Terms Flashcards
Abstraction
Streamlining authorization access aka permission, abs and social media streamline access to pictures
Gap
Analysis of current system in comparison to future want. Like bitch with a gap tooth, she wants to fill that bitch so in the future she cute.
Control Plane
Configurations of zero trust
Data plane
Movement of data, aka switch like the physical part/ Ethernet
Honey pot
Attracts attacker to fake machine. Honeynet consist fake network. Honey file, fake info to alert. Honey token, track location/alert of attacker (anything posted on internet)
Change management
Formal way to change/update applications, policies make sure it’s done right
Change control process
Changes can only be made listed within a scope of change control document. Document can be altered so changes needed can be made. Like upgrade if you need to do something not listed, then you can change the scope to match the necessary thing you need to change
Change control board
They approve changes to application
PKI
Public key infrastructure, framework for digital certificate
Escrow
Maintains decryption key. Like Crow at work maintainers
Transparent vs Record lvl encryption
Encrypts all data base daya with symmetric vs encrypt individual with different symmetric key for each (sql)
Key stretching
Hash a password, then hashing the hashed password… the doing it again
Out of band key exchange vs in band
Phone, person, cyber transport NOT OVER INTERNET. OVER INTERNET
Public key cryptography
Create same key without key exchange. So on Anderson computer he has his own private key and mix it with Perez public key = symmetric key. Other way around too on Perez side. This creates same symmetric key without exchanging over Internet
TPM
Trusted platform module. Encryption generator w/ hardware SINGLE device
HSM
Hardware security module. LARGE SCALE redundant cryptograph device
Key management system
Manage all keys in centralized software
Secure Enclave
Professor built into devices, keeps phone private (encrypts things in device)
Obfuscation
Making something difficult to understand, hides data in plain sight
Steganography
Concealed writing, hides data in image. If you know how it’s done, you can reverse engineer it. Can be in network form
Tokenization
Replaced sensitive data with non sensitive place holder. Like credit card when you pay, you use your card and a one use token 123 to 234 then it can’t be used
Data masking
Hide part of original data, like checking out in booking it’s XXXX 1234
Hash
Digest or finger print, cannot recover original document. Integrity. If any change is made to original the hash changes
Hash collision
Two different string of text put in. Using MD5 it creates the same hash… don’t use MD5