Exam1 Flashcards
What is key space?
The set of all possible keys that can be used in cryptographic algorithm. The size of key size determines the strength of the encryption making it harder for attackers.
Digital certificates use asymmetric keys for validation. True or False?
True
What is FRR?
False Rejection Rate: The percentage of valid users incorrectly rejected by a biometric system.
What is FAR?
False Acceptance Rate: The percentage of invalid users incorrectly accepted by a biometric system.
What is CER?
Crossover Error Rate: The point where FRR and FAR are equal, indicating the balance between security and convenience in a biometric system.
Can private key be used to both encrypt and decrypt information?
Yes
For decryption: In asymmetric encryption, the private key is used to decrypt data that was encrypted with the corresponding public key.
For encryption: In digital signatures, the private key is used to “encrypt” a message or hash (sign) to prove the identity of the sender.
Which is faster, asymmetric key or symmetric key?
Symmetric key
In PKI, what keys do we need?
Public key: Shared openly, used to encrypt data or verify digital signatures.
Private key: Kept secret, used to decrypt data or create digital signatures.
Data integrity is insured by what?
Hashing
What is authentication based on?
Authentication is based on verifying the identity of a user, device, or entity. There are three main factors: Something you are, Something you have, Something you know
What is the concept of crypto analysis?
The study and practice of analyzing and breaking cryptographic systems. This involves finding a weakness in the encryption algorithm without having to know the key.
What does the Bell LaPadula model enforce?
Confidentiality
What are the two rules of the Bell LaPadula model?
No read up, No write down
What does worm software do?
malicious software that self-replicates and spreads independently through networks. it typically happens through network weaknesses, email attachments, and removable media.
What are the three factors of authentication?
Something you have (passcode), something you are (typing a passcode), something you do (face-id to scan facial features)
A fingerprint is an example of something you are?
Yes, a fingerprint is an example of something you are in biometric security. It falls under the category of biometric identifiers, which are unique physical traits used to verify a person’s identity.
Why do we use PKI certificate?
We want secure, detectable, reliable communication
What is an access token?
A physical token
What is social engineering?
Manipulating people to gain confidential information
What does the CA do?
The Certificate Authority (CA) signs digital certificates with its private key. This ensures the authenticity and integrity of the certificate, allowing others to verify it using the CA’s public key
Do digital signatures always use asymmetric keys? True or False?
True
What are the levels in security policies?
Policies, Procedures, Guidelines
If root CA’s private key is compromised, what is the consequence?
Something bad happens
Is hashing reversible?
No, it cannot go back to the original plain text document from a hash