Chapter 10 Flashcards

1
Q

Integrity

A

One of the three main goals of information security known as the CIA security triad

Integrity provides assurance that data or system configurations have not been modified

Audit logs and hashing are two methods used to ensure integrity

Compare with availability and confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Hash

A

A number created by executing a hashtag algorithm against data, such as a file or message

Hashing is commonly used for integrity

Common hashing algorithms are MD5, SHA-1, and HMAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Confidentiality

A

One of three main goals of information security known as the CIA security triad

Confidentiality ensures that unauthorized entities cannot access data

Encryption and access controls help protect against the loss of confidentiality

Compare with availability and integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Encryption

A

A process that scrambles, or ciphers, data to make it unreadable

Encryption normally includes a public algorithm and a private key

Compare with Asymmetric and Symmetric Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Digital Signature

A

An encryption hash of a message, encrypted with the sender’s private key

It provides authentication, non-reputation, and integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Authentication

A

The process that occurs when a user proves an identity, such as with a password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Non-Repudiation

A

The ability to prevent a party from denying an action

Digital Signatures and access logs provide non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Patch File

A

Filler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SHA-1 Checksum

A

Filler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

MD5

A

Message Digest 5 is a hashing function used to provide integrity

MD5 creates 128-bit hashes, which are also referred to as MD5 checksums

Experts consider MD5 cracked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SHA

A

Secure Hash Algorithm is a hashing function used to provide integrity

Versions include SHA-1, SHA-2, SHA-3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

HMAC

A

Hash-based Message Authentication Code is a hashing algorithm used to verify integrity and authenticity of a message with the use of a shared secret

It is typically combined with another hashing algorithm such as SHA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

RIPEMD

A

RACE Integrity Primitives Evaluation Message Digest is a hash function used for integrity

It creates fixed-length hashes of 128, 160, 256, or 320 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Key Stretching

A

A technique used to increase the strength of stored passwords

It adds additional bits (called salts) and can help thwart brute force and rainbow table attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Salt

A

A random set of data added to a password when creatig the hash

PBKDF2 and bcrypt are two protocols that use salts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Bcrypt

A

A key stretching algorithm

It is used to protect passwords

Bcrypt salts passwords with additional bits before encrypting them with Blowfish

This thwarts rainbow table attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

PBKDF2

A

Password-Based Key Derivation Function 2 is a key stretching technique that adds additional bits to a password as a salt

It helps prevent brute force and rainbow table attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Data-at-rest

A

Any data stored on media

It’s common to encrypt sensitive data-at-rest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Data-In-Transit

A

Any data sent over a network

It’s common to encrypt sensitive data-in-transit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Data-In-Use

A

Any data currently being used y a computer

Because the computer needs to process the data, it is not encrypted while in use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Algorithm

A

Filler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Key

A

Filler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Random and Pseudo-Random Numbers

A

Filler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

IV

A

Initialization Vector attack is a wireless attack that attempts to discover the IV

Legacy wireless security protocols are susceptible to IV attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Nonce
A number used once Cryptography elements frequently use a nonce to add randomness
26
XOR
A logical operation used in some encryption schemes XOR operations compare two inputs If the two inputs are the same, it outputs True If the two inputs are different, it outputs False
27
Confusion
A cryptography concept that indicates ciphertext is significantly different than plaintext
28
Diffusion
A cryptography concept that ensures that small changes in plaintext result in significant changes in ciphertext
29
Secret Algorithm
Filler
30
Weak/Deprecated Algorithms
Filler
31
High Resiliency
Filler
32
Block Cipher
An encryption method that encrypts data in fixed-sized blocks Compare with stream cipher
33
StreamCipher
An encryption method that encrypts data as a stream of bits or bytes Compare with block cipher
34
ECB
Electronic Codebook is a legacy mode of operation used for encryption It is weak and should not be used
35
CBC
Cipher Block Chaining is a mode of operation used for encryption that effectively converts a block cipher into a stream cipher It uses an IV for the first block and each subsequent block is combined with the previous block
36
CTM
Counter mode is a mode of operation used for encryption that combines an IV with a counter The combined result is used to encrypt blocks
37
GCM
Galois/Counter Mode is a mode of operation used for incryption It combines the counter (CTM) mode with hashing techniques for data authenticity and confidentiality
38
Symmetric Encryption
A type of encryption using a single key to encrypt and decrypt data Compare with asymmetric encryption
39
Encryption Algorithm
Filler
40
Decryption Algorithm
Filler
41
Substitution Cipher
An encryption method that replaces characters with other characters
42
Plaintext
Text displayed in a readable format Encryption converts plaintext to ciphertext
43
Ciphertext
The result of encrypting plaintext Ciphertext is not in an easily readable format until it is decrypted
44
ROT13
A substitution cipher that uses a key of 13 To encrypt a message, you would rotate each letter 13 spaces To decrypt a message, you would rotate each letter 13 spaces
45
Obfuscation
An attempt to make something unclear or difficult to understand Steganography methods use obfuscation to hide data within data
46
AES
Advanced Encryption Standard is a strong symmetric block cipher that encrypts data in 128-bit blocks AES can use key sizes of 128 bits, 192 bits, 256 bits
47
Fast
Filler
48
Efficient
Filler
49
Strong
Filler
50
DES
Data Encryption Standard is a legacy symmetric encryption standard used to provide confidentiality It has been compromised and AES or 3DES should be used instead
51
3DES
Triple Digital Encryption Standard is a symmetric algorithm used to encrypt data and provide confidentiality It is a block cipher that encrypts data in 64-bit blocks
52
RC4
A symmetric stream cipher that can use between 40 and 2,048 bits Experts consider it cracked and recommend using stronger alternatives
53
Blowfish
A strong symmetric block cipher It encrypts data in 64-bit blocks and supports key sized between 32 and 448 bits Compare with Twofish
54
Twofish
A symmetric key block cipher It encrypts data in 128-bit blocks and supports 128-, 192-, or 256-bit keys Compare with Blowfish
55
Asymmetric Encryption
A type of encryption using two keys to encrypt and decrypt data It uses a public key and a private key Compare with symmetric encryption
56
Public Key
Part of a matched key pair used in asymmetric encryption The public key is publicly available Compare with private key
57
Private Key
Part of a matched key pair used
58
Certificate
A digital file used for encryption, authentication, digital signatures, and more Public certificates include a public key used for asymmetric encryption
59
Serial Number
Filler
60
Issuer
Filler
61
Validity Dates
Filler
62
Subject
Filler
63
Usage
Filler
64
RSA
Rivest, Shamir, and Adleman is an asymmetric algorithm used to encrypt data and digitally sign transmissions It is named after its creators, Rivest, Shamir, and Adleman
65
Ephemeral
An ephemeral key is a type of key used in cryptography Ephemeral keys have very short lifetimes and are re-created for each session
66
Perfect Forward Secrecy
A characteristic of encryption keys ensuring that keys are random Perfect forward secrecy methods do not use deterministic algorithms
67
DHE
Filler
68
ECDHE
Filler
69
Steganography
The practice of hiding data within data For example, it's possible to embed text files within an image, hiding them from casual users It is one way to obscure data to hide it
70
DSA
Digital Signature Algorithm is an encrypted hash of a message used for authentication, non-repudiation, and integrity The sender's private key encrypts the hash of the message
71
Hashing
Filler
72
S/MIME
Secure/Multipurpose Internet Mail Extensions is a popular standard used to secure email S/MIMI provides confidentiality, integrity, authentication, and non-repudiation
73
Cipher Suites
Filler
74
Crypto Module
A set of hardware, software, and/or firmware that implements cryptographic functions Compare with crypto service provider
75
Crypto Service Providers
A software library of cryptographic standards and algorithms These libraries are typically distributed within crypto modules
76
Downgrade Attack
A type of attack that forces a system to downgrade its security The attacker then exploits the lesser security control
77
PKI
Filler
78
Root Certificate
A PKI certificate identifying a root CA
79
Certificate Chaining
A process that combines all certificates within a trust model It includes all the certificates in the trust chain from the root CCA down to the certificate issued to the end user
80
CSR
Certificate signing request is a method of requesting a certificate from a CA It starts by creating an RSA-based private/public key pair and then including the public key in the CSR
81
Expired
Filler
82
Certificate Not trusted
Filler
83
Improper Certificate and Key management
Filler
84
OCSP
Online Certificate Status Protocol is an alternative to using a CRL It allows entities to query a CA with the serial number of a certificate The CA answers with good, revoked, or unknown
85
Stapling
The process of appending a digitally signed OCSP response to a certificate It reduces the overall OCSP traffic sent to CA
86
Pinning
A security mechanism used by some web sites to prevent web site impersonation Web sites provide clients with a list of public key hashes Clients store the list and use it to validate the web site
87
Key Escrow
The process of placing a copy of a private key in a safe environment
88
Machine/Computer
Filler
89
User
Filler
90
Email
Filler
91
Code Signing
The process of assigning a certificate to code The certificate includes a digital signature and validates the code
92
Self-Signed
Filler
93
Wildcard
Filler
94
SAN
Filler
95
Domain Validation
Filler
96
Extended Validation
Filler
97
CER
Canonical Encoding Rules are a base format for PKI certificates They are binary encoded files Compare with DER
98
DER
Distinguished Encoding Rules are a base format for PKI certificates They are BASE64 ASCII encoded files Compare with CER
99
PEM
Privacy Enhanced Mail is a common format for PKI certificates It can use either CER (ASCII) or DER (Binary) formats and can be used for almost any type of certificates
100
P7B
PKCS#7 is a common format for PKI certificates They are DER-based (ASCII) and commonly used to share public keys
101
P12
PKCS#12 is a common format for PKI certificates They are CER-based (Binary) and often hold certificates with the private key They are commonly encrypted
102
PFX
Personal information Exchange is a common format for PKI certificates It is the predecessor to P12 certificates