Glossary- K Flashcards
key
See encryption key.
keycard system
A physical access control system where personnel are able to enter a workspace by waving a keycard near a reader or inserting it into a reader, activating a door lock to briefly unlock the door.
key compromise
Any unauthorized disclosure or damage to an encryption key. See also key management.
key custody
The policies, processes, and procedures regarding the management of keys. See also key management.
key disposal
The process of decommissioning encryption keys. See also key management.
key exchange
A technique that is used by two parties to establish a symmetric encryp-
tion key when no secure channel is available.
key fingerprint
A short sequence of characters that is used to authenticate a public key.
key generation
The initial generation of an encryption key. See also key management.
key length
This refers to the size (measured in bits) of an encryption key. Longer en- cryption keys mean that it takes greater effort to successfully attack a cryptosystem.
key logger
A hardware device or a type of malware where a user’s keystrokes and, op- tionally, mouse movements and clicks are recorded and sent to the key logger’s owner.
key management
The various processes and procedures used by an organization to generate, protect, use, and dispose of encryption keys over their lifetime.
key protection
All means used to protect encryption keys from unauthorized disclo- sure and harm. See also key management.
key rotation
The process of issuing a new encryption key and re-encrypting data pro- tected with the new key. See also key management.
known error
An incident that has been seen before and its root cause is known.
laptop computer
A portable computer used by an individual user.