Encryption Flashcards

1
Q

Why should you encrypt data

A

Data is vulnerable when it is accessed by a third party who should not have access to it
Which could leak personal info like
1) online banking
2) health information
3) government security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is symmetric encryption

A

Like the name suggests it’s the same forwards and backwards where :
1)Sender send the message and the key
2) the key encrypts the data while travelling to the receiver
3) the receiver uses the shared key to decrypt the encrypted message and can read the original message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When will symmetric encryption be used

A

1) they are faster than asymmetric
2) When applications use more secure methods as key could be intercepted
3) can be used multiple times

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is asymmetric encryption

A

Asymmetric encryption uses two different keys, the whole point is the key used to decrypt is different to encrypt meaning one of the keys can be known publicly can be used by anyone wanting to encrypt a message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Where is asymmetric and encryption used

A

•email security
• web security
• for important information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is sender authentication

A

Meaning to prove that the sender is who they are which can be done in asymmetric encryption as to decrypt the message the sender must have the private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are differences between the 2 types of encryption (asymmetric and symmetric)

A

1) symmetric is considered out of date and not secure for sensitive content
2)symmetric does not require as much complexity
3)symmetric Is best when no data is moving and same person is decrypting and encrypting
4) asymmetric is often used without specialist knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When can computational security be framed enough

A

When the data cannot be cracked within a “reasonable time” which is how long a computer would take to crack the code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly