Deployment, Cryptography, and AI Flashcards

(5 cards)

1
Q

Secure Installation Practices

A

Use HTTPS for file downloads and updates
Environment isolation (e.g., dev/test/prod separation)
Database hardening: remove default creds, enforce permissions
Set least privilege access control
Ensure compliance (e.g., GDPR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Confidentiality & Integrity via Cryptography

A

Confidentiality: Use encryption (AES, RSA) to protect data in transit and storage
Integrity: Use hashing (SHA-256) to ensure data hasn’t changed
Examples:
Encrypted messaging app (confidentiality)
File checksum verification (integrity)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Sandboxing & Cryptography

A

Sandboxing: Runs code in isolated environment to prevent system-wide damage
Cryptography: Secures communication and storage (encryption + hashing)
Examples:
Browser sandboxing tabs
TLS in banking websites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Proactive vs Reactive Security

A

Proactive: Prevent attacks (firewalls, secure coding, training)
Reactive: Respond after attack (incident response, patching)
Comparison:
Proactive: ✅ Safer, ❌ Higher upfront cost
Reactive: ✅ Cheaper upfront, ❌ More damage control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Audit Trails and Logging

A

Audit Trails: Records of actions in system (who did what)
Logs: Data about events and errors
Importance:
Detect intrusions
Aid in debugging
Ensure accountability
Support compliance (e.g., PCI-DSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly