Chapter 7 Securing the basic lan Flashcards
What is encryption?
Encryption is the science of converting human-readable data into something unreadable and then back again to secure communications.
What is symmetric cryptography?
Symmetric cryptography is a type of cryptography where the same key is used for both encryption and decryption.
What is the primary purpose of cryptography?
The primary purpose of cryptography is to protect data.
What constitutes data in the context of IT?
Data includes anything stored digitally, such as photographs, text messages, phone conversations, or interactions with a web server.
What is data at rest?
Data at rest refers to data stored on mass storage devices like hard drives, SSDs, or optical media, without being accessed or processed.
What is an example of data at rest?
An example of data at rest is a MySQL database storing personal information on a hard drive.
What is data in use or data in computation?
Data in use or data in computation is data being actively accessed and processed by software, typically residing in RAM.
What is a potential risk with data in use?
A risk with data in use is that it can often be unencrypted while in RAM, making it vulnerable to attacks like shoulder surfing or keylogging.
What is data in transit?
Data in transit is data moving through networks, such as over a local area network (LAN), wireless network, or the internet.
What is sniffing in the context of data in transit?
Sniffing is the act of intercepting and capturing data as it moves between two points on a network.
What is a man-in-the-middle attack?
A man-in-the-middle attack is when an attacker intercepts and potentially alters data being transmitted between two parties without their knowledge.
Why are wireless networks attractive to hackers?
Wireless networks are attractive to hackers because data in transit is broadcast through the air, making it easier to intercept and sniff.
What are the three types of data discussed in the Security+ exam?
The three types of data are data at rest, data in use, and data in transit.
What is symmetric encryption?
Symmetric encryption is a method where the same key is used for both encryption and decryption of data.
What is a session key in symmetric encryption?
A session key is a temporary key used for a single encryption and decryption session between two parties.
What is the main problem with symmetric encryption?
The main problem with symmetric encryption is securely transmitting the key between parties.
What are in-band and out-of-band key exchanges?
In-band key exchange involves sending the key with the encrypted data, which is risky. Out-of-band key exchange involves transmitting the key through a separate, secure channel.
What is an ephemeral key?
An ephemeral key is a temporary key used only for a single session and then discarded, providing perfect forward secrecy.
What is perfect forward secrecy?
Perfect forward secrecy ensures that a compromised key from a past session cannot be used to decrypt data from a current session.
What is asymmetric encryption?
Asymmetric encryption uses a pair of keys—one public and one private. The public key is used for encryption, and the private key is used for decryption.
How does asymmetric encryption solve the key exchange problem in symmetric encryption?
In asymmetric encryption, the public key is shared freely to encrypt data, and only the holder of the private key can decrypt it, eliminating the need to securely transmit the key.
What is a key pair in asymmetric encryption?
A key pair consists of a public key (used for encryption) and a private key (used for decryption).
Why is asymmetric encryption considered slower and more complex than symmetric encryption?
Asymmetric encryption is slower and more complex because it requires key pair generation, key exchange, and management of multiple keys.
What is a cryptosystem?
A cryptosystem is a well-defined process in cryptography that outlines how algorithms and keys are used to secure communications in IT systems.