13. Enabling Technologies Flashcards

(214 cards)

1
Q

VIRTUALISATION

What is virtualisation?

A

Virtualisation is the act of creating a virtual version of something, such as a computer system, server, storage device, or network resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name three types of virtualisation.

A
  1. Desktop virtualisation
  2. storage virtualisation
  3. network virtualisation.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why is virtualisation useful for developers?

A

It allows developers to create and test software in a virtual environment that simulates the target system without needing physical access to each type of hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is one general benefit of virtualisation for individuals and organisations?

A

It improves workflow by enhancing access to software and reducing costs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is desktop virtualisation?

A

It allows multiple operating systems to run on a single desktop computer

e.g., running Windows on an Apple computer.
thin clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a thin client in desktop virtualisation?

A

a computer that runs resources stored on a remote server rather than locally installed
resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is storage virtualisation?

A

It pools multiple physical storage devices into a single virtual storage system, simplifying storage management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is network virtualisation?

A

It creates virtual networks that are independent of physical network infrastructure, allowing more flexible and isolated network designs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Give an example of network virtualisation in a school setting.

A

A school can separate staff-accessible systems (like student data) from teaching and learning resources using virtual networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

other benefit of virtualisation

A
  1. Resource utilisation
  2. Isolation
  3. Flexibility and scalability
  4. Disaster recovery
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does virtualisation affect resource utilisation?

A

It maximises the use of existing physical resources, improving efficiency and reducing costs by allowing different tools and services to run on a single platform.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is meant by isolation in virtualisation?

A

It refers to the separation between the virtual system and the physical host or other virtual systems, which helps contain issues within individual virtual instances.

for example malware, is restricted to only that virtual instance and is prevented from affecting
other parts of the same physical system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does virtualisation provide flexibility and scalability?

A

It allows virtual environments to easily adapt to changing workloads and requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What role does virtualisation play in disaster recovery?

A

It enables the use of snapshots and backups, making it easier to recover from system failures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the difference between a backup and a snapshot in virtualisation?

A

A backup typically saves data, while a snapshot captures the entire system—including software and settings—for full system restoration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What happens when a system is restored using a snapshot?

A

The system is returned to the exact state it was in at the time the snapshot was taken.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a potential complexity issue with virtualisation?

A

requires specialist software and skilled personnel

making it more complex than managing physical systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DRAWBACKS OF VIRTUALISATION

What are the drawbacks of virtualisation

A
  1. Complexity
  2. Cost
    3.Performance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Give an example of a complex task in virtualisation setup.

A

Providing internet access within a virtual environment while maintaining isolation and security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What factors can lead to virtualisation performance bottlenecks?

A

Too many VMs, insufficient physical hardware, or incorrectly configured virtualisation software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Why can virtualisation lead to performance issues?

A

because virtual machines share physical hardware resources and rely on additional software layers, which can cause bottlenecks if poorly configured or overloaded.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are some cost-related drawbacks of virtualisation?

A

High initial costs for virtualisation software, powerful hardware, and potential training for IT staff.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

ACHIEVING VIRTUALISATION

What are the two main approaches to achieving virtualisation?

A

Containerisation and virtual machines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a virtual machine (VM)?

A

A VM simulates an entire computer system, typically providing access to a complete operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
How does a user interact with a virtual machine?
As if they are using the system directly, with full access to the virtual operating system.
22
Containerisation
uses a much narrower focus and provides access to a specific function or application only.
23
comparison between virtual machines and containerisation
LOOK AT PG 34 OF TEXTBOOK
24
DISTRIBUTED SYSTEMS What is a distributed system?
A collection of independent computing nodes that work together to achieve a common goal.
25
What are key goals of a distributed system?
High performance, scalability, and fault tolerance.
26
Define nodes
a key point in a network relating to a specific connection or device
27
What common services use distributed systems?
Web services data services cloud computing platforms content delivery networks (CDNs).
28
How do distributed systems benefit video streaming services?
They reduce response time and improve user experience by serving content from local servers.
29
How does blockchain use distributed systems?
It stores transaction records (ledgers) across multiple locations to avoid single points of failure and tampering.
30
What is the role of distributed systems in data services?
They use distributed databases and file systems to manage large volumes of data protect against data loss improve access.
31
ISSUES RELATING TO DISTRIBUTED SYSTEMS Why are distributed systems complex to manage?
They require specialists for setup and maintenance, and involve significant time and financial investment.
32
What do organisations often use to support geographically isolated hardware in distributed systems?
Cloud service providers like Google Cloud Platform (GCP) and Amazon Web Services (AWS).
32
What is one key advantage of using cloud service providers for distributed systems?
They provide access to servers around the world, supporting the benefits of distributed systems.
33
distributed systems provide a range of benefits for an organisation What are they
1. Failure resistance 2. Concurrency 3. Replication 4. Performance
34
What makes distributed systems highly fault tolerant?
Data and services are duplicated across many systems, avoiding a single point of failure.
34
How do distributed systems respond to system malfunctions or cyber attacks?
They continue operating using other systems and restore the affected ones from backup data.
35
What is concurrency in distributed systems?
The ability to process multiple tasks simultaneously on different nodes.
36
Why is concurrency important in large organisations using distributed systems?
It allows tasks to be allocated to nodes with available capacity, improving performance and responsiveness.
37
What is the purpose of data replication in distributed systems?
To enhance availability and fault tolerance.
38
What challenge does data replication introduce in distributed systems?
Ensuring consistency between different instances of the data.
39
What could happen if a transaction is updated on one system but not on others?
It may cause errors in other business areas.
39
How does workload distribution improve performance in distributed systems?
Requests go to the node with the lowest workload, reducing lag and improving workflow.
40
What performance issue arises due to the geographical distribution of nodes?
The system must decide whether it's faster to use a remote node with low workload or a local but busy node.
41
HUMAN COMPUTER INTERACTION What is human computer interaction
(HCI) is an area of IT that focuses on how users control and interact with computer systems. The aim of HCI is to allow the user to easily and effectively complete tasks in order to meet their needs.
42
IMPACT ON USER EXPERIENCE What is user experience (UX)?
UX refers to how enjoyable, easy, and intuitive users find a system, leading to user satisfaction.
43
How does the user interface (UI) affect user experience?
The UI affects UX by influencing how engaging and helpful it is in completing tasks effectively.
44
What is usability in the context of UX?
It refers to how easily a user can interact with a product and achieve their goals.
45
What factors influence usability?
Speed responsiveness simplicity number of steps UI clarity appropriate controls.
46
What are examples of consistency in design?
Using the same icons or layouts for similar tasks, like standard icons for 'Save' or 'Print'.
46
Why is consistency important in UX design?
It helps users predict system behavior and become familiar with the system more quickly.
47
Why is user feedback important in UX?
It helps users understand the outcome of their actions, maintaining communication with the system.
48
What forms can user feedback take in a system?
Visual cues, sound, or haptic feedback.
49
How can efficiency be improved in a system?
Reduce task steps offer shortcuts ensure quick system performance.
49
Give an example of helpful system feedback.
A message confirming data submission or a clear error message explaining a mistake.
50
What is system efficiency in UX?
The ability for users to complete tasks quickly and with minimal effort.
51
What is learnability in UX design?
How easily users can learn to use a system, especially the core functions.
52
What helps improve learnability?
What helps improve learnability?
53
What is accessibility in UX?
Designing interfaces to be usable by people with diverse needs and abilities.
54
What are key features for accessibility?
Adjustable font size color contrast keyboard navigation screen reader compatibility.
55
Why is accessibility important in UX?
It ensures all users can interact with the system effectively, regardless of ability.
56
How does flexibility and customisation impact user experience?
How does flexibility and customisation impact user experience?
57
Why must customisation options be balanced with simplicity?
Why must customisation options be balanced with simplicity?
58
What does aesthetics refer to in UX design?
Aesthetics is the appreciation of how visually pleasing a design is.
59
How can aesthetics affect user experience?
A visually appealing design can enhance user satisfaction and engagement.
60
What design elements contribute to aesthetics?
Colour schemes visual hierarchy the overall look and feel of the interface.
61
IMPLEMENTING HCI What are the three broad categories of interaction in HCI?
Visual Audio Haptic.
62
VISUAL HCI HCI will make use of a wider variety of visual elements to communicate meaning and function in an intuitive way. What are they
Design elements Visual hierarchy Responsive design Visual feedback
63
What is the focus of visual HCI?
Using visual perception to interpret and interact with computer systems.
64
Design elements There are a number of visual design elements that can be used to help ensure an effective interface, including the following:
Layout Colour Typography Images and icons
65
What role does layout play in visual HCI?
It affects how users interpret content; poor layout can make a system seem low quality or confusing.
66
Why is layout important in interface design?
Placement of elements (e.g., top of screen vs. within text) can influence perceived importance and clarity.
67
How can colour be used effectively in HCI?
: To convey information, emphasise elements, create cohesion, and evoke feelings or brand identity.
68
What is the role of typography in visual HCI?
Enhances readability and sets tone; font choices and sizes can indicate importance.
69
How do images and icons contribute to visual HCI?
They aid recognition, simplify complex information, and make the interface more engaging.
70
How can charts or diagrams improve user understanding?
They help interpret data or explain complex processes more easily than text alone.
71
Visual hierarchy What is visual hierarchy in HCI?
The use of sizing and placement of text and elements to communicate importance and guide user attention
72
How can visual hierarchy be used in a computer system?
By making buttons or links to core functions more prominent than less important features.
73
Why is establishing visual hierarchy important?
It helps users understand the relative importance of different elements and navigate the interface effectively.
74
Audio HCI What is Audio HCI?
It involves using sound, speech, and auditory cues to communicate with users and provide alternative interaction methods.
75
How can Audio HCI support users with specific needs?
It helps users with limited mobility, visual impairments, or low technical skills interact with systems more easily.
76
What are speech interfaces?
Systems that allow users to control and interact with a computer using spoken language.
77
How have machine learning developments improved speech interfaces?
They have enhanced natural language processing and speech recognition accuracy, even with regional accents.
78
What is speech synthesis?
The system's ability to produce spoken feedback, simulating a conversation with the user.
79
How does speech synthesis enhance accessibility?
It can read on-screen text for users with visual impairments or provide verbal instructions while driving.
80
What is auditory feedback?
The use of sound to indicate user actions, system status, or outcomes.
81
Give examples of auditory feedback in everyday systems.
Notification sounds, collision warnings in cars, and button click sounds in apps.
81
Why is auditory feedback important?
It benefits visually impaired users and those who can’t focus on the screen, enhancing usability.
82
Haptic HCI What is Haptic HCI?
Haptic HCI involves interfaces that use touch to create more immersive and engaging user experiences.
83
What are some benefits of haptic interfaces?
Increased realism, improved learning, better accessibility, and greater emotional impact.
84
How do haptics enhance learning and retention?
By engaging multiple senses, which improves how we process and remember information.
85
What is force feedback in haptics?
Physical sensations like pressure or vibration created by motors or actuators, often used in game controllers and phones.
85
How do haptic systems improve accessibility?
They offer alternative input/output for users with visual or motor impairments.
86
What is an example of force feedback in everyday devices?
Vibration alerts on smartphones.
87
What is tactile interaction in HCI?
A communication method using touch, like tactile displays that output Braille for visually impaired users.
88
How is tactile interaction used in modern technology?
It’s integrated into VR/AR systems for realistic simulations, such as medical training.
89
What are biometric sensors in haptics?
Devices that detect physical data like movement or heart rate to interact with systems.
90
How do biometric sensors benefit users?
They provide health or activity data to apps, aiding fitness tracking and health monitoring.
91
ERGONOMIC PRINCIPLES OF HCI What is ergonomics in the context of HCI?
The design and arrangement of environments and devices to improve comfort, efficiency, and productivity in human-computer interaction.
91
What does effective ergonomic design consider?
physical and cognitive limitations of users
91
Why is proper posture important in HCI?
To avoid MSDs such as neck pain, back pain, and repetitive strain injuries.
92
What is physical ergonomics?
The area focused on posture, movement, and physical workload to minimize strain and reduce the risk of musculoskeletal disorders (MSDs).
93
How can adjustable furniture help ergonomics?
By allowing users to maintain a body position that avoids stress on any single part of the body.
94
What ergonomic features can help reduce wrist and arm strain when using input devices?
Curved keyboards, wrist supports, and the use of trackballs or voice recognition.
95
How can visual display settings reduce eye strain?
By adjusting brightness, contrast, resolution, text size, and font styles to suit user needs.
96
What are ways to reduce glare on computer screens?
Positioning screens at right angles to windows, using window shades, and adjusting room lighting.
97
Cognitive ergonomics What are Cognitive ergonomics
Workload Memory Attention
98
Workload
Interfaces should be designed to minimise cognitive workload, which can lead to fatigue, errors and reduced productivity. This can be achieved through the way in which information is presented. Reducing the amount of information that is given to the user at any one time, or effective use of graphics, can assist with this. Other ways include keeping interfaces simple, consistent and predictable.
99
Memory
Human memory is limited so interfaces should use familiar patterns and provide reminders and cues to help users remember how to perform tasks.
100
Attention
Interfaces should avoid distractions and help users focus on the task at hand. Minimising unnecessary visual clutter and auditory cues can assist in reducing distractions. Reducing alerts, pop-ups and adverts can help this, as can adding features such as 'do-not-disturb', which allows users to limit the types of alerts that they receive when trying to focus on a task
101
DESIGNING AN INTERFACE TO MEET THE NEEDS OF INDIVIDUALS AND ORGANISATIONS Despite aesthetic differences, what should GUIs have in common?
Common features and principles that ensure the interface meets user and organisational needs.
102
What is the purpose of applying common GUI design principles?
To ensure the interface is effective and meets the needs of both individuals and organisations.
102
Menu What is the purpose of GUI menus in modern software?
To allow quick access to tools and features without requiring users to remember typed commands.
103
How can menu systems be both usable and appealing?
by using different types of menus creatively while maintaining usability and familiarity.
104
What balance must be struck when designing menu systems?
Between creativity (to stand out) and familiarity (to ensure ease of use).
105
What are the different menu types
1. Standard horizontal menu 2. Hamburger menu 3. Mega menu 4. Vertical sidebar navigation 5. Contextual menu 6. Pie menu
106
1. Standard horizontal menu
Typically found at the top of a software or application window. Each menu contains a series of related options, which can lead to submenus
107
2. Hamburger menu
Usually located in a corner of a screen, a hamburger menu expands when selected but hides the options when not in use. useful on smartphones or tablets where smaller screen sizes
108
3. Mega menu
A large multi-column menu that is hidden until one of the top level items is selected or hovered over with the mouse. used where there are many possible options or subcategories, such as on an e-commerce site
109
4. Vertical sidebar navigation
A menu bar positioned on the left or right side of the screen and usually arranged in a vertical manner. Useful for complex applications with a lot of features.
110
5. Contextual menu
A menu that appears dynamically when the user right-clicks on a specific element within an application or web page.
111
6. Pie menu
A circular menu with options that expand outwards. Common in graphics editing and design applications.
112
Icons What are icons in a GUI?
Small pictures that act as shortcuts to files, programs, or software features.
113
How do icons improve accessibility and ease of use?
By using clear and simple images to represent concepts without requiring users to read text.
114
How do icons contribute to consistency across applications?
By using the same style, size, and colours within a suite of applications.
115
Accessibility Why is accessibility important in interface design?
To ensure inclusion of all potential users, including those with disabilities or additional needs.
116
There are a number of ways to incorporate accessibility into a user interface. These include the following:
Adjustable typeface Adjustable colour schemes/high-contrast option: Screen reader support: Alt text Captions and transcripts:
117
What is the benefit of adjustable typeface in a user interface?
It allows users with visual impairments to change font style and size for easier content access.
118
Why are adjustable colour schemes and high-contrast options important?
They help users distinguish interface elements more easily, especially if certain colour combinations are difficult to see.
119
What is the function of a screen reader?
It reads on-screen text, buttons, tags, and labels aloud using speech synthesis for visually impaired users.
120
How should content be organised to support screen readers?
information should be logically structured with meaningful metadata to help identify the purpose of objects
121
What is alt text, and why is it important?
Alt text is metadata for images or buttons that provides meaningful descriptions to assist screen reader users.
122
How do captions and transcripts improve accessibility?
They provide alternative ways to access audio content for users with hearing impairments or in noisy environments.
123
Windows What are windows in a graphical user interface?
Graphical components used to group and manage content and data on a computer screen.
124
Which operating systems commonly use windows?
Windows, macOS, and Linux.
124
Most operating systems allow the windows to be customised to a greater or lesser degree, and most have these key characteristics: which are
Rectangular frames: Title bar Buttons Menu bar: Scroll bar Content area:
125
What is the purpose of a window’s rectangular frame?
To visually separate it from other screen elements.
126
What information is typically displayed in a window’s title bar?
The name of the program or document being used.
127
What are the common functions of buttons in a window?
Closing, minimising, and maximising the window.
128
What does the menu bar in a window provide?
Access to additional features and functions.
129
When and where do scroll bars appear in a window?
When content exceeds the window’s size—right side for vertical, bottom for horizontal scrolling.
130
What is the content area of a window?
The main space where the program interface or document is displayed.
131
Pointers What does a pointer represent on the screen?
The user's current interaction with the screen.
132
How can pointers be contextual?
Their appearance changes depending on the type of action being performed.
133
**STORING AND SECURING DATA** Why must IT professionals carefully consider data storage?
To ensure data is easily accessible for authorized users and restricted from unauthorized access.
134
What two key factors must be balanced when storing data?
Accessibility for those who need it and security from those who shouldn't access
135
STORING DATA IN THE CLOUD What does the term "cloud" refer to in computing?
Any tool or resource provided by a third party and accessed via the internet.
136
What is meant by 'on-premises' resources?
Data stored on computers and servers physically located and maintained within the company’s own buildings.
137
How is cloud storage different from on-premises storage?
In cloud storage, data is stored on servers located remotely and maintained by a third-party provider.
138
Where is cloud-stored data physically located?
On servers maintained by cloud service providers, not at the user’s location.
139
Name two major cloud service providers.
Amazon Web Services and Microsoft Azure.
140
How do companies or individuals access cloud services?
By paying a fee for access to the cloud provider’s infrastructure and services.
141
SECURING DATA What makes securing data important for companies and individuals?
To prevent the loss or misuse of sensitive data.
142
What is a key consideration when choosing a data protection method?
Whether the data is being stored or transmitted.
143
most common methods of securing stored data.
File encryption Passwords
144
File encryption What does the term "file encryption" typically refer to?
Encryption of stored data, not data in transmission.
145
What is the basic principle of encryption?
Using an algorithm to scramble data so it is unreadable without the correct key.
146
What is the unreadable form of encrypted data called?
Ciphertext.
147
Passwords What is the primary purpose of a password in computer systems?
To authenticate the identity of a user and restrict access to systems or files.
148
How does a computer system verify a password?
It compares the entered password with the securely stored one, and grants access if they match.
149
What are the three key characteristics of a strong password?
Complexity, length, and uniqueness.
150
Why is a longer password more secure?
It increases the number of possible combinations, making it harder to guess or crack.
151
There are a number of ways that knowledge-based authentication is implemented in computer systems including the following: what are they
Passwords: Security question: PIN: Pattern lock:
152
What is a security question used for in authentication?
To verify a user’s identity using personal information, often after a forgotten password or unusual activity.
153
What does PIN stand for and what is it used for?
Personal Identification Number; used to protect access to payment cards or smartphones.
154
What is a pattern lock?
A screen-lock method where a user draws a unique pattern on a touchscreen to gain access.
155
SECURITY IN DATABASE MANAGEMENT SYSTEMS (DBMS) What is the main purpose of a Database Management System (DBMS)?
To control access and views of stored data, ensuring security, integrity, and privacy.
156
What does access control in a DBMS do?
It controls who can access the database, what actions they can perform, and what data they can view or modify.
157
What is a view in a DBMS?
A method of presenting specific subsets of data to users, hiding the complexity of the database and limiting errors or corruption.
158
Authentication How does a DBMS authenticate users?
By verifying credentials like usernames and passwords before granting access.
159
Authorisation What is authorisation in a DBMS?
Granting or denying permissions to perform specific operations (e.g., read, write, delete) on database objects.
160
Why are roles used in a DBMS?
To group sets of privileges for different user types (e.g., sales team vs. senior managers), making permission management more efficient and secure.
161
What are privileges in a DBMS?
Permissions that specify what operations a user or role can perform, such as read-only or edit access.
162
What is the principle of least privilege?
Giving users only the access necessary to perform their job and nothing more.
163
Other methods of control What is an Access Control List (ACL) in a DBMS?
A list associated with a database object that defines which users or roles have access to the object and what kind of access they have.
164
what does Row-Level Security (RLS) allow in a DBMS?
It controls access to individual rows in a table based on conditions, such as a user only seeing rows related to their department.
165
**ENCRYPTION What is encryption in data security?
A method that protects data by scrambling it with an algorithm, making it unreadable without the correct key.
166
How do views enhance data security in a DBMS?
They show users a specific subset of data while hiding the underlying database complexity and restricting unnecessary access.
167
What is the purpose of auditing features in a DBMS?
To log user activity (who accessed data, what actions they took, and when), helping with security monitoring and investigations.
168
What are the two main types of encryption?
Symmetric encryption and asymmetric (public-key) encryption. Certificate-based encryption
169
SYMMETRIC ENCRYPTION What is symmetric encryption?
A method of encryption where the same key is used to encrypt and decrypt the data.
170
What is symmetric encryption best suited for?
Securing stored data accessed by few users, or for personal devices like USB memory sticks.
171
Why is symmetric encryption less effective for data transmission?
ecause the key must be shared, which introduces a security risk.
172
What are the three steps of implementing symmetric encryption?
Key generation Encryption Decryption
173
What happens during the key generation step?
A random, complex key is generated, often by a computer program, to ensure it is difficult to guess or crack.
174
What happens during the encryption step?
The plain text and key are input into an encryption algorithm to produce ciphertext.
175
What is ciphertext?
the encrypted version of a message/data
176
What happens during the decryption step?
The ciphertext and the same key are input into a decryption algorithm to convert the data back to plain text.
177
Benefits and limitations of symmetric encryption What is a key benefit of symmetric encryption for personal devices?
It provides excellent protection against opportunistic attacks, such as data theft from a stolen laptop.
178
Why is symmetric encryption faster than asymmetric encryption?
It uses a less complex algorithm, making it more efficient for large data or less powerful devices.
179
Why is symmetric encryption good for encrypting stored data?
Because it is efficient, fast, and does not require the data to be shared across networks.
180
What is the main challenge of symmetric encryption when sharing or transmitting data?
Keeping the key secure during and after sharing.
181
ASYMMETRIC ENCRYPTION What are the two keys used in asymmetric encryption?
A public key for encryption and a private key for decryption.
182
what is the role of the private key in asymmetric encryption?
It is kept secret and is used to decrypt messages encrypted with the corresponding public key.
183
What is a major limitation of asymmetric encryption?
It is slower and requires more processing power, making it less suitable for large volumes of data or use on personal devices.
184
Why can’t the private key be easily derived from the public key?
Due to the mathematical complexity of the algorithm used to generate the key pair.
185
CERTIFICATE-BASED ENCRYPTION What is the main purpose of certificate-based encryption?
To authenticate identities and establish a trusted, secure connection using digital certificates.
186
What is a digital certificate?
A digital document used to verify the identity of the owner of a public key, issued by a Certificate Authority (CA).
187
Who issues digital certificates?
A trusted third party called a Certificate Authority (CA).
188
Name 4 key pieces of information in a digital certificate.
Public key of the owner Subject (identity of the owner) Issuer (name of the CA) Validity period and digital signature of the CA
189
What is the purpose of the digital signature in a certificate
To verify that the certificate was issued by a trusted Certificate Authority.
190
What is the purpose of the validity period in a certificate?
To limit its lifespan and ensure regular revalidation of the entity's identity by the CA.
191
What encryption methods are used in certificate-based encryption?
It uses asymmetric encryption to establish trust and symmetric encryption for actual data transmission.
192
How does a browser establish a secure connection with a website?
Browser requests the SSL certificate from the server Validates the certificate using the CA's signature Creates a session key and encrypts it using the server’s public key Both use the session key for symmetric encryption of transmitted data
193
What is the HTTPS protocol and how is it related to certificate-based encryption?
HTTPS uses SSL/TLS certificates and certificate-based encryption to ensure secure communication between browser and server.
194
Benefits and limitations of certificate-based encryption What is a major performance benefit of certificate-based encryption?
It enables secure exchange of a session key, allowing fast symmetric encryption during data transfer.
195
Why is symmetric encryption used after certificate authentication?
Because it is faster and more efficient than asymmetric encryption for ongoing data transmission.
196
What is a key limitation of certificate-based encryption?
It relies on trusting the Certificate Authority (CA) to verify the identity of certificate holders correctly.
197
What is a potential risk related to Certificate Authorities (CAs)?
If a CA is compromised or negligent, it could issue certificates to untrustworthy entities.
198
Despite its limitations, why is certificate-based encryption widely used?
Because its benefits outweigh the risks, offering high security with good performance.
199
List 4 common applications of certificate-based encryption.
HTTPS websites for secure transactions Email encryption for private communication Software signing to verify authenticity VPN connections for secure remote access