C836 Ch.5 continued... Flashcards
Asymmetric key cryptography?
Also known as public key cryptography, this method uses two keys: a public key and a private key.
Secure Sockets Layer (SSL) protocol ?
Uses the RSA algorithm, an asymmetric algorithm, to secure web and email traffic
Hash functions ?
Also referred to as message digests, these functions do not use a key
Hashes
These provide integrity (but not confidentiality) and are used to determine whether the message has changed
Digital signature
A method of securing a message that involves generating a hash and encrypting it using a private key
Certificate
Created to link a public key to a particular individual; used as a form of electronic identification for that person
Certificate authority (CA)
A trusted entity that handles digital certificates
Public key infrastructure (PKI)
Infrastructure that includes the CAs that issue and verify certificates and the registration authorities (RAs) that verify the identity of the individuals associated with the certificates
Certificate revocation list (CRL)
A public list that holds all the revoked certificates for a certain period of time
Data at rest
Data that is on a storage device of some kind and is not moving
Data in motion
Data that is moving over a WAN or LAN, a wireless network, over the internet, or in other ways
Data at rest
This type of data is protected using data security (encryption) and physical security
Data in motion
This type of data is best protected by protecting the data itself (using SSL, TLS) and protecting the connection (using IPsec VPN, SSL VPN)
Data in use
This type of data is the hardest to protect
Encryption
A subset of cryptography that refers specifically to the transformation of unencrypted data into its encrypted form