PKI, Encrypting data, Key exchange, Encryption technologies Flashcards
PKI
Associates people or devices to a digital certificate.
Symmetric encryption, also referred to as?
Encrypt & decrypt w/ the same key.
Shared secret, secret key algorithm.
Asymmetric encryption
Encrypting & decrypting w/ two different keys.
Private key
Keep this private, no one else has access.
**Only key that can decrypt data encrypted w/ the public key
Public key
Anyone can see this key
Key escrow
Allows authorized parties to access the encryption keys.
Database encryption
Protecting stored data by converting it into an unreadable format.
Transparent encryption
Encrypt all database info w/ a symmetric key
Record-level encryption
Encrypting individual columns.
Use separate symmetric keys for each column.
Transport encryption
Protects data traversing the network
VPN
Encrypts all data over the network and hiding a user’s IP address.
Client based VPN uses-
SSL/TLS
Site-to site VPN uses-
IPsec
Key stretching
Make a weak key stronger by performing multiple processes.
*Hash a password. Hash the hash of the password. And continue.
Out-of-band key exchange
Don’t send the symmetric key over the ‘net
-Telephone, courier, in person.
In band key exchange
the process of exchanging encryption keys directly over the same communication channel.
Session key
An encryption/decryption key that ensures the security of a comm session between a user and another computer or vice versa.
*also known as symmetric keys
Trusted Platform Module (TPM)
A microchip or embedded security in technology that protects a computer’s security & data.
Persistent memory
a type of computer memory that retains data even when power is lost.
Unique keys burned in during manufacturing.
Versatile memory
a type of memory that maintains its data only while the device is powered.
-Storage keys, hardware configuration info
-securely store Bitlocker keys
Hardware Security Module
securely store and manages cryptographic keys.
-Clusters, redundant power.
Key Management System
Managed all keys from a centralized manager.
-On premises, cloud based
Secure Enclave
Keeps sensitive user data secure even when the Application Processor kernel becomes compromised