Application of Cryptography Flashcards

1
Q

Uses for cryptography

A

The settings where encryption is often used are:
- Files and directories
- Entire disks and volumes
- E-mail
- Web browsing
- Web services
- Remote network access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

File Encryption

A

Encryption is one form of access control that can be used to determine who is permitted to access files. When a file—even when it is present on a public file server— is encrypted, only individuals who possess the encryption key can access its contents. File encryption can also be used to protect the contents of a file when it is transmitted over a public network by e-mail or FTP.

Tools used to encrypt files and directories include:
- EFS Encryption File System
- PCP Pretty Good Privacy
- GPG Gnu Privacy Guard
- WInZip
- Crypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Disk Encryption

A

An entire hard disk or volume (a logical subset of a hard disk) can be
encrypted. Tools available for encrypting an entire volume include:
- PGP
- S/Mime
- PEM Privacy-Enhanced Mail
- MOSS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Secure Point-to-Point communcations

A

Encryption can be used to protect communications between any two systems—two servers, two workstations, or a workstation and a server, for instance. Some of the technologies available are:
- SSH Secure Shell
- IPsec
- SSL/TLS Secure Socket layer / Transport layer Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Web Browser Security

A

Web browsers are client programs that access web-based applications in an organization or across the Internet. Web browsers communicate with web servers using the HyperText Transfer Protocol (HTTP) in either a secured or non-secured mode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Web Services Security

A

Web services is the name for machine-to-machine communications that can take place within a distributed application or a client-server application. Web
services are built upon the same HTTP/HTTPS protocols used by web browsers, but structured for non-interactive communications.
In e-commerce applications (that is, any web-based application in which sensitive information is displayed or exchanged such as banking, credit card, and personal information such as address, social security, and other identifying numbers), most or all data transmitted between the application and the user’s browser will be encrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

VPN

A

A virtual private network (VPN) is a logical network connection between two points. All network traffic in a VPN connection is encapsulated in a “tunnel,” and the traffic is usually (but not necessarily) encrypted, thereby protecting the contents of the traffic from disclosure to eavesdroppers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly