Deployment, Cryptography, and AI Flashcards
(5 cards)
Secure Installation Practices
Use HTTPS for file downloads and updates
Environment isolation (e.g., dev/test/prod separation)
Database hardening: remove default creds, enforce permissions
Set least privilege access control
Ensure compliance (e.g., GDPR)
Confidentiality & Integrity via Cryptography
Confidentiality: Use encryption (AES, RSA) to protect data in transit and storage
Integrity: Use hashing (SHA-256) to ensure data hasn’t changed
Examples:
Encrypted messaging app (confidentiality)
File checksum verification (integrity)
Sandboxing & Cryptography
Sandboxing: Runs code in isolated environment to prevent system-wide damage
Cryptography: Secures communication and storage (encryption + hashing)
Examples:
Browser sandboxing tabs
TLS in banking websites
Proactive vs Reactive Security
Proactive: Prevent attacks (firewalls, secure coding, training)
Reactive: Respond after attack (incident response, patching)
Comparison:
Proactive: ✅ Safer, ❌ Higher upfront cost
Reactive: ✅ Cheaper upfront, ❌ More damage control
Audit Trails and Logging
Audit Trails: Records of actions in system (who did what)
Logs: Data about events and errors
Importance:
Detect intrusions
Aid in debugging
Ensure accountability
Support compliance (e.g., PCI-DSS)