Security and Cryptography Flashcards
(55 cards)
What is symmetric-key cryptography?
Both the sender and receiver share a single key for encryption and decryption.
What is public-key cryptography?
Uses two related keys: a public key for encryption and a private key for decryption.
What are hash functions?
Algorithms that compute a fixed-length hash value from plaintext, making it impossible to recover the original content.
List the three types of cryptographic techniques used in general.
- Symmetric-key cryptography
- Hash functions
- Public-key cryptography
Why is data security important?
Protects valuable data from corruption and unauthorized access, preventing financial loss and reputation damage.
What is authentication in data security?
Verifies if a user’s credentials match those stored in a database.
What technologies are included in standard authentication processes?
- Passwords
- PINs
- Security tokens
- Swipe cards
- Biometrics
What is access control?
The process of determining what an authenticated user is allowed to do or see.
List the types of access control systems.
- Discretionary access control
- Role-based access control
- Mandatory access control
What is the purpose of backups in data security?
To access data in the event of system failure, disaster, or data corruption.
What is data security?
The practice and technology of protecting sensitive company and customer data.
What is a Virtual Private Network (VPN)?
Creates a secure connection to a network from another endpoint, encrypting data between the two points.
What do stateful multilayer inspection (SMLI) firewalls do?
Filter packets at multiple layers and ensure communication is only with trusted sources.
What is the main difference between packet-filtering firewalls and stateful firewalls?
Stateful firewalls remember information about previously passed packets, while packet-filtering firewalls do not.
What are next-generation firewalls (NGFW)?
Combine traditional firewall technology with additional functionalities such as intrusion prevention and deep packet inspection.
What is a proxy firewall?
Acts as an intermediary that filters network traffic at the application level based on security rules.
What is the function of NAT firewalls?
Allow multiple devices to connect to the internet using a single IP address, enhancing security.
What is data encryption?
Transforms normal text into unreadable ciphertext using an algorithm and an encryption key.
What is data masking?
Hides data by obscuring it with proxy characters, revealing the original only to authorized users.
What is tokenization?
Substitutes sensitive data with random characters that are not algorithmically reversible.
What is symmetric key cryptography?
An encryption system where the sender and receiver share a common key.
What is a transposition cipher?
An encryption method that shifts the positions of plaintext units according to a system.
What is a substitution cipher?
An encryption method where plaintext units are replaced with ciphertext according to a fixed system.