Home
Subjects
Textbook solutions
Create
Study sets, textbooks, questions
Log in
Sign up
Upgrade to remove ads
Only $35.99/year
Science
Computer Science
Computer Security and Reliability
Cyber Systems Operations Block 4 Unit 4b and 4c Cyber Operations AUTHENTICATION AND ENCRYPTION METHODS
STUDY
Flashcards
Learn
Write
Spell
Test
PLAY
Match
Gravity
Terms in this set (23)
This uses a combination of symmetric and asymmetric algorithms to generate keys necessary to ensure authentication and protection of encrypted messages. Both schemes use a mathematical equation referred to as an algorithm.
PKI
The DoD successfully deployed a major program providing secure access to its communications and computer networks in late 1990 replacing the User ID/Password authentication method. This program is overseen by the National Security Agency and the Defense Information Systems Agency.
DoD PKI Program
DoD PKI program provides most of its members with three types of credentials. Identity Credential or certificate for each employee CAC, E-mail encryption, and digital signature certificate.
PKI Credentials
Public key cryptography makes use of two key. Private Key is used to decrypt and to encrypt messages between the communicating machines. The Public Key is used for both encryption and verification of signature.
PKI Keys
Serves as the root of trust to authenticate the identity of individuals, computers and other entities in the network. Publishes PKI digital certificates immediately after they are issued.
Certification Authority (CA)
Is certified by a root CA to issue certificates for uses permitted by the CA.
Registration Authority (RA)
Saves certificate requests issued and revoked certificates from the RA or CA.
Certificate Database
Saves issued certificates and pending or rejected certificate requests from the local computer.
Certificate Store
Saves encrypted private keys in a certificate database for disaster recovery purposes in case the Certificate Database is lost.
Key Archival Server
Revoking a certificate invalidates a certificate before its expiration date. Used to notify the community a digital certificate is no longer valid and has been revoked.
Certification Revocation List (CRL)
This is a general term for computer software providing services to software applications beyond those available from the operating system.
Server Middleware
Application serving as the interface between the host's applications and CAC
CAC Middleware
Defined as non-cryptographic data stored on the CAC. ie Name, Rank, DoD ID/EDIPI, Date Issued/Expiration, Military Affiliation.
CAC Data
Set of functions necessary to manage the card and the middleware environment, such as PIN changes and PIN timeout.
CAC Management
Replaced Uniformed Services Privilege and ID card. Special smart card issued by DoD and contains data about member.
DOD Smart Card
This scheme allows the key to accomplish both encryption and decryption.
Symmetric Encryption
This consist of a public key, which is freely available, and a private key, which is kept secret.
Asymmetric Encryption
Most organizations have a substantial online Internet presence. For these institutions and retailers, the Internet provides a cost effective means of presenting their services and products to customers 24 hours a day - 7 days a week.
Sessions
This is a key component of interacting and communicating across a network
Session Management
Most common method of tracking a customer accessing an organization's web site is by assigning this. It follows a user throughout the website.
Session ID
Once a client is successfully authenticated, the Session ID is used as a stored authentication voucher so customers do not have to continuously login.
Maintaining State
This protocol provides a secure encryption communication method for TCP connections, especially for HTTP.
SSL
SSL protocol uses public key cryptography in the handshake phase to securely exchange session keys. When the user moves to another web site, the encrypted session is closed.
Digital handshake
Recommended textbook explanations
Computer Organization and Design MIPS Edition: The Hardware/Software Interface
5th Edition
David A. Patterson, John L. Hennessy
220 explanations
Introduction to Algorithms
3rd Edition
Charles E. Leiserson, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen
709 explanations
Starting Out with Python
2nd Edition
Tony Gaddis
601 explanations
MyProgrammingLab with Pearson eText -- Instant Access -- for Starting Out with Java
5th Edition
Tony Gaddis
1,102 explanations
Sets found in the same folder
Cyber Systems Operations Block 4 Unit 1a Cyber Ope…
37 terms
Cyber Systems Operations Block 4 Unit 2a and 2b Cy…
35 terms
Cyber Systems Operations Block 4 Unit 3a Cyber Ope…
40 terms
Cyber Systems Operations Block 4 Unit 3b Cyber Ope…
20 terms
Other sets by this creator
Cyber Systems Operations Block 4 Unit 6 (ALL) Cybe…
44 terms
Cyber Systems Operations Block 4 Unit 5e Cyber Ope…
16 terms
Cyber Systems Operations Block 4 Unit 5c Cyber Ope…
11 terms
Cyber Systems Operations Block 4 Unit 5b Cyber Ope…
10 terms
Other Quizlet sets
125.241
58 terms
BAC
50 terms
Civil Rights Quizlet
42 terms
CISI Level 3 Introduction to Investment - Taxation…
30 terms