Chapter 14: Security Flashcards
What two keys are used for Symmetric Key Cryptography encryption and decryption?
Both Private Key
What two keys are used for Asymmetric Key Cryptography encryption and decryption ?
Encry = Public
Decry = Private
What kinds of encryption algorithms are used for Symmetric Key Encrypt (Secret-Key Cryptography) ?
AES (Advanced Encryption Standard)
DES (Data Encryption Standard)
What kinds of encryption algorithms are used for Asymmetric Key Encrypt (Public-Key Cryptography) ?
RSA (Rivest-Shamir-Adleman)
ECC (Elliptic Curve Cryptography)
What is defense in depth ?
security strategy that employs multiple layers of defense to protect against threats.
What 4 methods can be used to access drop boxes ?
Web Browser
Desktop Applications
Mobile Applications
APIs
What are the three types of factors of authentication ?
Something you know - PW
Something you are - biometrics
Something you have - keycard
What type of breach is Unauthorized reading of data ?
Breach of Confidentiality
What type of breach is Unauthorized modification of data ?
Breach of Integrity
What type of breach is Unauthorized destruction of data ?
Breach of Availability
What type of breach is Unauthorized use of resources ?
Theft of Service
What type of breach is Preventing legitimate use of the system ?
Denial of Service
What are some pros and cons of symmetric key encryption ?
efficient and fast but requires secure management of the key
What are some pros and cons of asymmetric key encryption ?
enhances security by eliminating the need for key exchange but is slower