Domain 3.2: Security Architecture and Engineering Flashcards
Learn essential terms related to secure system design, hardware, and cryptographic principles.
Define:
Key or Cryptographic Key or Cryptovariable
Data input in an encryption process, controlling the algorithm’s output to ensure secure data transformation.
A piece of data used as input for an encryption algorithm to transform plaintext data into ciphertext or vice versa. The key determines the specific output of an encryption algorithm, thus ensuring that only those who possess the correct key can decrypt the data. Keys are used in a variety of contexts, including secure communication, data protection, and digital signatures.
For more information, view this lecture on The Encryption We Use Today. Or visit this Wikipedia page.
Define:
Key Pair
A set of related cryptographic keys in public-key cryptography, one public and one private, used for secure communications.
A key pair in public-key cryptography consists of a private key, which is kept secret, and a public key, which can be shared publicly. The keys are mathematically related, allowing for secure data encryption, digital signatures, and key exchanges. Key pairs enable functions such as SSL/TLS for secure web communications and PGP for secure emails.
For more information, view this lecture on Asymmetric Encryption- Part 1. Or visit this Wikipedia page.
Define:
Key Recovery
The retrieval and restoration of a lost or compromised cryptographic key, essential for encrypted data access.
The process of retrieving and restoring a lost or compromised cryptographic key. It is used to ensure the availability and integrity of encrypted data in the event of a key loss or failure. Examples of key recovery methods include backup and recovery of keys, secure key escrow, and keyless recovery using a trusted third party.
For more information, view this lecture on Digital Signatures.
Define:
Key Space
The total set of possible keys for a cryptographic algorithm, defining the potential for key uniqueness.
In cryptography, key space refers to the set of all possible keys that can be used with a cryptographic algorithm, defining the limits of potential key values. The size of the key space (i.e., the total number of distinct keys) is determined by the key length, impacting the algorithm’s resistance to brute force attacks. For example, a 128-bit keyspace has 2^128 possible keys.
For more information, visit this Wikipedia page.
Define:
Key Space Clumping
A clustering of keys within a cryptographic key space, potentially leading to reduced encryption strength.
A term related to cryptography and the distribution of potential keys within the key space, which is the set of all possible keys that can be used with a cryptographic algorithm. Keyspace clumping occurs when keys are not evenly distributed throughout the key space, potentially leading to clusters or groups of keys that are more likely to be chosen or tested than others. This uneven distribution can introduce vulnerabilities, as it may reduce the effective size of the key space and make the encryption system easier to breach through methods such as brute force attacks. Properly designed cryptographic systems aim to avoid key space clumping to ensure that all keys are equally likely to be generated and that the key space is fully utilized to maintain the strength of cryptographic protection.
Define:
Key Stretching
Applying a cryptographic function multiple times to a key to enhance its length and security.
The process of applying a cryptographic function multiple times to a password or key to increase its effective length and security. It is used to protect against brute-force attacks and dictionary attacks by making it computationally infeasible to guess or crack the key. Examples of key stretching algorithms include PBKDF2 and Argon2.
For more information, view this lecture on Attacks on Our Cryptography- Part 1. Or visit this Wikipedia page.
Define:
Key-Encryption-Key
(KEK)
A secret key used for encrypting other keys, an integral part of secure key management systems.
A secret key used for encrypting and decrypting other keys. It is commonly used in key management systems to securely store and protect keys. Examples include a KEK used to encrypt keys for secure data transmission, a KEK used to encrypt keys for secure access to a cloud storage system, and a KEK used to encrypt keys for secure access to a financial database.
Define:
Keylogger
A tool that records keyboard input, monitoring user activity and capturing sensitive information.
A type of software or hardware device used to track and record keystrokes on a computer or device. It is used to monitor user activity and capture sensitive information such as passwords and credit card numbers. Examples of keyloggers include malware-based keyloggers, hardware-based keyloggers, and keylogger software for parental control.
For more information, view this lecture on Type 1 Authentication - “Something You Know” or “Knowledge Factors”. Or visit this Wikipedia page.
Define:
Keystream
A sequence of bits used to encrypt plaintext in stream ciphers.
A keystream is a continuous sequence of pseudo-random bits generated by a cryptographic algorithm, used to encrypt plaintext by combining with it—often via XOR—to produce ciphertext. The security of stream ciphers critically depends on the unpredictability and uniqueness of the keystream for each encryption session.
For more information, view this lecture on Symmetric Encryption- Part 2. Or visit this Wikipedia page.
Define:
KillDisk Malware
Malware that destroys system data, sometimes part of ransomware attacks, threatening data loss unless a ransom is paid.
A type of malware that targets and destroys data on a system, often as part of a larger ransomware attack. It is used to extort money from victims by threatening to permanently delete their data unless a ransom is paid. Examples of KillDisk malware include the Petya and NotPetya attacks.
Define:
Known Key
A cryptographic key that has been exposed, compromising encryption efforts.
A Known Key refers to an encryption key that is already in the hands of unauthorized parties or widely accessible due to poor security practices. Its exposure renders any encryption relying on it ineffective, as adversaries can use the key to decrypt confidential data. Preventing known key incidents is crucial for maintaining the integrity of cryptographic systems, emphasizing secure key storage and periodic key rotation.
For more information, view this lecture on Attacks on Our Cryptography- Part 3. Or visit this Wikipedia page.
Define:
Known Plain Text Attacks
A known plain text attack occurs when adversaries possess the original plaintext along with its encrypted form, leveraging this information to uncover cryptographic keys or vulnerabilities.
By comparing input-output pairs, attackers identify patterns or flaws in the encryption algorithm, helping them predict or reverse-engineer future encryptions. Weak ciphers and poor key management amplify such risks. Defense strategies include using strong, modern encryption standards, regularly rotating keys, and validating cryptographic implementations. Minimizing data exposure and applying best practices reduce susceptibility to known plain text attacks.
For more information, visit this Wikipedia page.
Define:
Known-Plaintext Attack
A cryptanalysis attack where the attacker has both the plaintext and ciphertext, potentially revealing the encryption key.
A known-plaintext attack is a method of cryptanalysis where the attacker has access to both the plaintext (unencrypted message) and its corresponding ciphertext (encrypted message). It is used to exploit weaknesses in encryption algorithms by analyzing how the plaintext is transformed into ciphertext, with the aim of discovering the encryption key. Examples include attacks on historical ciphers like the Vigenère cipher.
For more information, view this lecture on Attacks on Our Cryptography- Part 2. Or visit this Wikipedia page.
Define:
Kubernetes
Kubernetes is an open-source container orchestration platform that automates application deployment, scaling, and management across clusters of hosts.
Developed by Google, Kubernetes schedules and distributes containers, handling load balancing, health monitoring, and self-healing. It uses a declarative model where operators define desired states in configuration files—Kubernetes continuously works to achieve those states. Popular features include rolling updates, secrets management, and persistent storage orchestration. Security considerations encompass network policies, resource quotas, role-based access control, and container image scanning. Kubernetes underpins many microservices and DevOps strategies, enabling efficient, scalable containerized environments.
For more information, visit this Wikipedia page.
Define:
KVMs
(Keyboard, Video, and Mouse Switches)
Devices that allow control of multiple computers with one set of peripherals, critical for managing secure workstations.
Hardware devices that allow users to control multiple computers from one set of keyboard, monitor, and mouse. While they are not inherently security devices, their use can have significant security implications. For example, they can reduce the number of peripheral devices, thus limiting potential entry points for hardware keyloggers. However, they also need to be secured properly as they can be a point of vulnerability, potentially allowing an attacker with physical access to switch between and gain control of connected systems.
For more information, view this lecture on Hardware Architecture- Part 1. Or visit this Wikipedia page.
Define:
Lattice Security Model
A security model using a lattice structure for hierarchical access control in computing environments.
A security model that defines access to resources based on a lattice-like structure of security levels and clearance rules. It is used to enforce hierarchical access control and prevent unauthorized access to sensitive information. Examples of the lattice security model include the Bell-LaPadula and Biba models.
For more information, view this lecture on Security Models and Concepts - Part 1. Or visit this Wikipedia page.
Define:
Legacy System
Outdated technology still in operation, often vulnerable to cyber threats due to lack of updates or support.
A legacy system is an outdated computing system or application that is still in use despite being surpassed by newer technologies. These systems often lack support and modern security features, making them vulnerable to cyber threats. Security strategies for legacy systems may include isolated environments, stringent access controls, and regular risk assessments until they can be safely upgraded or replaced.
For more information, view this lecture on Hardware Architecture- Part 1. Or visit this Wikipedia page.
Define:
Lifecycle of Cryptography
The comprehensive process of managing cryptographic systems and keys, from development to decommissioning.
The process of developing, implementing, and managing cryptographic systems for information security. It involves selecting the appropriate cryptographic algorithms and key sizes, generating and securely storing keys, and regularly updating and retiring cryptographic systems. It is used in various industries to protect sensitive information such as financial transactions, medical records, and government communications.
For more information, view this lecture on The Encryption We Use Today.
Define:
Limit Registers
Hardware components that define the allowable memory access range for processes, safeguarding against buffer overflows.
Limit registers in computer architecture are used to define the boundaries of the memory space that a process or application is permitted to access. They help protect the system by preventing a program from reading from or writing to memory outside its allocated area, thereby avoiding potential security breaches like buffer overflows.
Define:
Linear Cryptanalysis
A method to compromise encryption algorithms by analyzing linear approximations of block ciphers.
Linear cryptanalysis is a method for breaking symmetric cryptographic algorithms by creating linear approximations to describe the behavior of the block cipher. By analyzing input and output bits, cryptanalysts can find correlations that may lead to uncovering the secret key. It is a powerful tool for evaluating the strength of encryption algorithms.
For more information, view this lecture on Attacks on Our Cryptography- Part 3. Or visit this Wikipedia page.
Define:
Linux
Linux is an open-source operating system kernel that powers a wide array of distributions, highly regarded for its security, modularity, and community-driven development.
Created by Linus Torvalds in 1991, Linux offers a robust, scalable environment for servers, desktops, and embedded devices. Popular distributions, such as Ubuntu and Red Hat, build upon the Linux kernel with various tools and package managers. Its permissive licensing encourages innovation and transparency, letting developers inspect and modify source code. With inherent multiuser permissions, frequent patches, and a strong ecosystem, Linux provides a secure foundation for countless applications.
For more information, view this lecture on Secure Operating Systems and Software Architecture. Or visit this Wikipedia page.
Define:
Locks
Mechanisms that restrict access to physical or digital assets.
Locks are devices or software measures designed to restrict unauthorized access to secured areas or data. In physical security, locks protect buildings and rooms, while in digital systems, similar controls secure data and network resources. Effective locking mechanisms are essential for preventing unauthorized entry and ensuring that both tangible and intangible assets remain protected against potential breaches.
For more information, view this lecture on Physical Security- Part 3. Or visit this Wikipedia page.
Define:
Logic Bomb
Malicious code activated under specific conditions to disrupt systems or steal data.
A type of malicious code that is designed to trigger a specific action when certain conditions are met. It is used to disrupt operations, steal data, or cause damage to a system. Examples include triggering a data deletion when a user logs off, activating a ransomware attack on a specific date, or sending confidential information to a remote server.
For more information, view this lecture on Malware- Part 2. Or visit this Wikipedia page.
Define:
Logical Cloud Isolation
Separating cloud environments to prevent access between them and protect data.
The process of separating different parts of a cloud environment, such as different applications or customers, to ensure that they are isolated from each other. It is used to enhance security and prevent unauthorized access to sensitive data. For example, a cloud provider may use logical cloud isolation to prevent one customer’s data from being accessed by another customer.