SY0-701: Others Flashcards
PII
Personally Identifiable Information (PII)
PHI
Personal Health Information (PHI)
PTZ
Pan-tilt-zoom (PTZ)
ECC
Elliptic Curve Cryptography (ECC)
- heavily used in mobile devices and it’s based on the algebraic structure of elliptical curves over finite fields to define its keys
- a public key cryptography algorithm that uses elliptic curve theory to perform security functions like encryption, authentication, and digital signatures
ECCHE
Elliptic Curve Diffie-Hellman Ephemeral (ECCHE)
- uses a different key for each portion of the key establishment process inside the Diffie-Hellman key exchange
ECDSA
Elliptic Curve Digital Signature Algorithm (ECDSA)
- used as a public key encryption algorithm by the US Government in their digital signatures
IDEA
International Data Encryption Algorithm (IDEA)
- symmetric block cipher which uses 64-bit blocks to encrypt plaintext to ciphertext
RIPEMD
RACE Integrity Primitive Evaluation Message Digest (RIPEMD)
- a group of hash function based on MD4 which in itself is a weak hash function
HMAC
Hash-based Message Authentication Code (HMAC)
- used to check the integrity of a message and provides some level of assurance that its authenticity is real
- HMAC will actually be paired with other algorithms to do the work
‣ HMAC-MD5
‣ HMAC-SHA1
‣ HMAC-SHA256
RAID
Redundant Array of Inexpensive Disks (RAID)
IMAP
Internet Message Access Protocol (IMAP)
- used for secure email retrieval
FIM
File Integrity Monitoring (FIM)
- used to validate the integrity of operating system and application software files using a verification method between the current file state and known good baseline
MD5
Message Digest 5