ch4 Flashcards

(26 cards)

1
Q

What is the role of the Public Key?

A

To encrypt data and validate digital signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the primary function of the private key

A

Decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Trusted third party that can retrieve a key in emergancy scenarios

A

Key Escrow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A specialized hardware device designed to provide robust security measures for the security of security keys, sensitive data and cyrptographic operations

A

(HSM) Hardware security moduel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A robust security measure designed to protect the data on a hard drive or SSD

A

FDE - Full disk encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Chip that is critical in FDE on a disk

A

TPM Chip (Trusted platform)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The 4 steps of TLS (Transport layer Security)

A
  1. Handshake 2. Encryption 3. Transmisson 4. Decyption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Type of encyrption which uses both a public and private for data transfer

A

Asymentric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Type of encryption which uses a single key to move data from point a to point b

A

Symentric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The art securley delivering cryptogrpahic keys from sender to receiver

A

Key Exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Encryption that transforms plantext into a jumble of characters

A

Algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Measure of a resistance against a keys length directly affects the complexity of deciphering encrypted data.

A

key length

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The duration over which cyrpptogrpahic keysremain secure and effective in protecting sensistive data

A

Key longevity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A Type of encryption that enables data to be processed and manipulatedwithout the need for decryption.

A

Homoomorphic Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Type of obfuscation where sensitive infomation is hidden in seemingly innoculous data.

A

Steganogrphy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

This type of obfusication where sensitive data is turned into tokensthat hold no inheriant value. When a transaction occurs, the toke is used instede of orginal data, reducing the risk assocaited with ahndling sensitve info.

17
Q

Type of obfusication where data is disgusied by replacing orginal data with ficticious data

18
Q

The process refers to the technology adding random data to passwords ebfore they are hased and stored

19
Q

Cryptographic technique desinged to transform a password into a longer more complex key. In an attempt to slow down the process of deriving the password

A

Key Stretching

20
Q

Two methods used for key stretching

A

PBKDF2 and BCrypt

21
Q

Where data batches called blocks that are distributed across countless computers. Accomplished through decentrialzation

22
Q

The benefeits of the open publics ledger are as follows

A

Decentralization, security, trasnaction recording, consensus mechanisms, immutable and chronological, transparancy

23
Q

Orgs taht validate digital identities using cryptogrpahic keys, ensuring the website we visit and the data we share are genuine.

A

CA - Certificate Authorities

24
Q

Lists contain the serial numbers of certifcates that have been revoked, comprimised or expired which are maintained by CA’s

25
Allows real time validation of site certificates
OCSP
26
An indvidual or organization to obtain a dgital certicate from a trusted CA, they generate a this
CSR - Certicate signing request