Mom's Study Guide Flashcards
What do you call asymmetric encryption that has a Certificate Authority and the associated infrastructure to support issuing and managing certificates?
Public Key Infrastructure
What is the ultimate authority of PKI that holds the root key for signing all of the certificates that it gives the intermediary, who in turn issues the certificate to the requester?
Certificate Authority
What kind of Certificate Authority is always up and running so that people in the company can request a certificate at any time of the day or night?
Online Certificate Authority
What kind of Certificate Authority is for military or secure environments where clearance and vetting muste be completed before someone can be issued with a certificate?
Offline Certificate Authority
What do you call a certificate authority that is also known as a third-party CA and is commercially accepted as an authority for issuing public certificates?
Public Certificate Authority
Who validates and accepts the incoming requests for certificates from users on the network and notifies the CA to issue the certificates?
Registration Authority
What do you call an intermediary CA?
Subordinate Certificate Authority
What prevents the compromising of the CA, certificate fraud and SSL man-in-the-middle attacks?
Certificate Pinning
What do you call the root certificate in a PKI environment from which the whole chain of trust is derived. AKA the root CA?
Trust anchor
What proves the authenticity of a certificate?
Trust models
What trust model uses a hierarchy from the root CA down the intermediary; the normal PKI model?
Hierarchical Trust Model
What trust model is peer-to-peer, where two separate PKI environments trust each other?
Bridge Trust Model
What shows the trust from the vendor, the vendor CA, and the computer where the certificate is installed?
Certificate Chaining
What hashing algorithm results in a 160 bit message digest?
SHA-1
What hashing algorithm results in a 256 bit message digest?
SHA-2
What hashing algorithm results in a 512 bit message digest?
SHA3
What hashing algorithm results in a 128-bit message digest?
MD5
What is the difference between SHA1 and MD5 hashing algorithms?
SHA1 is more secure but MD5 is faster
What is the concept of protecting a company’s data with a series of protective layers so that if one layer fails, another layer will already be in place to thwart an attack?
Defense in Depth
What controls are written by managers to create organizational policies and procedures to reduce risk within companies?
Managerial Controls
What controls are executed by company personnel during their day-to-day operations?
Operational controls
What do you call an annual event where you are reminded about what you should be doing on a daily basis to keep the company safe?
Annual Security Awareness Training
What do you call the process that a company adopts so that changes made don’t cause any security risks to the company?
Change Management
What do you call the contingency planning to keep the businesses up and running when a disaster occurs by identifying any single point of failure that would prevent the company from remaining operational?
Business Continuity Plan