PKI, Encrypting data, Key exchange, Encryption technologies Flashcards

1
Q

PKI

A

Used as an associate with digital certificate to people or devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Asymmetric encryption, also referred to as?

A

Encrypt & decrypt w/ the same key.
Shared secret, secret key algorithm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Asymmetric encryption

A

Encrypting & decrypting w/ two different keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Private key

A

Keep this private, no one else has access.
**Only key that can decrypt data encrypted w/ the public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Public key

A

Anyone can see this key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Key escrow

A

Allows authorized parties to access the encryption keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Database encryption

A

Protecting stored data by converting it into an unreadable format.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Transparent encryption

A

Encrypt all database info w/ a symmetric key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Record-level encryption

A

Encrypting individual columns.
Use separate symmetric keys for each column.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Transport encryption

A

Protects data traversing the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

VPN

A

Encrypts all data over the network and hiding a user’s IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Client based VPN uses-

A

SSL/TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Site-to site VPN uses-

A

IPsec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Key stretching

A

Make a weak key stronger by performing multiple processes.
*Hash a password. Hash the hash of the password. And continue.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Out-of-band key exchange

A

Don’t send the symmetric key over the ‘net
-Telephone, courier, in person.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In band key exchange

A

the process of exchanging encryption keys directly over the same communication channel.

17
Q

Session key

A

An encryption/decryption key that ensures the security of a comm session between a user and another computer or vice versa.
*also known as symmetric keys

18
Q

Trusted Platform Module (TPM)

A

A microchip or embedded security in technology that protects a computer’s security & data.

19
Q

Persistent memory

A

a type of computer memory that retains data even when power is lost.
Unique keys burned in during manufacturing.

20
Q

Versatile memory

A

a type of memory that maintains its data only while the device is powered.
-Storage keys, hardware configuration info
-securely store Bitlocker keys

21
Q

Hardware Security Module

A

Used in large environments to securely store thousands of cryptographic materials.
-Clusters, redundant power.

22
Q

Key Management System

A

Managed all keys from a centralized manager.
-On premises, cloud based

23
Q

Secure Enclave

A

Keeps sensitive user data secure even when the Application Processor kernel becomes compromised