Security Flashcards
What is symmetric encryption
It is where the process of decryption is simply the opposite of the process used to encrypt the original data
What is one advantage to symmetric encryption systems
They are quick and easy to set up
What is one disadvantage of Symmetric encryption
They are easy for modern computers to crack, as it just requires a relatively small number of combinations to be tried until the correct one is found
Explain Asymmetric encryption in terms of keys
There are two keys, one encryption key and one decryption key.
What are the five steps to asymmetric encryption
- Encryption algorithm generates private and pubic key pairs
- The recipient and sender swap public keys
- A combined key is created from the others public key and their private key
- Sends combined key encrypts
- Recipients combined key decrypts
How do you compare two different cryptographic methods
You compare how hard it is to break the system
Describe three of the defining points of a good cipher
Cypher works on all types of data
Algorithm should be simple
The Cypher should not be larger than the original data
Name some human biometric data
Finger Prints, Iris, DNA
How does finger print recognition work
Device takes a picture of the finger print and uses pattern recognition to turn it into code, this code is then compared to the stored fingerprint to see if they are a match
Where is finger print recognition used
On personal devices as another method of signing in
How does Facial recognition work
It uses computer generated filters to transform images into numerical expressions that can be compared to each other
Where is Facial recognition used
In security checks, at airports in passport control and check in
Virus
A software which will attempt to spread over the network by infecting emails, once in the system the virus will deliver the payload to the system
Torjan
Hidden virus’s, only open and attack once they have been opened by the user
Spyware
A piece of software delivered by trojans or virus’s. It tracks the key presses and software use