All relevance Flashcards
(47 cards)
- What is symmetric encryption?
A type of encryption where the same key is used to encrypt and decrypt data.
- What is asymmetric encryption?
Encryption that uses a pair of public and private keys; public key encrypts, private key decrypts.
- What is a digital signature?
A cryptographic technique for validating the authenticity and integrity of a message using asymmetric encryption.
- What is a cryptographic hash function?
A function that maps input to a fixed-size string with properties like pre-image resistance and collision resistance.
What are examples of hash functions?
MD5 (weak), SHA-1 (deprecated), SHA-2, SHA-3 (secure alternatives).
What is key exchange?
The secure process of sharing cryptographic keys between parties.
What is Diffie-Hellman key exchange?
A method of securely exchanging cryptographic keys over a public channel.
What is forward secrecy?
A property ensuring that session keys are not compromised even if the long-term key is.
What is the purpose of initialization vectors (IVs)?
IVs add randomness to encryption to ensure the same plaintext results in different ciphertexts.
What is hybrid encryption?
Combines asymmetric encryption for key exchange with symmetric encryption for data transfer.
- What is Discretionary Access Control (DAC)?
An access policy determined by the owner of the resource.
- What is Mandatory Access Control (MAC)?
A model where access is enforced by a central authority based on classification levels.
- What is Role-Based Access Control (RBAC)?
Access rights are based on the roles that users have within an organization.
What is Attribute-Based Access Control (ABAC)?
Access is granted based on attributes of users, resources, and the environment.
What is the principle of least privilege?
Users are given the minimum access necessary to perform their job.
- What is TLS and what does it secure?
TLS secures communications over a network by encrypting traffic and authenticating endpoints.
What is HTTPS?
HTTPS is HTTP secured by TLS encryption to protect data exchanged with websites.
What is a VPN?
A Virtual Private Network that encrypts a user’s internet traffic and masks their IP address.
What is Kerberos?
A network authentication protocol using tickets issued by a trusted third party.
What is a security handshake?
A negotiation between two parties to agree on encryption algorithms and keys.
- What is the CIA Triad?
Confidentiality, Integrity, and Availability — core pillars of security.
- What is the Bell-LaPadula model?
A model for maintaining data confidentiality in systems with hierarchical access.
What is the Biba model?
A model focusing on maintaining data integrity by preventing improper modifications.
What is the Clark-Wilson model?
A model that enforces data integrity through well-formed transactions and separation of duties.