OSG-CH6 Flashcards
data stored on hard drives, backup tapes, cloud storage services, USB devices, and other storage media.
Data at rest
data being transmitted across a network between two systems.
Data in motion
stored in the active memory of a computer system, where it may be accessed by a process running on that system.
Data in use
operation that easily produces output values for each possible combination of inputs but makes it impossible to retrieve the input values.
one-way function
a random bit string that is the same length as the block size (the amount of data to be encrypted in each operation) and is XORed with the message.
Nonce
demonstrate knowledge of a fact (such as a password or key) without actually disclosing that fact to the other individual.
zero-knowledge proof
operation is divided among multiple users, no single person has sufficient privileges to compromise the security of an environment. This separation of duties and two-person control contained in a single solution
split knowledge
requires that a minimum number of agents out of the total number of agents work together to perform high-security tasks.
M of N Control
The third party may use the escrowed key to either restore an authorized user’s access or decrypt the material themselves
recovery agent
a cryptographic key is stored with a third party for safekeeping
key escrow
the time and effort required to perform a complete brute-force attack against an encryption system
work function