Encrypting Data 1.4 Flashcards

1
Q

What is DATA AT REST?

A
  • Data stored on a storage device which can include SSD, hard drive, USB drive, or a cloud storage.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the purpose of an ENCRYPTED FILE SYSTEM?

A
  • A security feature of Windows.
  • Enables transparent encryption/decryption of files on the system.
  • Enabled under the attributes menu.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the purpose of TRANSPARENT ENCRYPTION?

A
  • Used to encrypt database information with a symmetric key.
  • Encrypts or decrypts data each time it is pulled from the data base.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does RECORD LEVEL ENCRYPTION encrypt data on the database?

A
  • Encrypts individual columns.
  • Use separate symmetric keys for each column.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is TRANSPORT ENCRYPTION?

A
  • Protecting data transversing the network.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How is TRANSPORT ENCRYPTION accomplished?

A
  • HTTPS encrypt data being transported through browser applications.
  • VPN encrypts all data transmitted over the network.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the purpose an ENCRYPTION ALGORITHM?

A
  • A formula used on both sides to provide the encryption process and a way to decrypt the data on the other side.
  • Hidden from end users.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe the importance of keep the PRIVATE KEY private?

A
  • The cryptographic process is a widely known process, however, the only way to gain access to a system using a cryptographic process is by knowing the private key.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does KEY LENGTHS address brute force attacks?

A
  • Creating keys that are larger increasing the amount of permutations an attacker must go through.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe an SYMMETRIC ENCRYPTION

A
  • A very common key
  • 128 bit or larger
  • Will increase as time goes on
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Describe an ASYMMETRIC ENCRYPTION

A
  • Complex calculations of prime numbers
  • Larger keys than symmetric encryption
  • Common to see key lengths of 3, 072 bits or larger
How well did you know this?
1
Not at all
2
3
4
5
Perfectly