Chapter 7 Flashcards

Cryptography and the PKI

1
Q

Cryptography

A

The practice of encoding information in a manner that it cannot be decoded without access to the required decryption key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the four common goals of Cryptography?

A

Two stem from the CIA Triad and the other two do not:

  1. Confidentiality
  2. Integrity
  3. Authorization
  4. Non-Repudiation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cipher

A

A method used to scramble or obfuscate characters to their value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Substitution Cipher

A

A type of coding or ciphering system that changes one character or symbol into another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Transposition Cipher

A

Transposing or scrambling the letters in a certain manner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Steganography

A

The art of using cryptographic techniques to embed secret messages within another file. Like hiding messages in images.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Symmetric Cryptosystems

A

Use a shared secret key available to all users of the cryptosystem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Asymmetric Cryptosystems

*keys

A

Uses individual combinations of public and private keys for each user of the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the most common way to protect network communications using sensitive data?

A

With the (TLS) Transport Layer Security Protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Full Disk Encryption (FDE)

A

A form of encryption where all data on a hard drive is automatically encrypted, including the operating system and system files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Partition Encryption

A

Similar to FDE but targets a specific partition of a hard drive instead of the entire disk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

File-Level Encryption

A

This method allows users to encrypt specific files rather than entire drives or partitions. Not as secure as FDE or partition encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Volume Encryption

A

Involves encrypting a set “volume” on a storage device, which could contain several folders and files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Database Encryption

A

A method used to protect sensitive information stored in a database from access by unauthorized individuals. There are two types: TDE and CLE.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Transparent Data Encryption (TDE)

A

Encrypts entire databases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Column-Level Encryption (CLE)

A

Allows specific columns within tables to be encrypted.

17
Q

Record-Level Encryption

A

It allows individual records within a database to be encrypted.

18
Q

Cryptographic Keys

A

Nothing more than a number, usually a very large binary number.

19
Q

Key Space

A

The range of values that are valid for use as a key for a specific algorithm.

20
Q

Key Length

A

The number of binary bits (0s and 1s) in the key.

21
Q

Key Exchange

A

The secure distribution of the secret keys required to operate the algorithms. The three main methods are offline distribution, public key encryption, and the Diffie–Hellman key exchange algorithm

22
Q

Kerckhoffs’ Principle

A

Also known as Kerckhoffs’ assumption, is that a cryptographic system should be secure even if everything about the system, except the key, is public knowledge. The principle is basically: The enemy knows the system.

23
Q

Cryptanalysis

A

The study of methods to defeat codes and ciphers.

24
Q

Key Management Practices

A

The security measures taken by cryptosystem users and
administrators to protect the security of the keying material.