Chapter 7 Key Terms Flashcards

1
Q

Cryptography

A

The science and study of concealing information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cipher/Algorithm

A

The process or formula used to encrypt a message or otherwise hide the message’s meaning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Encryption key

A

A string of bits randomly generated using a specific cipher. An encryption key is used to encrypt or decrypt data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Plaintext

A

The readable form of a message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ciphertext

A

The encrypted form of a message that is readable only by those for whom the message is intended.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Encryption

A

The process of using an algorithm or cipher to transform data from cleartext to ciphertext in order to protect the confidentiality, integrity, and authenticity of the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Decryption

A

The process of converting data from ciphertext into plaintext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Steganography

A

The practice of concealing a file, message, image, or video within another file, message, image, or video.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Blockchain

A

A decentralized and distributed ledger of transactions between two or more parties. Blockchain uses cryptography to keep sensitive data secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Hybrid Cryptosystem

A

A hybrid cryptosystem combines the efficiency of symmetric encryption with the convenience of asymmetric encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Digital Signature

A

A digital signature is a combination of symmetric encryption with the convenience of asymmetric encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Hashing

A

The process of using an algorithm to convert data to a fixed-length key called a hash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Trusted Platform Module

A

TPM is a hardware chip on the motherboard that can generate and store cryptographic keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Hardware security module

A

A hardware security module (HSM) is a piece of hardware and associated software/firmware that is connected to a computer system to provide cryptographic functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Hash

A

A function that converts a variable-length string into a compressed, fixed-length value known as a message digest or hash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Hash collision

A

A hash collision occurs when two files generate the same hash.

17
Q

Rainbow table

A

A rainbow table is a table of passwords and their generated hashes.

18
Q

Encrypting File System

A

EFS provides a easy and seamless way for users to encrypt files on Windows computers. EFS is used to encrypt only individual files and folders.

19
Q

File Encryption Key (FEK)

A

A pseudo-random number used with the AES encryption algorithm to encrypt files and folders in EFS.

20
Q

Data Decryption Field (DDF)

A

A special location in a EFS encrypted file’s header that stores the FEK.

21
Q

Data Recovery Agent

A

The DRA is an account that has been granted the right to decrypt files and folders on a EFS.

22
Q

GNU Privacy Guard

A

GPG is an encryption tool that encrypts emails, digitally signs emails, and encrypts documents.

23
Q

Pretty Good Privacy

A

PGP is a commercial encryption program that is now owned by NortonLifeLock (previously Symantec). PGP is used by products that protect laptops, desktops, USB drives, optical media, and smart phones.

24
Q

BitLocker

A

BitLocker is used to encrypt an entire volume. All data on the volume is protected even if the hard drive is moved to another computer.

25
Q

Public key infrastructure

A

PKI is an environment in which public encryption keys can be created and managed throughout the key lifecycle.

26
Q

Certificate authorities

A

Certificate authorities are reputable organizations that are responsible for issuing public certificates to companies or organizations that want to securely communicate over the internet.

27
Q

X.509

A

The standard that defines the format of certificates.

28
Q

Certificate chaining

A

Certificate authorities are usually setup in a hierarchy of multiple CA’s to increase security. This structure is known as certificate chaining or the chain of trust.

29
Q

Trust model

A

A PKI uses a trust model to establish trust between two communicating entities. Depending on the number of CAs being implemented and the use, there are a few configurations that can be used to setup certificate authorities.