Misc Flashcards

(13 cards)

1
Q

Footprinting

A

Footprinting includes going through the target organization’s official websites and social media, performing dumpster diving, searching sources for employees’ names, email addresses, and IDs, going through a tour of the organization, and other kinds of onsite observation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Watering Hole

A

A watering hole attack is when an attacker targets a website that’s commonly visited by a specific group (like employees of a certain company or industry), infects it with malware, and waits for the victims to come to them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Plaintext (or cleartext)

A

an unencrypted message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ciphertext

A

an encrypted message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Algorithm

A

the process used to encrypt and decrypt a message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cryptanalysis

A

the art of cracking cryptographic systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Encryption keys

A

Encryption keys are used to encrypt and decrypt data.

Symmetric encryption uses the same key to encrypt and decrypt data.

Asymmetric encryption uses one key to encrypt the data and a different key to decrypt the data. These keys are known as a public key and private key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Hashing

A

Hashing is the process of converting one value into another using a mathematical algorithm like MD5 or SHA.

Hashing is used on data that does not need to be decrypted, such as passwords.

When a piece of data is run through a hashing algorithm, it always generates the same hash. If even one letter in a file has been altered, the resulting hash would be different. Because of this, hashing can be used to verify that data has not been altered during transmission.

A hash cannot be decrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Salt

A

Salt, or salting the hash, means that a random number of characters are added to the password before the hash is created.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Digital signatures

A

By combining a user’s private encryption key and a hash of the data, a user can create a digital signature. A digital signature verifies that the data is legitimate and provides non-repudiation. This means that the sender cannot deny having sent the file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Elliptic Curve Cryptography (ECC)

A

Elliptic Curve Cryptography is one of the newer methods being implemented. ECC can generate smaller keys that are more secure than most other methods. Many websites today use ECC to secure connections and data transmissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Perfect Forward Secrecy

A

This cryptography method is used quite often in messaging apps. Instead of the same key being used for an entire conversation or session on a website, each transmission is encrypted with a different unique key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Steganography

A

Steganography is the technique of hiding or concealing a file, message, image, or video within another file, message, image, or video. Special programs are often used to hide messages in media files. If a hacker intercepts the message, all they see is the media. They don’t know that there is a hidden message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly