Security and Cryptography Flashcards
can reformat and transform our data, making it safer on its trip between computers
Cryptography
This type of attack involves trying every possible combination of characters until the correct one is found
Brute-Force Attacks
is malicious software that can infect computers and steal data, install backdoors, or perform other harmful actions.
Malware
Types of Malware
Viruses, Worms, Trojans
is a type of social engineering attack where attackers try to trick people into revealing sensitive information by posing as a legitimate entity, such as a
bank or email provider.
Phishing
This type of attack involves intercepting communication between two parties and modifying or eavesdropping on the data being transmitted
Man-in-the-Middle Attacks
exploit weaknesses in the physical implementation of cryptographic algorithms, such as power consumption or electromagnetic radiation, to extract sensitive information.
Side-Channel Attacks
Are weaknesses or vulnerabilities in cryptographic algorithms or protocols that can be exploited by attackers to compromise security
Cryptographic Flaws
are security risks that come from within an organization, such as employees or contractors with access to sensitive information who may intentionally or unintentionally disclose it.
Insider Threats
involve overwhelming a system or network with traffic or requests, causing it to crash or become unavailable
Denial-of-Service Attacks (DoS)
can lead to the compromise of cryptographic keys, making it possible for attackers to decrypt data or impersonate authorized users.
Key Management Failures
involve unauthorized access to physical devices or systems, such as stealing a laptop or breaking into a data center
Physical Security Breaches
is the practice of securing digital communications by converting plain text into a secret code that can only be read by the intended recipient.
Cryptography
is the process of converting plain text into an unreadable format using a cryptographic algorithm and a secret key.
Encryption
is the process of converting the encrypted data (ciphertext) back into its original form (plaintext) using the secret key
Decryption
An asymmetric encryption algorithm that uses a pair of public and private keys for encryption and decryption
Rivest-Shamir-Adleman (RSA)
A symmetric encryption algorithm widely used in secure communications that uses a shared secret key for encryption and decryption.
Advanced Encryption Standard (AES)
A symmetric encryption algorithm that is popular in software and hardware encryption applications
Blowfish
A family of cryptographic hash functions used to ensure data integrity and authenticity.
Secure Hash Algorithm (SHA)
is a form of encryption that uses the same secret key for both encryption and decryption of data
Symmetric Key Cryptography