Chapter 4 Flashcards

(32 cards)

1
Q

Public key

A

Used for encryption and validation of digital signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Private key

A

Used for decryption and digital signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Encryption

A

Changing plaintext to cyphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Level

A

The scope or layer at which encryption is applied

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Asymmetric encryption

A

Uses two keys, a private key and a public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Symmetric encryption

A

Uses one key and encrypts a large amount of data using block cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Key exchange

A

Delivers cryptographic keys from a sender to receiver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Key length

A

The length of cryptographic keys impacts resistance against attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Tools

A

The hardware and software solutions applied to encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Trusted platform module (TPM)

A

A TPM ensures the integrity of the system boot process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Hardware security module (HSM)

A

A highly secure environment for the storage of cryptographic keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Key management system

A

Software solution used to create, manage and store cryptographic keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Secure enclave

A

Used to protect user data, biometric information and cryptographic keys from potential software-based attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Obfuscation

A

Deliberately obscuring code that makes it difficult for the attacker to understand it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Steganography

A

Hiding data inside data, image or audio files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Tokenization

A

Transforming sensitive data into unique tokens that hold no inherent value

17
Q

Data masking

A

Disguising sensitive data by replacing original values with fictitious ones

18
Q

Hashing

A

Used for data integrity and password security

19
Q

Salting

A

Adding random values to a credential

20
Q

Digital signatures

A

Ensures the authenticity, integrity and non-repudiation of a document

21
Q

Key stretching

A

A cryptographic technique designed to transform a password into a longer, more complex key

22
Q

Blockchain

A

A decentralized digital ledger for secure transaction

23
Q

Open public ledger

A

A shared transparent record accessible to all for verifying transactions

24
Q

Certificates

A

Mechanisms that underpin secure digital interactions

25
Certificate authorities (CA)
Trusted entities issuing and verifying digital certificates for secure online communication
26
Certificate revocation lists (CRLs)
Catalogs of invalidated digital certificates, ensuring security
27
Online certificate status protocol (OCSP)
Real-time checks of digital certificate validity
28
Self-signed certificate
A self-generated digital certificate lacking third-party validation, for internal use only
29
Third party certificate
Public-facing certificates issued by external entities to verify the authenticity of data
30
Root of trust
Verify its authenticity by checking the certificates chain of trust
31
Certificate signing request (CSR)
A new certificate request
32
Wildcard certificate
A single certificate securing multiple servers using the same domain name