You are on page 1of 1

Module 05: Chapter 08

Why do you use trace logging? What is symmetric encryption?


 Trace logging provides a detailed record of system and  In symmetric encryption a single key is used to encrypt
application events when activities such as a disk I/O and decrypt the message.
operation or a committed transaction occurs. What is asymmetric encryption?
What is instrumentation?  In asymmetric encryption, there are two related keys--a
 Instrumentation is a number of techniques that provide key pair.
support and diagnostic information from within an → A public key is made freely available to anyone
application itself. who might want to send you a message.
 These technologies include event logging, debug → A second, private key is kept secret, so that only
tracing, and performance counters. you know it.
Why do the developers use  Any message (text, binary files, or documents) that are
encrypted by using the public key can only be
instrumentation? decrypted by applying the same algorithm, but by using
 Instrumentation enables the developers to determine the matching private key.
the running state of a system after it’s been deployed.  Any message that is encrypted by using the private key
 What is debugging and tracing? can only be decrypted by using the matching public
 Debugging allows you monitor execution and finding key.
errors in development environment.
 Tracing allows you to monitor an application's execution
What is hashing (hash function)?
 A cryptographic hash function takes a block of data of
and performance in deployed environment.
arbitrary size and returns a fixed-size set of binary bits,
What is a BooleanSwitch? known as the hash value, which represents the block of
 A BooleanSwitch Provides a simple on/off switch that data; if you change the original block of data in any
controls debugging and tracing output way, the calculated hash value changes.
 You can use a Boolean trace switch to enable or  One of the main purposes of using hashing functions is to
disable messages based on their importance. determine whether data has changed, either by
 You use the Enabled property to get the current value accident or through a malicious act.
of the switch.
 A BooleanSwitch is configured in the application's
What is salting in hashing?
configure file.  Salting is a way to randomize hashes by adding a
 The config should formatted like below random string (which is called a salt) before a password
is hashed, which makes it much more difficult to crack.
<configuration>
<system.diagnostics> What is a digital signature?
<switches>  A digital signature proves that a message hasn’t been
<add name="mySwitch" value="1"/> modified and proves the identity of its author.
</switches>  A digital signature is created by calculating a hash of
</system.diagnostics> data, followed by encrypting the hash, with a private
</configuration> asymmetric encryption key.
 To disable the switch its value is set to 0.
Lesson 03 summery
What are performance counters?  Symmetric cryptography uses the same key to encrypt
 Performance counters provide data about how your and decrypt a message; its biggest benefit is
application uses resources. performance, but its biggest drawback is the key
 At run time, you use the Performance utility that’s part of exchange requirement.
Microsoft Windows to provide a graphical view of the  The RijndaelManaged class provides a symmetric
counters. algorithm, which is the Advanced Encryption Standard
Lesson 01 summery (AES).
 The CryptoStream class performs symmetric encryption
 When using LINQ to SQL classes, you can use the Log
and decryption.
property of the DataContext object to collect all the SQL
 Asymmetric cryptography uses a pair of keys known as
statements sent to the database server when the
application is running. public and private keys; its biggest benefit is that the
private key does not need to be transferred across the
 When working with the Entity Framework, you must use
Internet, so key disclosure risk is minimized. Its biggest
the ToTraceString method on the ObjectQuery object.
drawback is its lack of performance.
 To access the ToTraceString method, you must typically
 A hashing function determines whether data has been
convert your query to ObjectQuery.
modified.
 You can use the Trace framework that is part of the .NET
Framework to write data to the trace listeners, based on  A salt ensures that no two hashes of passwords are the
a trace switch setting. same.
 A digital signature proves the identity of its author and
 The Performance Monitor utility can be used while the
proves that a message hasn’t been modified.
application is running to watch the performance monitor
 Use the aspnet_regiis.exe utility to encrypt .config files
counters.
What is character encoding? What is Microsoft Sync Framework?
 A character encoding is a particular mapping that  The Microsoft Sync Framework simplifies the integration
of application data synchronization from any data store.
describes how to turn each character in a character set
 Microsoft Sync Framework is used for building
into a sequence of bytes.
synchronization logic within your application.
What is encryption?
 Encryption is a process in which data is deliberately
altered so as to conceal its content.

You might also like