General Security 2 Flashcards
What is Technical Change Mangement
- Actual change management process
- Performed by technical team
- Concerned with “how” to change
What is PKI?
- Public Key Infrastructure
- System of hardware, software, policies and standarts that work together to manage, and distribute digital certificates and public keys
What is Key Escrow?
- Key storage management
- By third party or within an organization
Which stored Data can be encrypted?
- SSD
- Hard Drive
- USB Drive
- Cloud Storage
What is Full Disk and Volume Level Encryption?
Full Disk
* Encrypts entire contents of storage device
Volume level
* Encrypts specific volumes or partitions
Which Programs are used in Windows and Mac to volume/partition?
- Bit Locker
- FileVault
Which program is used in Windows to encrypt single files?
EFS - Encrypting File System
Which ways are there to Encrypt Data from a Database?
Transparent Encryption
* Encrypts all data from a database
Record Level Encryption
* Encrypts individual columns
* Use of seperate symmetric keys for each column
How to transport Encryption?
Encrypting in the application
* Browsers can communicate using HTTPS
VPN (Virtual Private Network)
* Encrypts all data transmitted over the network,
regardless of the application
* Client-based VPN using SSL/TLS
* Site-to-site VPN using IPsec
How to make encryption algorithms more secure?
Length of key
Key Stretching
* Perform encryption process multiple times
* Hash of Hash
* Brute Force attacks would need to decrypt all previous keys