Domain 3 Flash Cards

1
Q

Algorithm

A

A mathematical function that is used in the encryption and decryption processes. A mathmatical function that is used in the encryption and decryption process; can be simply or very complex; also defined as a set of instructions by which encryption and decryption is done.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Asymmetric / Public key
Cryptography

A

It is a cryptographic system which uses pairs of keys: public keys (which may be known to others), and private keys (which may never be known by any except the owner).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Availability

A

Ensuring timely and reliable access to and use of information by authorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Advanced Encryption Standard (AES)

A

uses the Rijndael algorithm and is the US gov standard for the secure exchange of sensitive but unclassified data; it uses key lengths of 128, 192, and 256 bits, and a fixed block size of 128 bits, achieving a higher level of security than the older DES algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Argon2

A

a secure key derivation and password hashing algorithm designed to protect against brute-force and side-channel attacks; it was the winner of the Password Hashing Competition in 2015 and is considered highly secure and efficient, especially for systems requiring robust password protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Address space layout randomization (ASLR)

A

is a memory-protection process for operating systems (OSes) that guards against buffer-overflow attacks by randomizing the location where system executables are loaded into memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Block Mode Encryption

A

using fixed-length sequences of input plaintext symbols as the unit of encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Block ciphers

A

take a number of bits and encrypt them in a single unit, padding the plaintext to achieve a multiple of the block size; the Advanced Encryption Standard (AES) algorithm uses 128-bit blocks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Certificate authority
(CA)

A

An entity trusted by one or more users as an authority in a network that issues, revokes, and manages digital certificates to bind individuals and entities to their public keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CIA/AIC Triad

A

Security model with the three security concepts of confidentiality, integrity, and availability make up it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Ciphertext

A

The encrypted form of a plaintext message, so as to be unreadable for anyone except the intended recipients. Something that has been turned into a secret.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Confidentiality

A

Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Confusion

A

Provided by mixing (changing) the key values used during the repeated rounds of encryption. When the key is modified for each round, it provides added complexity that the attacker would encounter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Cryptanalysis

A

The study of techniques for attempting to defeat cryptographic techniques and, more generally, information security services provided through cryptography. It is the process of transforming or decoding communications from non-readable to readable format without having access to the real key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cryptology

A

The science that deals with hidden, disguised, or encrypted communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Cryptography

A

Secret writing. Today provides the ability to achieve confidentiality, integrity, authenticity, non-repudiation, and access control. study of/application of methods to secure the meaning and content of messages, files etc by disguise, obscuration, or other transformations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Ciphers

A

always meant to hide the true meaning of a message; types include transposition, substitution, stream, and block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Cleartext

A

any information that is unencrypted, although it might be in an encoded form that is not easily human-readable (such as base64 encoding)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Codes

A

cryptographic systems of symbols that operate on words or phrases and are sometimes secret, but don’t always provide confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Collision

A

occurs when a hash function generates the same output for different inputs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Cryptographic Hash function

A

process or function that transforms an input plaintext into a unique value called a hash (or hash value); note that they do not use cryptographic algorithms, as hashes are one-way functions where it’s infeasible to determine the plaintext; Message digests are an example of cryptographic hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Cryptosystem

A

complete set of hardware, software, communications elements and procedures that allow parties to communicate, store or use info protected by cryptographic means; includes algroithm, key, and key management functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Cryptovariables(s)

A

parameters associated with a particular cryptogrphic algorithm; e.g. block size, key length and number of iterations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Cyber-physical systems

A

systems that use ‘computational means’ to control physical devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Decryption

A

The reverse process from encryption. It is the process of converting a ciphertext message back into plaintext through the use of the cryptographic algorithm and the appropriate key that was used to do the original encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Diffusion

A

Provided by mixing up the location of the plaintext throughout the ciphertext. The strongest algorithms exhibit a high degree of confusion and diffusion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Digital certificate

A

An electronic document that contains the name of an organization or individual, the business address, the digital signature of the certificate authority issuing the certificate, the certificate holder’s public key, a serial number, and the expiration date

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Decoding

A

The reverse process from encoding - converting the encoded message back into its plaintext format.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Digital Certificate

A

An electronic document that contains the name of an organization or individual, the business address, the digital signature of the certificate authority issuing the certificate, the certificate holder’s public key, a serial number, and the expiration date

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Digital rights management
(DRM)

A

A broad range of technologies that grant control and protection to content providers over their own digital media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Digital Signatures

A

Provide authentication of a sender and integrity of a sender’s message and non-repudiation services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Encoding

A

The action of putting a message or text onto a medium. Encoding into ASCII, UTF, Base 64 etc.
action of changing a message or set of info into another format through the use of code; unlike encryption, encoded info can still be read by anyone with knowledge of the encoding process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Encryption

A

The process of converting the message from its plaintext to ciphertext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Elliptic-curve cryptography (ECC)

A

a newer mainstream algorithm, is normally 256 bits in length (a 256-bit ECC key is equivalent to a 3072-bit RSA key), making it securer and able to offer stronger anti-attack capabilities

35
Q

Fog computing

A

advanced computational architecture often used as an element in IIoT; it relies on sensors, IoT devices, or edge computing devices to collect data, then transfers it back to a central location for processing (centralizing processing and intelligence)

36
Q

Frequency analysis

A

form of cryptanalysis that uses frequency of occurrence of letters, words or symbols in the ciphertext as a way of reducing the search space

37
Q

Hash function

A

Accepts an input message of any length and generates, through a one-way operation, a fixed-length output called a message digest or hash.

38
Q

Hybrid encryption system

A

a system that uses both symmetric and asymmetric encryption

39
Q

Initialization vector (IV)

A

A non-secret binary vector used as the initializing input algorithm, or a random starting point, for the encryption of a plaintext block sequence to increase security by introducing additional cryptographic variance and to synchronize cryptographic equipment. also sometimes called a nonce or a seed value

40
Q

Integrity

A

Guarding against improper information modification or destruction and includes ensuring information non-repudiation and authenticity.

41
Q

International Data Encryption Algorithm (IDEA)

A

is a form of symmetric key block cipher encryption that uses a 128-bit key and operates on 64-bit blocks; it encrypts a 64-bit block of plaintext into a 64-bit block of ciphertext, and the input plaintext block is divided into four subblocks of 16 bits each

42
Q

Key or crypto variable

A

The input that controls the operation of the cryptographic algorithm. It determines the behavior of the algorithm and permits the reliable encryption and decryption of the message.

43
Q

Key clustering

A

When different encryption keys generate the same ciphertext from the same plaintext message.

44
Q

Key length

A

The size of a key, usually measured in bits, that a cryptographic algorithm uses in ciphering or deciphering protected information.

45
Q

Key pair

A

matching set of one public and one private key

46
Q

Key escrow

A

process by which keys (asymmetric or symmetric) are placed in a trusted storage agent’s custody, for later retrieval

47
Q

Key generation

A

the process of creating a new encryption/decryption key

48
Q

Key recovery

A

process of reconstructing an encryption key from the cyphertext alone; if there is a workable key recovery system, it means the algorithm is not secure

49
Q

Key space

A

represents the total number of possible values of keys in a cryptographic algorithm or password; keyspace = 2 to the power of the number of bits, so 4 bits = 16 keys, 8 bits = 256 keys

50
Q

Message authentication
code (MAC)

A

A small block of data that is generated using a secret key and then appended to the message, used to address integrity, also provides authenticity

51
Q

Message digest

A

A small representation of a larger message.
are used to ensure the authentication and integrity of information, not the confidentiality.

52
Q

Meet-in-the-middle

A

attack that uses a known plaintext message and both encryption of the plaintext and decryption of the ciphertext simultaneously in a brute-force manner to identify the encryption key; 2DES is vulnerable to this attack

53
Q

Microcontroller

A

similar to system on a chip (SoC), consists of a CPU, memory, IO devices, and non-volatile storage (e.g. flash or ROM/PROM/EEPROM); think Raspberry Pi or Arduino

54
Q

Mobile device deployment models

A

cover allowing or providing mobile devices for employees include: BYOD, COPE, CYOD, and COMS/COBO; also consider VDI and VMI options;

55
Q

Mobile device deployment policies

A

should address things like data ownership, support ownership, patch and update management, security product management, forensics, privacy, on/offboarding, adherence to corporate policies, user acceptance, legal concerns, acceptable use policies, camera/video, microphone, Wi-Fi Direct, tethering and hotspots, contactless payment methods, and infrastructure considerations

56
Q

Multistate systems

A

certified to handle data from different security classifications simultaneously

57
Q

Nonrepudiation

A

Inability to deny. In cryptography, a service that ensures the sender cannot deny a message was sent and the integrity of the message is intact, and the receiver cannot claim receiving a different message.

58
Q

Null cipher

A

Hiding plaintext within other plaintext. A form of steganography.

59
Q

One-time pad

A

series of randomly generated symmetric encryption keys, each one to be used only once by the sender and recipient; to be successful, the key must be generated randomly without any known pattern; the key must be at least as long as the message to be encrypted; the pads must be protected against physical disclosure and each pad must be used only one time, then discarded

60
Q

Out-of-band

A

transmitting or sharing control information (e.g. encryption keys and crypto variables) by means of a separate and distinct communications path, channel, or system

61
Q

Plaintext

A

The message in its natural format has not been turned into a secret. message or data in its readable form, not turned into a secret

62
Q

Password-Based Key Derivation Function 2 (PBKDF2)

A

securely derives cryptographic keys from passwords; by applying salting and key stretching (through multiple hashing iterations), it transforms a password into a cryptographic key that can be used for encrypting data or securely storing passwords; this process makes it much harder for attackers to guess or brute-force the password, as it increases the computational work required to test each possible password, improving resistance against attacks

63
Q

Pepper

A

a large constant number used to increase the security of the hashed password further; it is stored outside of the database holding the hashed passwords

64
Q

Personal electronic device (PED)

A

security features can usually be managed using mobile device management (MDM) or unified endpoint management (UEM) solutions, including device authentication, full-device encryption, communication protection, remote wiping, communication protection, device lockout, screen locks, GPS and location services, content management, app control, push notification management, third-party app store control, rooting/jailbreaking, credential management and more

65
Q

Registration authority (RA)

A

This performs certificate registration services on behalf of a Certificate Authority (CA).

66
Q

Remote attestation

A

feature of the TPM (Trusted Platform Module) that creates a hash value from the system configuration to confirm the integrity of the configuration

67
Q

real-time operating system (RTOS)

A

is an operating system specifically designed to manage hardware resources and run applications with precise timing and high reliability; they are designed to process data with minimum latency; an it is often stored on ROM; they use deterministic timing, meaning tasks are completed within a defined time frame and is designed to operate in a hard (i.e. missing a deadline can cause system failure) or soft (missing a deadline degrades performance but is not catastrophic) real-tme condition

68
Q

Steganography

A

Hiding something within something else, or data hidden within other data.

69
Q

Stream cipher

A

When a cryptosystem performs its encryption on a bit-by-bit basis.
encrypt the digits (typically bytes), or letters (in substitution ciphers) of a message one at a time

70
Q

Substitution

A

The process of exchanging one letter or bit for another. encryption/description process using substitution

71
Q

Symmetric algorithm

A

Operate with a single cryptographic key that is used for both encryption and decryption of the message.

72
Q

Salting

A

adds additional bits to a password before hashing it, and helps thwart rainbow attacks; algorithms like Argon2, bcrypt, and PBKDF2 add salt and repeat the hashing function many times; salts are stored in the same database as the hashed password

73
Q

Salting vs key stretching

A

salting adds randomness and uniqueness to each password before hashing, which reduces the effectiveness of rainbow table attacks; key stretching makes the hashing process deliberately slow, making it much more challenging for attackers to crack passwords using brute-force or precomputed tables; common password hashing algorithms that use key stretching include PBKDF2, bcrypt, and scrypt

74
Q

SDx

A

software-defined everything refers to replacing hardware with software using virtualization; includes virtualization, virtualized software, virtual networking, containerization, serverless architecture, IaC, SDN, VSAN, software-defined storage (SDS), VDI, VMI SDV, and software-defined data center (SDDC)

75
Q

Session key

A

a symmetric encryption key generated for one-time use; usually requires a key encapsulation approach to eliminate key management issues

76
Q

Static Environments

A

apps, OSs, hardware, or networks that are created/configured to meet a particular need or function are set to remain unaltered; static environments, embedded systems, network-enabled devices, edge, fog, and mobile devices need security management that may include network segmentation, security layers, app firewalls, manual updates, firmware version control, wrappers, and control redundancy/diversity

77
Q

Stream mode encryption

A

system using a process that treats the input plaintext as a continuous flow of symbols, encrypting one symbol at a time; usually uses a streaming key, using part of the key as a one-time key for each symbol’s encryption

78
Q

Symmetric encryption

A

process that uses the same key (or a simple transformation of it) for both encryption/decryption

79
Q

Transposition

A

The process of reordering the plaintext to hide the message by using the same letters or bits.
encryption/description process using transposition

80
Q

Trusted platform module
(TPM)

A

A secure crypto processor and storage module, allows system to boot securely

81
Q

Trust and Assurance

A

trust is the presence of a security mechanism or capability; assurance is how reliable the security mechanism(s) are at providing security

82
Q

Work factor

A

This represents the time and effort required to break a cryptography system.
is a way to measure the strength of a cryptography system, measuring the effort in terms of cost/time to decrypt messages; amount of effort necessary to break a cryptographic system using a bruteforce attack, measured in elapsed time

83
Q

VESDA

A

very early smoke detection process (air sensing device brand name)

84
Q

Zero-knowledge proof

A

one person demonstrates to another that they can achieve a result that requires sensitive info without actually disclosing the sensitive info