Security Flashcards
the same shared key was used to both encrypt and decrypt the message; faster but we have the key distribution problem - how do 2 parties agree on and share a key if they have never interacted before
symmetric encryption
two mathematically related keys are used; one is a public key that can be shared with everyone and another is a private key that is always kept secret; is slower, but can help with the key distribution problem
public-key encryption
function that maps input of any size to an output of fixed size
hash function
a hash function combined with someone’s private key can used to create a _________________
digital signature
issued by a certificate authority (CA) - there are only a few trusted organizations around the world; can be used to prove that your public key actually belongs to you
digital certificate
when hackers use psychology to trick people into divulging confidential information
social engineering
4 types of malware
virus, worm, trojan horse, ransomware
can insert itself into the code of other computer programs and copy itself throughout the computer and the network when the infected programs run
virus
is similar to a virus, but it does not need to be attached to another program, and can copy itself without any human help
worm
software that appears to be harmless, but actually does something unexpected and malicious behind the scenes. The user has to launce it, and cannot replicate on its own
trojan horse
software that will either threaten to publish or prevent the victim from accessing their files unless a ransom is paid. Usually this will be some cryptocurrency so it cannot be traced to the person they paid
ransomware
5 other techniques than malware
phishing, spam, botnet, denial of service attack, sniffing
use deceptive emails or text messages to social engineer users into revealing sensitive information. Often they will pretend to come form a trusted authority and will ask for confidential information
phishing
unsolicited junk mail
spam
collection of computers (usually infected ones) that are used together for a common purpose
botnet
involves many computers overwhelming a website by requesting a service in an attempt to block others from accessing the website
denial of service attack