Domain 3.1: Security Architecture and Engineering Flashcards
Learn essential terms related to secure system design, hardware, and cryptographic principles.
Define:
Cryptographic Lifecycle
The stages of cryptographic key materials, including creation, usage, storage, and destruction.
The stages that cryptographic key materials go through during their existence, including creation, distribution, usage, storage, archival, and destruction. Managing this lifecycle is critical to maintaining the integrity and security of a cryptographic system. Each stage presents unique security challenges and requires appropriate controls to prevent unauthorized access or compromise.
Define:
Cryptographic Logic
The mathematical logic used to design and analyze cryptographic systems, focusing on providing formal proofs for security properties.
The mathematical logic employed in the design and analysis of cryptographic algorithms and systems. It’s a field that focuses on providing formal proofs for the security properties of cryptographic protocols and mechanisms. Such formal proofs play a crucial role in validating the security of cryptographic systems against potential threats.
For more information, view this lecture on Introduction to Cryptography- Part 1.
Define:
Cryptographic Randomization
The process of generating unpredictability in cryptographic operations, essential for secure encryption and key generation.
The process of generating randomness that is used within cryptographic algorithms and protocols. It ensures unpredictability in keys, nonces, salts, and other values critical to secure encryption and other cryptographic operations. Good cryptographic randomization prevents attackers from guessing or reproducing the values, which would compromise security. It typically relies on sources of high entropy and algorithms known as cryptographic pseudo-random number generators (CSPRNGs).
For more information, view this lecture on Introduction to Cryptography- Part 1.
Define:
Cryptography
The practice of secure communication in the presence of adversaries, involving creating and deciphering codes to keep information secret.
The science and practice of secure communication in the presence of third parties called adversaries. It involves creating written or generated codes that allow information to be kept secret. Cryptography encompasses various techniques such as encryption (scrambling data so it’s unreadable without a key), decryption (making the scrambled data readable again with the correct key), hash functions (transforming data into fixed-size strings of characters), and digital signatures (verifying the sender’s identity and the integrity of the data). It’s essential for securing transactions, communications, and data in many fields, including finance, telecommunications, and national security.
For more information, view this lecture on Introduction to Cryptography- Part 1. Or visit this Wikipedia page.
Define:
Cryptology
The study of codes and ciphers, encompassing the creation of secure cryptographic systems and the techniques for breaking them.
The study of codes and ciphers, which encompasses both cryptography (creating codes and ciphers to keep information secure) and cryptanalysis (breaking them to access the information). Cryptology is a branch of mathematics and computer science that deals with the principles and techniques of translating readable data into secure forms and vice versa. It’s fundamental to various aspects of information security, from secure online transactions to confidential communications and beyond.
For more information, view this lecture on Introduction to Cryptography- Part 1.. Or visit this Wikipedia page.
Define:
Cryptoprocessor
A dedicated microprocessor for handling cryptographic operations, embedded in hardware devices for enhanced security.
A dedicated microprocessor designed specifically to handle cryptographic operations, such as creating digital signatures and managing keys securely. These processors are often embedded in hardware devices and provide an extra layer of security, protecting sensitive data even if the system’s main processor is compromised. They are often found in applications requiring high levels of information security, such as ATM cards and smart cards.
For more information, visit this Wikipedia page.
Define:
Cryptosystem
A set of cryptographic algorithms and protocols that secure communication and data, ensuring confidentiality and integrity.
A suite of cryptographic algorithms and protocols designed to secure communication and data by providing confidentiality, data integrity, authentication, and non-repudiation. A cryptosystem facilitates secure data storage and transmission in various IT applications.
For more information, visit this Wikipedia page.
Define:
Cyber-Physical Systems
(CPS)
Cyber-Physical Systems merge computational elements with physical processes, enabling real-time sensing, control, and interaction across domains like manufacturing, energy, and transportation.
CPS integrates sensors, actuators, networks, and software to monitor and manipulate physical entities. Examples include industrial robots, smart grids, autonomous vehicles, and connected healthcare devices. Security risks encompass unauthorized access, data manipulation, or sabotage, potentially causing physical damage or safety issues. Ensuring CPS security involves encryption, reliable communication protocols, rigorous testing, and resilience strategies. By bridging digital and physical realms securely, CPS fosters innovation while minimizing overall risk to critical infrastructure.
For more information, visit this Wikipedia page.
Define:
Cybersecurity Architecture
The framework outlining an organization’s security processes, systems, personnel, and technologies for comprehensive protection.
The design and framework that outlines the structure and behavior of an organization’s security processes, information security systems, personnel, and technologies. It provides a roadmap and strategic context for deploying the right technologies and processes to protect the organization’s digital assets and operations. Effective cybersecurity architecture ensures that security controls are integrated into every layer of the technology stack, from the network perimeter to end-user devices, helping to defend against threats and maintain regulatory compliance.
For more information, visit this Wikipedia page.
Define:
Data Bus
A system within a computer that transmits data between components, with its width determining the volume of data transmission.
A communication system within a computer or device consisting of various wires or traces on a circuit board, which transmits data between components. It allows the transfer of data and instructions from one part of the computer to another, and its width (in bits) determines how much information can be transmitted at once.
For more information, visit this Wikipedia page.
Define:
Data Emanation
Unintentional signal leakage from electronic equipment that could disclose sensitive information, requiring mitigation techniques.
The unintentional radiation or transmission of electrical signals from electronic equipment, such as a computer or a network device, which can potentially disclose sensitive information. Adversaries can intercept and decode these signals, also known as compromising emanations, to gain unauthorized access to the information, making mitigation techniques such as shielding, signal jamming, or the use of secure communication protocols essential.
For more information, view this lecture on Emanations and Covert Channels or The OSI model- Part 1..
Define:
Data Encryption Standard
(DES)
A former encryption standard using a symmetric-key algorithm, now replaced by more secure methods like AES.
A symmetric-key algorithm for encrypting electronic data. Developed in the 1970s and once widely used, DES encrypts data in 64-bit blocks using a 56-bit key. It was eventually found to be vulnerable to brute-force attacks and has been largely replaced by more secure standards like the Advanced Encryption Standard (AES). However, DES was pivotal in the development and study of modern encryption techniques.
For more information, view this lecture on Symmetric encryption- Part 1. or visit this Wikipedia page.
Define:
Data Execution Prevention
(DEP)
A security feature preventing damage from unsafe memory operations by closing programs that use memory incorrectly.
A security feature included in most modern operating systems. Its primary function is to help prevent damage to your system from viruses and other security threats by monitoring programs to ensure they use system memory safely. When DEP detects a program using memory incorrectly, it closes the program and notifies the user, thus helping to limit the impact of both malicious and unintentionally harmful software.
For more information, view this lecture on Hardware architecture- Part 2 or visit this Wikipedia page.
Define:
Data Farm
A large-scale storage facility or server collection managing vast data amounts, providing infrastructure for big data and cloud services.
A colloquial term that describes a large-scale data storage facility or a collection of servers that work together to store, manage, and process vast amounts of data. Similar to a server farm or data center, a data farm provides the infrastructure necessary to support big data applications, cloud computing services, and extensive databases. Data farms are designed for reliability, scalability, and high availability to ensure ongoing access to critical data resources. They play a foundational role in supporting the storage needs of modern enterprises and the processing requirements of complex analytical tasks.
For more information, visit this Wikipedia page.
Define:
Data Hiding
Concealing internal object details in object-oriented programming to prevent unauthorized manipulation and enhance security.
A software development technique specifically applied to object-oriented programming, where the internal object details (data members) are hidden from external users. Data hiding helps maintain object integrity by preventing users from setting object data into an invalid or inconsistent state, enhancing system security, and reducing the likelihood of unauthorized data manipulation.
For more information, view this lecture on Introduction to Cryptography- Part 1. or visit this Wikipedia page.
Define:
Data Lake
A centralized repository for storing structured and unstructured data at scale, enabling various types of analytics to guide decisions.
A centralized repository that allows you to store all your structured and unstructured data at any scale. You can store your data as-is without having to first structure the data and run different types of analytics—from dashboards and visualizations to big data processing, real-time analytics, and machine learning to guide better decisions. Data lakes are typically implemented using a flat architecture where data is tagged with metadata and unique identifiers and can be efficiently queried and analyzed.
For more information, visit this Wikipedia page.
Define:
Decipher
Converting encrypted or encoded data back to its original, readable format, typically using a key or password for secure access.
The process of converting information or data that has been encrypted into a form that is readable and understandable. The act of deciphering typically requires a specific key or password, making it a central part of many processes that ensure confidentiality and secure access to information, especially sensitive or private data.
For more information, view this lecture on Introduction to Cryptography- Part 1. or visit this Wikipedia page.
Define:
Decode
Transforming encoded or scrambled data back to its original, understandable format, essential for communication systems.
This is the process of transforming encoded or scrambled data back into its original format. It’s an essential mechanism in communication systems that enables the safe transmission of data. The encoded data can only be interpreted correctly if the receiver has access to the appropriate decoding technique or key.
For more information, view this lecture on Introduction to Cryptography- Part 1..
Define:
Decryption
The process of converting encrypted data back into its original form, enabling authorized access to confidential information.
The process of converting encrypted data (ciphertext) back into its original form (plaintext), making it understandable. This is achieved by using a cryptographic key and following the reverse process of the encryption algorithm applied to the data. Decryption is critical for secure communication, allowing only authorized parties with the correct key to access the sensitive information.
For more information, view this lecture on The encryption we use today. or visit this Wikipedia page.
Define:
Decryption Key
A cryptographic key used to convert ciphertext into plaintext, essential for accessing encrypted information securely.
A type of cryptographic key used to reverse the encryption process, converting encrypted data (ciphertext) back into its original form (plaintext). In symmetric-key algorithms, the same key is used for both encryption and decryption, while in asymmetric-key algorithms, a paired private key is used for decryption that is different from the public key used for encryption. Proper handling and storage of decryption keys are crucial for maintaining the confidentiality and security of sensitive data.
For more information, view this lecture on The encryption we use today. or visit this Wikipedia page.
Define:
DeCSS Program
Software designed to bypass DVD encryption, leading to legal debates about digital rights and copyright infringement.
A computer program designed to circumvent the Content Scramble System (CSS) used to encrypt and protect DVD content from unauthorized duplication and viewing. DeCSS program enabled users to bypass CSS and access the DVD content, leading to significant legal and ethical discussions about digital rights management and copyright infringement.
For more information, visit this Wikipedia page.
Define:
Dedicated Security Mode
A system mode dedicated exclusively to high-level security operations.
Dedicated Security Mode configures a system to run only security-critical processes, isolating them from non-essential functions. This mode minimizes vulnerabilities by reducing the attack surface, ensuring that system resources are exclusively allocated to defending against threats and maintaining the highest security standards.
For more information, view this lecture on Security models and concepts- Part 2 or visit this Wikipedia page.
Define:
Deprovisioning
Removing access rights from individuals when they leave an organization or change roles, critical for security.
The process of removing an individual’s access rights or permissions from an organization’s systems and networks, often as a result of the individual leaving the company or changing roles. It is a critical part of identity and access management (IAM) to ensure security and compliance by preventing unauthorized access to sensitive information.
Define:
DER
(Distinguished Encoding Rules)
DER is a binary encoding format for ASN.1 structures, commonly used for digital certificates, cryptographic keys, and other PKI-related data.
Distinguished Encoding Rules follow strict guidelines that eliminate ambiguities found in more flexible encodings, ensuring consistent interpretation across systems. DER-encoded files often carry extensions such as .der or .cer. By mandating unique representations of objects, DER supports secure transactions and interoperability in cryptographic operations. Its deterministic structure simplifies parsing, enabling reliable validations of certificates and other authentication materials.
For more information, visit this Wikipedia page.