1.4-2.2 Flashcards
hsm
hardware security module. high end cryptographic hardware, stores thousands of crypto keys. used for multiple devices or in large environments.
key management system
on premises or cloud based. manage from a centralized manager(third party software) all key from one console.
secure enclave
the tpm for mobile devices. does all encryption and other security features.
obfuscation
process of making something unclear. how receipts only give last 4 of credit card
steganography
concealed writing. message is invisible. invisible watermarks
audio steganography
modify the digital audio file, secret message within the audio.
video steganograpy
a sequence of images, use image steganography on a larger scale.
tokenization
replace sensitive data with a non sensitive placeholder. ssn 111-12-1111 is now 235-45-4581
data masking
data obfuscation, may only be hidden from view, control the view based on permissions.
collision
different inputs create same hash
salting
random data added to a password when hashing.
blockchain
a distributed ledger, keep track of transactions with inherent security options.
Open public ledger
A public ledger is an open-access network; anyone can join at any time. The public ledger is fully decentralized, and no single entity controls the blockchain network.
self signed
Internal certificates don’t need to be signed by public CA. Build your own CA.
root of trust
inherently trusted component. trusted from someones elses.