Part 3 Flashcards
What are 3 data categories?
Data at rest - in an information system as a saved file form or database form
Data in use - currently open and being actively edited
Data in motion - data transmitted via telecommunication lines
what are procedures that apply to the protection of both transmitting and receiving equipment as well as the data transmitted between?
COMSEC
What is the branch of cryptology that treats the principles, means, and methods of designing and using cryptosystems?
Cryptography
What is the branch of knowledge that treats the principles of cryptography and cryptoanalysis; and the activities involved in SIGINT and maintaining COMSEC?
Cryptology
What is the analysis of encrypted messages; the steps or processes involved in converting encrypted messages into plain text without initial knowledge of the system or key employed in encryption?
Cryptoanalysis
What is a derivative of cryptography in the sense that data is hidden in a message, the data is imbedded into a file to become invisible, examples, changing a file extension type?
Steganography
What are 3 types of Meta Data?
Descriptive - describes a file for purposes - title, author, key word
Structural - how objects are put together - how pages are ordered into chapters
Administrative - information on how to handle a file - how it was created, who created it, who can access it, file type
What are some places to hide data?
Invisible context, headers, footers, notes, custom xml data, hidden rows and collumns
What is a type of algorithm that does not contain any encryption
Clear text
What type of encryption algorithm is cleartext that is to be encrypted?
Plain text
What are procedures for formulas to perform encryption?
Algorithm
What are mathematical values entered into the algorithm?
Keys
What is encrypted text?
Cipher text
What is it called when a hash is not unique and data cannot be deciphered into the origial version?
Collision
What are two types of Hash Algorithm?
MD5
SHA
What supports all 5 pillars of IA?
The use of cryptography
What is a “one way hash” and is the property of a hash function that is configured to make reversing of the hash algorithm mathematically infeasible?
Pre Image Resistance
What concept is where hash algorithms cannot be designed to produce fixed outputs?
Hash Originality
What are bytes of data within a transmission that is used to authenticate the message itself and ensures the data has not been modified in transit?
MAC - message authentication code
What type of encryption is one private key for both users?
Symetric Encryption