Computer Networks 8

 0    19 tarjetas    tkrucz
descargar mp3 imprimir jugar test de práctica
 
término English definición English
Trust
empezar lección
assumption made about how external actors and internal components will behave
Threat
empezar lección
potential failure scenario that a system is designed to prevent or mitigate
Cryptographic (encryption) algorithm
empezar lección
set of steps that can be used to convert plain text into cipher text, consists of ciphers and cryptographic hashes
cipher
empezar lección
used for encryption and decryption
cryptographic hash function
empezar lección
used for integrity and authentication
Block Cipher
empezar lección
as an input takes plaintext block, encrypt it and return ciphertext (which can be decrypted only by using decryption key)
Secret-Key (Symmetric) Ciphers
empezar lección
message is encrypted using a particular key, the same key is required for decrypting the message, fast and efficient
Public-Key (Asymethric) Ciphers
empezar lección
uses a pair of related keys, one for encryption and a different one for decryption, slower than symmetric approach
Authenticators
empezar lección
value included in transmitted message, used to verify authenticity, data integrity of a message and prevent message tampering
Session key
empezar lección
used to secure a session (single episode of communication), each session uses a new session key, typically symmetric keys
Publick Key Infastructure (PKI)
empezar lección
framework for certifying bindings between public keys and identities, defines what key belongs to whom
Firewall
empezar lección
system that typically sits at some point of connectivity between a site it protects and the rest of the network. By default it blocks traffic unless that traffic is specifically allowed to pass through
Techniques for authentication
empezar lección
Authenticator + Timestamp, Authenticator + Nonce
Pretty Good Privacy (PGP)
empezar lección
approach providing security for email. It provides authentication, confidentiality, data integrity, and nonrepudiation
Secure Shell (SSH)
empezar lección
protocol used to provide a remote login service, remotely execute commands and transfer files. Is most often used to provide strong client/server authentication/message integrity and confidentiality
Transport Layer Security (TLS)
empezar lección
standard of Secure Socket Layer (SSL) used to ensure confidentiality, integrity, and authentication in Web transactions
IP Security (IPsec)
empezar lección
framework provides three degrees of freedom: highly modular, many security properties, works for different streams
Highly Modular
empezar lección
allow users to select from a variety of cryptographic algorithms and specialized security protocols
Security Properties
empezar lección
e. g: access control, integrity, authentication, originality and confidentiality

Debes iniciar sesión para poder comentar.