-
Essay / security terminology - 764
SecurityTerminologyDefine the following terms:1. Authentication – ability to identify who it is. ACL – (access control list) is associated with a given resource. Describes the groups, users, machines, and their permissions associated with this particular resource. Token: one-time passwordb. CA - certificate authority - creates certificates - trusted system or entity to generate and distribute digital certificates. Can be used privately or from a third-party e-commerce site. Verifies user identity. Authentication method.c. RA- The registration authority issues certificates-RA verifies the credentials provided by an agent, then sends the certificate authority an agreement to issue a certificate.d. PKI- Public Key Infrastructure- Policies and behaviors that surround the deployment and management of key pairs. How to issue two keys at the same time. Kerberos- Authentication method used by Microsoft. Uses 3 different protocols, listed below. TGT- Ticket granting ticket. Allows you to request network resources from servers. ii. TGS- Ticket Granting Server. Accesses a particular network server for tickets. iii. AS- Authentication server. Equivalent to an early morning check-in at a hotel security desk. Verifies the identity of a server.f. CHAP- Challenge Handshake Authentication Protocol. Was designed to replace the PAP. Communication between the server and the client proving its identity.i. MS-CHAP-Microsoft CHAPg. PAP- Password Authentication Protocol. X.509- digital certificate that uniquely identifies a party. Standard structure of a certificate.i. KDC- Key Distribution Centerj. Biometrics - Authentications based on human anatomy.k. Multifactor- Authentication based on 2 valid authentication methods.l. Mutual authentication: the client establishes its identity on the server. The server provides authentication information to the client to ensure that rogue servers cannot impersonate real servers. Both parties must authenticate.2. Encryption- hiding data using algorithms. protection, code method, algorithms, formulas. Asymmetric keys - pair of key values, one public and one private.b. Symmetric keys – unique encryption key generated.c. DES- Data encryption standard developed by the government.d. Diffie-Hellman encryption algorithm - named after its two creators. IPSec- used for encryption of TCP/IP traffic. Method of encryption of any IP transmission.f. PGP- Fairly good privacy- mainly used in email less secure than PKI.g. RSA- Rivest-Shamir-Adleman- encryption algorithm named after its 3 creators. Using two pairs of keys.h. SSL- Secure Socket Loader- used primarily on web servers to transmit securely over HTTPS://3. Protocols and network organization. DMZ- Demilitarized Zone- Area used for public access. Used with FTP, web servers and DNS servers.b. IDS- Intrusion detection system- 2 types: Active and Passive. NAT - Network Address Translation - Adds to your logical port. Protects internal hosts. Used with proxy servers. Translates internal IP to real IP. Uses a single port table. There are 65,000 ports. Tunneling - ability to go from one point to another as if you were a single line owner.