Security+ Flashcards
Another name for Symmetric algorithm
Private Key Algorithm
Another name for Asymmetric algorithm
Public Key algorithm
Advantage of asymmetric algorithm
Overcomes multiple key issue associated with symmetric algorithms
Hybrid encryption implementation
Use asymmetric encryption to establish connection, then exchange symmetric keys for continued communication
Advantage of symmetric algorithm
Faster
Stream cipher
Encrypt data one byte (or bit) at a time
Used for securing real-time data streams
Tend to be symmetric algorithms
Tend to be hardware encrypted
Block cipher
Breaks input into fixed lengths for encryption
Padding added if data is less than fixed length
Easier to implement than stream cipher
Tend to be software encrypted
DES algorithm
Data Encryption Standard
Symmetric algorithm
deprecated
3DES
Triple DES
Symmetric algorithm
3 symmetric keys - encrypt, decrypt, encrypt
IDEA
International Data Encryption Algorithm
Symmetric algorithm
AES
Advanced Encryption Standard
Symmetric algorithm
Current symmetric standard, most commonly used
Blowfish
Symmetric algorithm
Intended to replace DES
open source
Twofish
Symmetric algorithm
open source
RC4
Rivest Cipher 4
Symmetric stream cipher
Used in SSL and WEP
RC5
Rivest Cipher 5
Symmetric block cipher
RC6
Rivest Cipher 6
Symmetric block cipher
Introduced to replace DES; superceded by AES
Public key cryptography
Asymmetric algorithm
For confidentiality: Anyone can encrypt with public key, but only private key can decrypt
For non-reputiation: sender should sign messiage with private key, reader should read with public key
Digital Signature
Hash digest for message sent with sender’s private key
Diffle-Hellman (DH) algorithm
Asymmetric algorithm
Used to distribute keys of unsecure network
Often used for create VPN tunnels; part of IPSec
Rivest, Shamir and Adleman (RSA) Algorithm
Asymmetric algorithm
Relies on difficulty of factoring prime numbers
Elliptic Curve Cryptography (ECC)
Asymmetric algorithm
Heavily used on mobile devices
More efficient than RSA
Hashing
one way cryptographic function that outputs unique message digest
always the same length per the algorithm in use
Pass the Hash attack
login with stored hash rather than plaintext password
Rainbow table
Precomputed table for reversing cryptographic hash functions
Wildcard certificate
Allows all subdomains to use same public key and have it display as valid
Subject Alternate Name (SAN) Field
Certificate field that specifies what additional domains and IP addresses are going to be supported
Single-Sided Certificate
Only requires server to be validated
Dual-Sided Certificate
Requires both server and user to be validated
Self-signed certificate
certificate is signed by same party whose identity it certifies
Third-Party Certificate
Certificate issued and signed by a trusted certificate authority
Certificate Signing Request
Block of encoded text containing information about the entity requesting the certificate
OSCP
Online Certificate Status Protocol
Allows to determine the revocation status of any digital certificate using its serial number
OSCP Stapling
Allows the certificate holder to get OCSP record from the server at regular intervals
TPM
Trusted Platform Module
Dedicated microcontroller designed to secure hardware through integrated cryptographic keys
HSM
Hardware Security Module
Physical device that manages digital keys
Secure Enclave
Co-processor integrated into the main processor of some devices, designed with the sole purpose of ensuring data protection
Steganography
Hiding secret data in non-secret files or messages
Tokenization
substiture sensitive data elements with non-sensitive equivalents; can only be fixed by authorized systems
Data Owner
Senior executive responsible for maintaining the confidentiality, integrity and availability of the information asset.
Data Controller
Responsible for deciding purposed and methods of data storage, collection, usage and guaranteeing legality of processes
Data Processor
Hired by data controller to help with tasks like collecting, storing and analyzing data
Data Custodian
Responsible for management of system(s) on which data assets are stored
Data Steward
Focused on quality of data and associated metadata
Data Privacy Officer
Responsible for oversight of privacy-related data (PHI, SPI, PII)
BYOD
Bring your own device
COPE
Corporate-Owned, Personally Enabled
Time-of-use (TOU)
Race condition that occurs when a process performs an action on a resource without verifying that it is still in the same state or value as when it was last checked. It can lead to incorrect or unauthorized actions based on invalid assumptions.
Buffer Overflow
Type of memory corruption that occurs when a program writes more data than the allocated buffer can hold, causing it to overwrite adjacent memory locations. It can lead to crashes, code execution, or privilege escalation.
Memory injection
Insertion of malicious code into a system’s memory, not the exploitation of a time gap between a check and use of a condition.
Memory injection is a technique that involves injecting code into a running process to alter its behavior or gain access to its memory. It can be used for malicious or legitimate purposes on mobile devices, such as debugging or hooking.
Time-of-check (TOC)
Race condition that occurs when a process checks the state or value of a resource before using it, but another process changes it in between. It can lead to incorrect or unauthorized actions based on outdated information.