Protecting stored data Flashcards

1
Q

Why is it important to protect stored data?

A

To prevent it from being obtained by hackers and others
Even if the application or database is compromised

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is encryption?

A

A common security technique that uses an algorithm to scramble, or encrypt, data and then uses a key for the receiving party to unscramble, or decrypt, the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Plaintext

A

Data in its readable form

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ciphertext

A

Data in its encrypted, unreadable form.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Encryption vs hashing

A

Hashing of passwords is a one way function - can convert plaintext to ciphertext but not back again
Encryption is a two-way function(convert plaintext to ciphertext and back again

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cryptography

A

Study of securing data from outside observers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Encryption

A

Act of scrambling readable data into unreadable ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Decryption

A

Act of scrambling unreadable ciphertext into readable data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Algorithm

A

Set of steps that the encryption and decryption process follows - there are many types.
A specific one is called the Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Key

A

A random string of bits created specifically for encrypting and/or decrypting data
Each key is unique and created via an algorithm to make sure it’s unpredictable
Generated with random number generators
Modern systems generate a fresh key for every session, to add another layer of security
Longer keys are harder to crack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the key length for symmetric-key algorithms

A

128 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the key length for asymmetric-key algorithms

A

2048 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Symmetric key encryption(private)

A

Encryption and decryption uses the same key
The key must be kept secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly