Obfuscation, Hashing & Digital Signatures, Blockchain Tech, Certificates Flashcards

1
Q

Obfuscation

A

Process of hiding info in plain sight

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Steganography

A

Hiding info inside of an image

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Common steganography techniques include-

A
  1. Network based
  2. Image
  3. Invisible watermarks
  4. Audio
  5. Video
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Tokenization, where is it common?

A

Replaces sensitive data w/ a non-sensitive place holder.
-SSN 266-12-1112 is now 691-61-8539
-Common w/ CC processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data obfuscation

A

Hide some of original data
Ex: Receipt only showing last 4 digits of bank card.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data masking

A

protects sensitive info by replacing it with fake or randomized data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Hash, what’s it used for?

A

Represents data as a short string of text.
Used to store passwords, verifies a downloaded document is same as original.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Collision

A

Different input should never create the same hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Salt

A

Random data added to a password when hashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Advantages of salted hashes:

A

-Rainbow tables wont work
-Slows down brute force process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Advantages of blockchain”

A

Keeps track of transactions.
And are verified by multiple computers on the network before it is added to the blockchain ledger.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In blockchain, if changes occur then-

A

Those changes are distributed to everyone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Public key certificate

A

verifies the identity of a user or device by linking their public key to their identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What adds ‘trust’ to digital certificates?

A

Digital signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

PKI uses ____________ for additional trust

A

Certificate Authorities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Root of trust

A

Inherently trusted component
-Hardware, software, firmware , or other component.

17
Q

Third party certificate authorities

A

CA is responsible for the validation of certificate requests, issuing certificates, revocation.

18
Q

Certificate signing requests (CSR)

A
  1. A key pair is created
    2, Public key is sent to CA to be signed
  2. CA validates request
  3. CA digitally signs cert
19
Q

Private certificate authorities

A

You are your own CA

20
Q

Self-signed certificates

A

Issue your own certificates signed by your own CA

21
Q

Wildcard certificates

A

Allows a certificate to support many different domains.
Ex: .example.com can secure www.example.com, mail.example.com, and blog.example.com.

22
Q

Key revocation

A

invalidates a cryptographic key, making it unusable for encryption or decryption
Maintained by Certificate Revocation List (CRL)

23
Q

OCSP (Online Certificate Status Protocol) stapling

A

allows a web server to check the revocation status of a digital cert