
|
Definition
| internet api, executed on a remote machine |
|
|
Term
| what language is a webservice request and response messages made in |
|
Definition
| xml, extensible markup language |
|
|
Term
| what is W3C and what does it have todo with web service? |
|
Definition
| world wide web consortium and come up with standards, def of webs services |
|
|
Term
| name 3 predecessor technologies to the web |
|
Definition
cgi (but not really) java rmi remote procedure calls soap dcomm |
|
|
Term
| how do u request a web service in VB? |
|
Definition
| write a method in access a service |
|
|
Term
| know how to generate using a public and private keys |
|
Definition
find 2 prime numbers, p=3, q=7 n = p*q find phi(N) =3-1 * 7-1 = 2*6 = 12 fine e&d so that e*d = 1 mod phi(N), e *d = 1 mod 12\ (e*d_/13, 25, e = 5, d = 5 encrypt: 2^5 mod 21 = 32 mod 21 = 11 decrypt 11^ 5 mod 21 = 2 *a^phi(n) = 1 mod N -> oliers theorem, a and N must be relatively prime *message should be smaller and p & q *multiplecharactersAB, (26^2) + 2 |
|
|
Term
| know how to encrypt using public and private keys |
|
Definition
*2 <-- 2^5 mod 21 32 mod 21 = 11 11^5 mod 21 = 2 |
|
|
Term
|
Definition
| a number used to mix into the data to encrypt or decrypt the data |
|
|
Term
| what kind of key should be used for maximum security |
|
Definition
| the same length as the message your are encoding, should only be used once |
|
|
Term
| what is the difference between symmetric and asymmetric keys? |
|
Definition
symmetric is encrypted/decrypted with the same key asymmetric is encrypted/decrypted with other different keys |
|
|
Term
| how are keys exchanged using diffie-hellman key exchange? |
|
Definition
M,N M^a mod N, M^b mod N, *m^b mod N(^a is the symmetric key M(large number(*user1) sends M,N to another user(user2) *user1)generates A, generated M^a mod n send to user 2 (user2) recieves M^b mod N and raise it to the power of a , generates M^ab mod N (key) (user1) revieves M^b mod N takes M^b mod N and raises ittothe powerof b generate M^ab mod N (key) your key is M^ab mod N |
|
|
Term
| how do digital signatures work? |
|
Definition
sign a some sort of data using a "website" public key and then verifying that information with their private key *take the message *problems: message could get corrupted in transition and not match |
|
|
Term
| how can public key encryption be used to ensure data integrity? |
|
Definition
| it does it with a signature |
|
|
Term
| how can public key encryption be used to ensure a non-repudiation? |
|
Definition
| the public keys must be truly public. they must have been passed around prior |
|
|
Term
| what is the difference between a block cipher and a stream cipher? |
|
Definition
one process steam small groups of data and one process large groups of data |
|
|
Term
| give an example of a block cipher and a stream cipher |
|
Definition
| stream cipher is used for real time encryption/decryption and a block cipher blow fish wofish is a keyed, symmetric block ciper, designed in 1993 by Bruce Schneier and included in a large number of cipher suites and encryption produces. Blowfish proves a good encryption rate in software and no effective cryptanalysis of it has been found to date. However. the Advanced Encryption Standard now receives more attention |
|
|
Term
| what is a one-way hash function and give an example of one |
|
Definition
| there is no inverse to the function. ex. SHA, MD5, NTLM, LM cannot send hash messages to receive original data/text/message |
|
|
Term
|
Definition
| a certificate is a mechanism used to verify an identity on a computer and/or over a computer network. You might call it a "digital identity |
|
|
Term
| what is a certificate authority? |
|
Definition
| certificate authority or certification authority (CA) is an entity,which is core to many PKI (public key infrastructure) schemes, whose purpose is to issue digital certificates to use by other parties, it exemplifies a trusted third party. some certification authority may charge a fee for their service while some other CAs are free. it is also not uncommon for government and institutions to have their own CAs |
|
|
Term
| what are certificates used for? |
|
Definition
| to authenticate a users on a network |
|
|
Term
| what is a "chain of trust" wrt certificates? |
|
Definition
| in a computer security, a chain of trust is established by validating each component of hardware and software from the bottom-up. it is intended to ensure that only trusted software and hardware can be used while still remaining flexible |
|
|
Term
| where are certificates stored |
|
Definition
|
|
Term
| what is a "root certificate authority" |
|
Definition
| one who issues a certificate |
|
|
Term
|
Definition
| a room certificate authority |
|
|
Term
| why is a hash function needed for a certificate? |
|
Definition
certificate - > hashed certificate signature -> decrypt with pk of signer -> stuff compared with above certificates are hashed and compared to a decrypted signature |
|
|
Term
| what security mechanism does https use? |
|
Definition
TLS - transport layer security - it negotiates the protocol its going to use for key transfer the public key is the problem in https |
|
|
Term
| how does https exchange symmetric keys? |
|
Definition
|
|
Term
| what do u need to do with a web server to provide an https connection? |
|
Definition
|
|
Term
| what do u need to do with a web server to provide an https connection? |
|
Definition
|
|
Term
| when sniffing an https connection, why do you not see sometimes a public key exchange between the client and the server? |
|
Definition
| uses a different type of key exchange |
|
|
Term
|
Definition
| a standard for public private key |
|
|
Term
| what is Active Directory? |
|
Definition
| manage information on a network |
|
|
Term
| what is a site, a domain, and an organizational unit |
|
Definition
site - a local area network (LAN) domain - a group of computers on a network organizational unit - a subset of a domaino |
|
|
Term
| what is a group policy object? |
|
Definition
| a set of rules that apply to site, domain, and organizational unit |
|
|
Term
| what can a group policy object be associated with? |
|
Definition
| site, domain, organizational unit |
|
|
Term
| what is the order in which group policy objects are enforced? |
|
Definition
| local, site, domain, organizational unit |
|
|
Term
| what is a trust relationship within active directory? |
|
Definition
| trusted communication pass between different computers |
|
|
Term
| what is a forest ( with respect to active directory) |
|
Definition
|
|
Term
| when would you want to use a forest |
|
Definition
| when you have multiple domains |
|
|
Term
| why would you want more than one domain server for a domain? |
|
Definition
|
|
Term
| when you set up a domain server, what are your choices? |
|
Definition
using a hub server as the administration server for both the public address book and your other databases. using a dedicated registration server as the administration server for the public address book and one or more separate hub servers as an administration servers for your other databases using a multi-function server as the administration server for the public address book, and distributing administration responsibilities for the other databases. |
|
|
Term
|
Definition
| lightweight directory access protocol |
|
|
Term
| what services does LDAP provide? |
|
Definition
| authentication, controls permissions to network file shares |
|
|
Term
| what is a distinguished name and how is it used in LDAP? |
|
Definition
| it is a unique identifier |
|
|
Term
| what are the difference(s) between LDAP and active directory? |
|
Definition
| LDAP is small and lightweight, AD can control everything |
|
|
Term
| what do LDAP and Active directory have in common? |
|
Definition
|
|