CHAPTER 7 Flashcards

1
Q

Key management is critical for proper protection. The following are responsibilities that fall under the key management umbrella:

A
  • The key length should be long enough to provide the necessary level of protection.
  • Keys should be stored and transmitted by secure means.
  • Keys should be extremely random, and the algorithm should use the full spectrum of the keyspace.
  • The key’s lifetime should correspond with the sensitivity of the data it is protecting. (Less secure data may allow for a longer key lifetime, whereas more sensitive data might require a shorter key lifetime.)
  • The more the key is used, the shorter its lifetime should be.
  • Keys should be backed up or escrowed in case of emergencies.
  • Keys should be properly destroyed when their lifetime comes to an end.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This chapter presents the following:

A
  • History of cryptography
  • Cryptography components and their relationships
  • Steganography
  • Algorithm types
  • Public key infrastructure (PKI)
  • e-mail standards
  • Quantum cryptography
  • Secure protocols
  • Internet security
  • Attack types
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In reality, encryption can happen at different layers of an operating system and network stack. The following are just a few examples:

A
  • End-to-end encryption happens within the applications.
  • SSL encryption takes place at the transport layer.
  • PPTP encryption takes place at the data link layer.
  • Link encryption takes place at the data link and physical layers.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly