Section 3 Flashcards
Which tool is used for vulnerability assessment?
Qualys
Which standards apply to any financial entity policies?
Gramm-Leach-Bliley
What company audits other companies for licensing requirements?
BSA (business software alliance)
Which term is synonymous with symmetric cryptography?
secret key cryptography
Which term is synonymous with asymmetric cryptography?
public key cryptography
what are hash functions used for
determining whether the message has changed
-verify integrity of data
Symmetric cryptography
uses a single key to both encrypt the plaintext and decrypt the ciphertext
examples of symmetric cryptography
DES, 3DES, AES
asymmetric cryptography
uses public and private key
- public key encrypts data and anyone can access it
- private key decrypts
Examples of asymmetric cryptography
RSA, ECC, DSA
protocols: PGP, SSL/TSL
examples of hash functions
MD5, SHA
regulatory compliance
Adherence to laws specific to industry in which you’re operating
industry compliance
Regulations not mandated by law but can have severe impacts upon ability to conduct business
PCI DSS
processing credit card transactions
Steps for compliance
- monitoring
- reviewing
- documenting
- reporting