Chapter 14: Security Flashcards
(14 cards)
What two keys are used for Symmetric Key Cryptography encryption and decryption?
Both Private Key
What two keys are used for Asymmetric Key Cryptography encryption and decryption ?
Encry = Public
Decry = Private
What kinds of encryption algorithms are used for Symmetric Key Encrypt (Secret-Key Cryptography) ?
AES (Advanced Encryption Standard)
DES (Data Encryption Standard)
What kinds of encryption algorithms are used for Asymmetric Key Encrypt (Public-Key Cryptography) ?
RSA (Rivest-Shamir-Adleman)
ECC (Elliptic Curve Cryptography)
What is defense in depth ?
security strategy that employs multiple layers of defense to protect against threats.
What 4 methods can be used to access drop boxes ?
Web Browser
Desktop Applications
Mobile Applications
APIs
What are the three types of factors of authentication ?
Something you know - PW
Something you are - biometrics
Something you have - keycard
What type of breach is Unauthorized reading of data ?
Breach of Confidentiality
What type of breach is Unauthorized modification of data ?
Breach of Integrity
What type of breach is Unauthorized destruction of data ?
Breach of Availability
What type of breach is Unauthorized use of resources ?
Theft of Service
What type of breach is Preventing legitimate use of the system ?
Denial of Service
What are some pros and cons of symmetric key encryption ?
efficient and fast but requires secure management of the key
What are some pros and cons of asymmetric key encryption ?
enhances security by eliminating the need for key exchange but is slower