Comptia+ Chapter 3 Flashcards
Steganography
Hiding the existence of data within another type of file
Metadata
Data that is used to describe the content or structure of the actual data
Data masking
Creating a copy of the original data and making it unintelligible
Tokenization
Obscures sensitive data elements into a random string of characters
Cryptography
Practice of transforming information so that it is secure and cannot be understood by unauthorized persons
Encryption
The process of changing plaintext into ciphertext
Decryption
Process of changing encrypted text into original text
Algorithm (cipher)
Set of procedures based on a mathematical formula used to encrypt and decrypt data
Mitigation
Reducing the vulnerability or severity
Hardening
Making a system more resilient to attacks
Nonrepudiation
Process of proving that a user performed an action
Obfuscation
Making something obscure or unclear
Hashing
Process of creating a digital fingerprint that protects the integrity of data proving it has not been altered
Symmetric cryptographic algorithms
Encryption that uses a single key to encrypt and decrypt a message, also called private key cryptography
Asymmetric cryptography algorithms
Cryptography that uses two mathematically related keys, also public key to encrypt and a private key to decrypt, also know as public key cryptography
Digital signature
Electronic verification of the sender
Key exchange
The process of sending and receiving secure cryptographic keys
Blockchain
A shared, immutable ledger that facilitates the process of recording transactions and tracking assets in a business network
Collision
When two files have the same hash
Collision attack
Attempt to find two input strings of a has function that produce the same hash result