Encryption/Decryption Flashcards

(42 cards)

1
Q

Encryption

A

Taking a message and disguising it, where the sender and the receiver are the only ones who can decipher it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Decryption

A

A message being converted from encrypted to the normal message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cipher

A

A disguised message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Plain Alphabet

A

The regular alphabet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Plain message

A

Original message with no encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cipher Alphabet (Shifted Alphabet)

A

The alphabet that replaces the normal alphabet in the plain message to create the Cipher message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cipher message

A

The plain message that is encrypted with the Cipher Alphabet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Key

A

A piece of information the sender and receiver share, to do the algorithm, to figure out the plain message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Substitution Cipher

A

Substitution the normal alphabet with cipher alphabet with a different letter.
Ex. R -> Q, A->C, F->P

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Caesar Cipher

A

Type of Cipher alphabet where the plain Alphabet is shifted down a certain number of units to create a Cipher Alphabet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Random Substitution Cipher

A

Cipher alphabet with no pattern(randomly mixed, no shift)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Frequency Analysis

A

Analyzing the frequency of letters in a cipher message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Key exchange problem

A

A problem that occurs when two people send two keys and a message that gets intercepted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Symmetric encryption

A

Encryption that uses the SAME KEY to encrypt and decrypt the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Public Key Encryption (asymmetric)

A

When the sender and receiver BOTH HAVE A PRIVATE KEY and PUBLIC KEY, both helping the decrypt and encrypt the message. If the sender uses the reciever’s public key to encrypt the message, the recipient’s private key is needed to decrpyt the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Public Key

A

A key that is sent to the receiver, but is available to the public and can be viewed by everyone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Private Key

A

A key kept to yourself.

18
Q

RSA encryption

A

Encryption similar to public key exchange, but both the public and private key (only 2 keys) can encrypt the message, but the opposite is needed to decrypt it. If B encrypts the message using A’s public key, than A’s private key is needed to decrypt it.

19
Q

Unreasonable problem

A

A problem that’s unreasonable and isn’t necessary.

20
Q

AES encryption

A

A symmetric block cipher used by the US government to protect classified information, using 128, 192, and 256 bit keys to create the cipher and cipher text.

21
Q

Protocol

A

A set of instructions or rules someone/something follows to complete a certain task(similar to an algorithm).

22
Q

Digital Certificate

A

Certificates/ confirms the AUTHORITY AND IDENTITY of a website, individual, organization, user, device or server. Also validates the OWNERSHIP OF ENCRYPTION KEYS.

23
Q

Certificate Authority (CA)

A

They issue digital certificates that validate ownership of encryption keys used in secure communications. They are based on a trust model.

24
Q

SSL (secure sockets layer)

A

The protocol used for digital certificates.

25
HTTP
Hypertext Transfer Protocol. a protocol for a browser that is used in a browser or website to exchange information.
26
HTTPS
Hypertext Transfer Protocol Secure. A combination of HTTP and SSL or transport layer security (TLS).
27
Open Standards
Standards/Rules anyone can use to make a product. They define how technology and devices are developed and made.
28
Malware
A type of software that is used to mainly harm a computer.
29
Scam
A deceptive act where the victim is tricked into giving their money or something valuable.
30
Phishing
A type of scam that is centered around stealing your money, identity, or personal information.
31
Whaling
Phishing targeting people with a position of power (CEO of a company, ect.)
32
Mass Scaling Phishing
Multiple attacks of Phishing at the same time.
33
Vishing (Voice Phishing)
Phishing done through phone calls.
34
Smishing (SMS Phishing)
Phishing done through text, or SMS messages.
35
Social media Phishing
Phishing done through social media, apps, and other platforms.
36
Multi-Factor Authentication
A Security Method that makes people provide more than one form of authentication/ identification.
37
Virus
A type of malware and malicious program that copies itself to spread and gain access to computers through an unauthorized way.
38
Keylogging
A form of malware/hardware that records eye keystrokes and is used to monitor actions. It takes the information and sends it to a hacker through a command and control (C&C) server.
39
Rogue access point
A wireless access point that is connected to a network without the owners permission.
40
Packet Sniffing
Data (typically packets) sent over public networks that are intercepted, analyzed, and/or modified.
41
PII (Personally Identifiable Information)
Information that is used to identify someone. Examples: SSN, age, race, phone number, medical and financial information
42
Rogue Access Point
An access point installed on a network without the network owner's permission.