Security Flashcards

1
Q

What is symmetric encryption

A

It is where the process of decryption is simply the opposite of the process used to encrypt the original data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is one advantage to symmetric encryption systems

A

They are quick and easy to set up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is one disadvantage of Symmetric encryption

A

They are easy for modern computers to crack, as it just requires a relatively small number of combinations to be tried until the correct one is found

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Explain Asymmetric encryption in terms of keys

A

There are two keys, one encryption key and one decryption key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the five steps to asymmetric encryption

A
  1. Encryption algorithm generates private and pubic key pairs
  2. The recipient and sender swap public keys
  3. A combined key is created from the others public key and their private key
  4. Sends combined key encrypts
  5. Recipients combined key decrypts
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How do you compare two different cryptographic methods

A

You compare how hard it is to break the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe three of the defining points of a good cipher

A

Cypher works on all types of data
Algorithm should be simple
The Cypher should not be larger than the original data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Name some human biometric data

A

Finger Prints, Iris, DNA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does finger print recognition work

A

Device takes a picture of the finger print and uses pattern recognition to turn it into code, this code is then compared to the stored fingerprint to see if they are a match

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Where is finger print recognition used

A

On personal devices as another method of signing in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does Facial recognition work

A

It uses computer generated filters to transform images into numerical expressions that can be compared to each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Where is Facial recognition used

A

In security checks, at airports in passport control and check in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Virus

A

A software which will attempt to spread over the network by infecting emails, once in the system the virus will deliver the payload to the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Torjan

A

Hidden virus’s, only open and attack once they have been opened by the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Spyware

A

A piece of software delivered by trojans or virus’s. It tracks the key presses and software use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Scare-ware

A

Scare-ware attempts to scare the user into buying fake or malicious software.

17
Q

Ransom-ware

A

Uses similar tactics to Scare-ware, but will delete, collect or encrypt files which will then be ransomed

18
Q

Botnets

A

These will create a back door into your computer allowing a hacker to use it without your permission