This class was created by Brainscape user Kaushik Purahoo. Visit their profile to learn more about the creator.

Decks in this class (22)

Chapter 1
Example two computers on a desk c...,
Assume we cannot protect the phys...,
Do not trust the network 3
16  cards
Chapter 02
What is tcp 1,
What is a tcp syn flood attack 2,
What are tcp syn cookies 3
18  cards
Chapter 2-- SelfMade
Tcp header format how does it loo...,
How does the tcp 3 way handshake ...,
Can an attacker successfully comp...
11  cards
Chapter 3i
What is the definition of a netwo...,
Four main network middleboxes typ...,
The 3 security components 3
23  cards
Chapter 3ii
Ip spoofing sending packets using...,
Except filtering for special purp...,
Automatic spoofing protection 3
11  cards
Chapter 3iii
Why do we need ids ids intrusion ...,
Define intrusion intrusion detect...,
Optional extension in ids 3
15  cards
Chapter 4: Symmetric Encryption
Symmetric encryption uses a share...,
Terminology plaintext m the messa...,
Why is len c len m what security ...
16  cards
Chapter 4ii: Modes of Encryption
Electronic code book mode ecb 1,
Media 2,
Cipher block chaining mode cbc in...
6  cards
Chapter 5: Hash Functions
Common practice in data communica...,
Underlying idea of these codes 2,
Essential security goal data inte...
11  cards
Chapter 5ii: Message Authentication Codes
Cryptographic hashes alone do not...,
Macs do do cannot can be replayed...,
Do macs prove authenticity 3
12  cards
Chapter 6: Randomness
Why and where do we need random n...,
Randomness can be described by un...,
Entropy of a 128 bit vector 3
10  cards
Chapter 7: Public Key Cryptography
Why would we need public key cryp...,
Asymmetric crypto reduces the num...,
Different keys used for en decryp...
13  cards
Chapter 7: Diffie-Hellman Key Exchange
What is this 1,
What is this 2,
What are the next step remarks 3
5  cards
Chapter 7iii: RSA, DH and Beyond
Rsa dh and beyond public key cryp...,
Sum up the main differences 2,
Why should we care about a proble...
6  cards
Chapter 7iv: Threshold Signature Schemes
Identified challenges with classi...,
Variety of interesting use cases ...,
Three main steps explain 3
7  cards
Chapter 8i: Secure Channel
What does a secure channel provide 1,
How can we achieve confidentialit...,
Enck enc m mack int m 3
14  cards
Chapter 8ii: Secure Channel
In order to establish a secure ch...,
Definition one pass encryption an...,
Media 3
19  cards
EXERCISES
1 cookie k src 2 cookie h src 3 c...,
B authorization and authenticatio...,
C can you think about a scenario ...
3  cards
Chapter 9i: Public Key Infrastructures
Advantage of asymmetric crypto 1,
Imagine mitm eve has exchanged th...,
Manual trust establishment alice ...
11  cards
Chapter 9ii: Public Key Infrastructure
X509 is a itu standard that 1,
X509 and ssl tls ssl tls include ...,
Fill in the blanks 3
12  cards
Chapter 9iii: Certificate Issuance
Explain 3 ways in which a certifi...,
Standard approach of domain valid...,
Kurt seifried vs rapidssl 3
10  cards
Chapter 9iv: Certificate Revocation
Revocation is crucial yet often n...,
A crl is a list of certificates t...,
Explain for these reasons browser...
13  cards

More about
NetSec

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Kaushik Purahoo's NetSec flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Make Flashcards