Information Assurance 5 Flashcards

1
Q

a broad, umbrella term that encompasses both cryptography and cryptanalysis

A

Cryptology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

protecting data by hiding it from anyone who isn’t supposed to see, access, or change it

A

Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

figuring out how to access the data without having the necessary cryptographic key

A

Cryptanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

is the process by which a readable message is converted to an unreadable form to prevent unauthorized parties from reading it

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

is a structure or scheme consisting of a set of algorithms that converts plaintext to ciphertext to encode or decode messages securely

A

Cryptosystem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

this type of cryptography uses a single key for both encryption and decryption

A

Symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

allows users to encrypt information
using shared keys

A

Asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

is the process of converting an encrypted message back to its original (readable) format

A

Decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

the original message

A

Plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

a method by which Caesar was able to secretly communicate with his generals without anyone being able to read the messages

A

Caesar Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

which has a better performance and a faster speed, symmetric or asymmetric?

A

Symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

another word for algorithm

A

Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

the process of asymmetric cryptography

A
  1. Registration
  2. Lookup
  3. Encrypt
  4. Decode
  5. Reply
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

pros of asymmetric cryptography

A
  • Security
  • Transparency
  • Appearance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

cons of asymmetric cryptography

A
  • Speed
  • Vulnerabilities
  • Loss
  • Long-term sustainability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

are one way mathematical functions that take an input of any length and produce a fixed size output, called a hash

A

Hash functions

17
Q

a symmetric algorithm that uses the same key to encrypt and decrypt protected data

A

Advanced Encryption Standard (AES)

18
Q

is based on public key encryption (asymmetric) technology which is a public key cryptosystem for reliable data transmission

A

Rivest, Shamir, Adleman (RSA) algorithm

19
Q

is a widely used cryptographic hash function that results in a 128 bit hash value

A

Message Digest algorithm 5 (MD5)

20
Q

used for hashing data and certificate files

A

Secure Hash Algorithm (SHA)

21
Q

is an electronic, encrypted, stamp of authentication on digital information such as email messages, macros, or electronic documents

A

Digital Signature

22
Q

digital signature assurances

A
  • Authenticity
  • Integrity
  • Non-repudiation
  • Notarization
23
Q

issues digital certificates, signs certificates to verify their validity and tracks which certificates have been revoked or have expired

A

Certificate Authority (CA)