Java Games: Flashcards, matching, concentration, and word search.

Week Eleven

AB
PKIPublic Key Infrastructure
PKI Based onpublic/private key sryptosystems, digital signatures, digital certificates and certificate authorities (CAs)
Digital Signaturesgenerated by asymetric algorithms whicfh can be used to time stamp documents
Digital Certificates and Certificate Authoritiesused to certify that a public key belongs to a particular person..or thrusting a thrid party key?
Hybrid Crytography SystemsDiffie-Hellman Key Exchange method
Diffie-Hellman Key Exchangemethod to allow a secure method of agreeing on a private key without the expense of sending the key through another method
Protocols for Secure CommunicationsSSL (Secure Socket Layer) protocol, (S-HTTP) Secure Hyper Text Transfer Protocol, Securing E-Mail, Securing TCP/IP with IPSec, Scuring TCP/IP with PGP
6 Types of Attacks on CryptosystemsCipher Attacks, Known Plain Text Attack, Man in the Middle Attack, Correlation Attack, Dictionary Attack, Timing Attack
Cipher Attacksthey search for enough information when any code can be broken
Known-Plaintext Attackobtain a copy of both plain text and ciphertex versions and they use them to reverse engineer the encryption algorithm
Man in the Middle Attackinserts attacking system between comminicating systems and pretend to be the send and receiver
Correlation Attackadvanced statistical analysis combined with brute force methods to deertermine the unkown key
Dictionary Attackencrypts a large amount of plaintext and compares it to the4 siphertext that was created with the same encryption algorithm
Timing Attackanother statistical analysis attack type that also incorporates typing patterns
Key in defending from AttacksManagement of People
Simplified Threat CategoriesUnintentional and Intentional
Unintentional Threat CategoryAct of Human Error, Forces of Nature, Deviation in QoS, Tech Hardware failures, Tech Software failures, Tech obsolescence
Intentional Threat CategoryCompromises to Intellectual Poperty, Deliberate acts of: espionage or trespass.....information extortion....sabotage or vandelism.....theft.....deliberate software attacks....deviations in QoS
Physical Security - Defintionan important as logical security and requires a layered, policy driven approach
Three Layers of Physical SecurityGeneral Management, IT Management and Professionals, and Information Security Management and Professionals
Secure Facility - defintiona physical location engineered with controls designed to minimize risk of attacks from physical threats
Most serious threat to safety of people who work in an oganization isFire
2 Categories of Fire DetectionManual (human) ande Automatic
3 Basic Types of Fire Detection SystemsThermal, Smoke, and Flame
Types of Portable Fire SuppressionClass A, Class B, Class C, Class D
Class A Fire ExtinguisherOrdinary Combustibles
Class B Fire ExtinguisherFlammable Liquids
Class C Fire ExtinguisherElectrical Equipment
Class D Fire ExtinguisherCombustible Metals
Todays ExtinguishersCan be used with more than one type of fire


Mr. Gilroy

This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities