Security and Cryptography Flashcards

1
Q

can reformat and transform our data, making it safer on its trip between computers

A

Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This type of attack involves trying every possible combination of characters until the correct one is found

A

Brute-Force Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

is malicious software that can infect computers and steal data, install backdoors, or perform other harmful actions.

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Types of Malware

A

Viruses, Worms, Trojans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

is a type of social engineering attack where attackers try to trick people into revealing sensitive information by posing as a legitimate entity, such as a
bank or email provider.

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This type of attack involves intercepting communication between two parties and modifying or eavesdropping on the data being transmitted

A

Man-in-the-Middle Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

exploit weaknesses in the physical implementation of cryptographic algorithms, such as power consumption or electromagnetic radiation, to extract sensitive information.

A

Side-Channel Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Are weaknesses or vulnerabilities in cryptographic algorithms or protocols that can be exploited by attackers to compromise security

A

Cryptographic Flaws

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

are security risks that come from within an organization, such as employees or contractors with access to sensitive information who may intentionally or unintentionally disclose it.

A

Insider Threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

involve overwhelming a system or network with traffic or requests, causing it to crash or become unavailable

A

Denial-of-Service Attacks (DoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

can lead to the compromise of cryptographic keys, making it possible for attackers to decrypt data or impersonate authorized users.

A

Key Management Failures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

involve unauthorized access to physical devices or systems, such as stealing a laptop or breaking into a data center

A

Physical Security Breaches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

is the practice of securing digital communications by converting plain text into a secret code that can only be read by the intended recipient.

A

Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

is the process of converting plain text into an unreadable format using a cryptographic algorithm and a secret key.

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

is the process of converting the encrypted data (ciphertext) back into its original form (plaintext) using the secret key

A

Decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An asymmetric encryption algorithm that uses a pair of public and private keys for encryption and decryption

A

Rivest-Shamir-Adleman (RSA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A symmetric encryption algorithm widely used in secure communications that uses a shared secret key for encryption and decryption.

A

Advanced Encryption Standard (AES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A symmetric encryption algorithm that is popular in software and hardware encryption applications

A

Blowfish

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A family of cryptographic hash functions used to ensure data integrity and authenticity.

A

Secure Hash Algorithm (SHA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

is a form of encryption that uses the same secret key for both encryption and decryption of data

A

Symmetric Key Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

also known as secret key cryptography

A

Symmetric Key Cryptography

22
Q

Symmetric Key Cryptography is also known as ______

A

Secret Key Cryptography

23
Q

is a shared secret between the sender and the recipient of the message, which is used to scramble the original message into ciphertext and then unscramble it back into its original form.

A

Key

24
Q

Three steps of symmetric key cryptography

A

Key Generation
Encryption
Decryption

25
Q

A widely used encryption algorithm that uses a 56-bit key and operates on 64-bit blocks of data.

A

Data Encryption Standard (DES)

26
Q

A more secure encryption algorithm that uses a 128-bit, 192-bit, or 256-bit key and operates on 128-bit blocks of data.

A

Advanced Encryption Standard (AES)

27
Q

Another widely used encryption algorithm that uses a variable-length key of up to 448 bits and operates on 64-bit blocks of data.

A

Blowfish

28
Q

is a cryptographic system that uses two separate keys for encryption and decryption.

A

Public Key Cryptography

29
Q

Also known as asymmetric cryptography

A

Public Key Cryptography

30
Q

Public Key Cryptography is also known as _____

A

asymmetric cryptography

31
Q

This is one of the most widely used public key encryption algorithms.

A

Rivest-Shamir-Adleman (RSA)

32
Q

Who invented the Rivest-Shamir-Adleman (RSA)

A

Ron Rivest
Adi Shamir
Leonard Adleman

33
Q

This algorithm is used for key
exchange and is often used in combination with other algorithms for encryption and authentication.

A

Diffie-Hellman

34
Q

This is a newer algorithm that is gaining popularity due to its smaller
key sizes and faster performance

A

Elliptic Curve Cryptography (ECC)

35
Q

This algorithm is used for digital signatures and is often used in conjunction with other encryption algorithms

A

Digital Signature Algorithm (DSA)

36
Q

is a cryptographic technique used in cybersecurity to ensure the authenticity and integrity of digital documents or messages.

A

Digital Signatures

37
Q

serves as a tamper-proof seal that verifies the identity of the sender and confirms that the document or message has not been altered in transit.

A

Digital Signature

38
Q

Two Keys

A

private key and public key

39
Q

is kept secret and only known to
the owner of the signature

A

private key

40
Q

is freely distributed and can be used by anyone to verify the signature

A

public key

41
Q

a widely-used public-key encryption algorithm that can also be used for digital signatures

A

Rivest-Shamir-Adleman (RSA)

42
Q

a public-key algorithm specifically designed for creating and verifying digital signatures.

A

Digital Signature Algorithm (DSA)

43
Q

a variant of DSA that uses elliptic curve cryptography.

A

Elliptic Curve Digital Signature Algorithm (ECDSA)

44
Q

another variant of DSA that uses Edwards-curve cryptography.

A

Edwards-curve Digital Signature Algorithm (EdDSA)

45
Q

refers to the processes and techniques used to generate, distribute, store, use, and revoke cryptographic keys.

A

Key Management

46
Q

are essential for ensuring the confidentiality, integrity, and authenticity of data, and key management is critical to the security of cryptographic systems.

A

Cryptographic Keys

47
Q

This approach involves manually generating, distributing, and revoking keys.

A

Manual Key Management

48
Q

In this approach, a trusted third party is responsible for storing and managing cryptographic keys.

A

Key Escrow

49
Q

is a variant of key escrow where the encrypted keys are stored in a way that allows authorized individuals to recover them if they are lost or stolen.

A

Key Recovery

50
Q

This approach involves the use of automated systems to generate, distribute, and manage keys.

A

Automated Key Management

51
Q

This approach combines different key management techniques to create a customized solution that meets the specific security requirements of an organization.

A

Hybrid Key Management

52
Q

Best Practices for Security

A
  • Use Strong Passwords
  • Keep Software Up-to-date
  • Install Anti-Virus Software
  • Use Two-Factor Authentication
  • Limit Access
  • Educate Employees
  • Backup Data
  • Monitor Activity
  • Encrypt Sensitive Data
  • Conduct Regular Security Assessments