The program we use to create and edit files through the CLI
What is VI/Vim?
This type of encryption uses one key between two users to encrypt and decrypt
What is symmetric encryption?
This idea states that even if the algorithm is known, the key should stay secure.
What is Kerchoff's Principle?
This software is used to scan a list of open ports on a network.
What is nmap?
The principle which instructs systems to only allow users to perform what is most necessary to operation.
What is the principle of least privilege?
What is the pipe? (|).
This one-way encryption process is used for creating signatures or 'storing' passwords.
What is hashing?
What is a Root Certificate Authority?
This response is sent by the server when a client tries to initiate a TCP connection.
What is SYN ACK?
This prevents attacks that look for data in specific memory locations.
What is Address Space Layout Randomization?
This command lets users delete files SECURELY
What is shred/srm?
This scheme is used to encode plaintext before encryption
What is base64?
The process we talked about in class to perform asymmetric encryption during a TLS handshake.
What is Diffie-Hellman?
This type of attack prevents users from accessing some network service by spoofing internet users and flooding a service with requests.
(I need the full name, not just the acronym!)
What is a Distributed Denial of Service attack?
This prevents non-text regions of processes from being executed.
What is Data Execution Prevention?
This command and number sequence would make a given file readable to all, writeable to only user, and executable to group.
What is chmod 654?
This encryption process adds a string of random characters to a hashed password before encryption, and is stored separately from the password file.
What is a pepper?
This is a list of invalid certificates which should not be trusted and is managed by Certificate Authorities.
What is the Certificate Revocation List?
What is port 443?
These two actions are crucial in highlighting security issues across OS processes.
What is Logging and Auditing?
This command will show the end contents of a file.
What is 'tail'?
What is Elliptic Curve Cryptography?
These three pieces of information are passed during a TLS handshake from a client upon starting communication.
What are the supported ciphersuites, the TLS version used by the client, and the 'client random'?
This process of defense analyzes what content is being sent through ports.
This file saves the user's passwords
What is /etc/shadow?