Cryptography Flashcards

1
Q

cyber security

A

refers to preventative methods used to protect information from being stolen, company, attacked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Encryption

A

Is used to convert data into cypher text that can not be deciphered by people without the encryption key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Symmetric encryption

A

Process of decryption is simply the opposite of the process used to encrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Advantages/ Disadvantages of symmetric encryption

A

They are easy to execute

With Modern computers, they are easy to crack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Asymmetric encryption

A

If someone knows the encryption key, they can encrypt information but not decrypt it. They are almost impossible to crack. It is also known as a public key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

advantage/disadvantage of Asymmetric key

A

It is hard to decrypt from an outside source.

It is much harder to use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Biometrics

A

using the body as a method of gaining access to computing systems uses human measurements and metrics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Example of Biometric

A

smartphones have fingerprints scanners

Biometric passports use a combination of facial recognition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Advantage of biometric

A

It is very difficult to replicate the data
It is more Secure
Speed up conventional queueing systems
Your biometrics cannot be lost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Disadvantages of biometric

A

Biometrics are not always 100% accurate
Privacy concerns
People change over time due to aging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

White hat hackers

A

uses their skills to break into a system to expose flaws and then advise on how they can be fixed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Grey hat hackers

A

They are white hat hackers who are not directly hired by a company but perform penetration testing anyway to expose flaws.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Black hat hackers

A

They break into systems for their own purposes. This could be for financial gain, political motivation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Virus

A

A software which will attempt to spread over the network by infecting email, removable storage devices or known software vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Trojans

A

They are hidden in files or programs. when the files are opened, it will activate, delivering its payload. Tricking users into downloading unknown files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Spyware

A

This will track key presses and software use, details of which are then sent back to the hacker. This is used for identity fraud

17
Q

Scare-ware

A

will try and scare the user into buying fake or further malicious software. it will pop up messages suggesting that your system is compromised and their software can fix the problem at a price.

18
Q

ransom-ware

A