Security

    Master this deck with 20 terms through effective study methods.

    Generated from uploaded pdf

    Created by @lortarcze

    What is the primary function of Access Control Lists (ACLs) in network security?

    ACLs are used to permit or deny traffic based on defined criteria, filtering packets according to Layer 3 (L3) and Layer 4 (L4) header information, and sometimes Layer 2 (L2) header fields.

    How are ACL entries processed when inspecting packets?

    ACL entries are processed sequentially from top to bottom until a match is found. If a matching entry is found, the specified action (permit or deny) is applied, and subsequent entries are ignored. If no match is found, the packet is implicitly denied.

    What steps should a network administrator take to implement packet filtering using ACLs?

    The administrator should analyze the applications supported by the network, identify the protocols and ports used, decide on the interface for applying the ACL, and define the entries for the ACL, ensuring to permit returning traffic.

    What are the implications of not including a return traffic rule in an ACL?

    If return traffic is not permitted in an ACL, legitimate responses to outgoing requests may be blocked, disrupting communication and application functionality.

    What is the role of a Certification Authority (CA) in asymmetric cryptography?

    A CA is a trusted entity that digitally signs public keys along with owner information, creating certificates that authenticate the identity of the key owner and facilitate secure communications.

    Why is it important to protect public keys during transport?

    Protecting public keys against modification during transport ensures the integrity and authenticity of the keys, preventing man-in-the-middle attacks and ensuring secure communications.

    What are the advantages of using asymmetric cryptosystems?

    Asymmetric cryptosystems eliminate the problem of secret key distribution, allow for digital signatures, and can dynamically generate keys with limited lifetimes for enhanced security.

    How does authentication work in symmetric cryptosystems?

    In symmetric cryptosystems, the sender encrypts the username using a shared key, and the receiver decrypts it with the same key to verify the username's validity, often requiring a database of valid usernames.

    What is a potential alternative to maintaining a username database in symmetric authentication?

    An alternative is to append a hash of the username to the username itself, encrypting the entire block with the shared key. The receiver can then verify the username without needing a database.

    What is the process for ensuring data integrity in message transmission?

    Data integrity is ensured by appending a shared secret key to the message, creating a hash, and sending both the message and hash. The receiver recalculates the hash and compares it to the received hash to verify integrity.

    What are some common symmetric encryption algorithms?

    Common symmetric encryption algorithms include AES, ChaCha20-Poly1305, Blowfish, SEED, Camellia, and Triple-DES.

    What challenges are associated with secret key distribution in symmetric cryptography?

    The main challenge is securely distributing the secret keys to all parties involved without interception or unauthorized access, which can compromise the entire encryption system.

    What is the significance of analyzing applications before implementing ACLs?

    Analyzing applications helps determine the necessary protocols and ports, ensuring that the ACLs are configured to allow legitimate traffic while blocking unauthorized access.

    How does packet filtering contribute to network security?

    Packet filtering enhances network security by controlling the flow of traffic based on predefined rules, preventing unauthorized access and potential attacks on the network.

    What is the difference between incoming and outgoing ACLs?

    Incoming ACLs filter traffic entering an interface, while outgoing ACLs filter traffic leaving an interface. It is common to use different ACLs for each direction to optimize security.

    Why is it important to avoid routing packets that will be discarded?

    Avoiding the routing of packets that will be discarded improves network efficiency and reduces unnecessary load on network devices, enhancing overall performance.

    What is the process for obtaining a signed certificate from a Certification Authority?

    The process typically involves a personal interaction to obtain a private-public key pair, followed by submitting a certificate request to the CA, which then verifies the identity and issues a signed certificate.

    What are the potential risks of not using a trusted Certification Authority?

    Not using a trusted CA can lead to the acceptance of fraudulent certificates, exposing users to man-in-the-middle attacks and compromising the security of communications.

    How can dynamic ports affect the implementation of ACLs?

    Dynamic ports can complicate ACL implementation as they may change frequently, requiring careful planning to ensure that the ACLs accommodate these variations without disrupting legitimate traffic.

    What is the importance of the first contact with a Certification Authority?

    The first contact with a CA is crucial as it establishes trust and ensures secure handling of the private-public key pair, which is essential for maintaining the integrity of the cryptographic system.