Week 4 (Security in the Data Domain) Flashcards
Name the 7 Security Domains.
Organization, End-Users, Physical Access, System, Software, Network, Data
Explain Scytale.
It is one of the oldest military ciphering methods used in 400 BC - Used by the Spartans.
It is the method of using a narrow strip of leather or cloth going around a cylindrical rod and the message is written across the adjoining sides.
What is Cryptography?
Scrambling information so it appears unreadable. It Transforms information into secure form.
Science of transforming information into a secure form while being transmitted or stored.
What is Encryption and Decryption?
Encryption: Changing original text into a secret message using cryptography.
Decryption: Changing secret messages back into original form.
What is Plaintext and Ciphertext?
Plaintext: is the Data to be encrypted. It is input into an encryption algorithm.
Ciphertext: Data that was encrypted.
What is a key?
A key is a mathematical value entered into the algorithm to produce ciphertext and vice versa.
What are the five basic information protections Cryptography can provide?
Confidentiality,
Integrity,
Availability,
Authenticity of the Sender, and
Nonrepudiation.
How does Cryptography provide Confidentiality?
It ensures only the authorized parties can view the data. Encrypted information can only be viewed by those who have been provided the key.
How does Cryptography provide Integrity?
Ensures information is correct and unaltered. Encrypted information cannot be changed except by authorized users who have the key.
How does Cryptography provide Availability?
Authorized users can access it. Authorized users are provided the decryption key to access the information.
How does Cryptography provide Authenticity of the Sender?
It refers to the proven fact that something is legitimate or real. Cryptography can prove the sender was legitimate and not an imposter.
How does Cryptography provide Nonrepudiation?
Proves that a user performed an action. Cryptographic nonrepudiation prevents an individual from fraudulently denying they were involved in a transaction.
Explain Symmetric Encryption Algorithms.
It uses the same shared secret key to encrypt and decrypt information. The Secret key cannot be made public and must only be known to the sender and receiver.
Needs to use a secure channel to distribute the key.
It performs faster than most public key cryptographic algorithms.
Explain Asymmetric Encryption Algorithms.
Also known as public key cryptography.
Uses two mathematically related keys.
Public key available to everyone and freely distributed.
Private key known only to individual to whom it belongs.
Only the Private key can decrypt what has been encrypted with the Public key and vice versa.
Key pairs. For every additional user, there is an additional keypair.
What are the mathematical equations for number of keys for both Symmetric and Asymmetric Algorithms?
Symmetric: N(N-1)/2, where N is the number of users and N-1 is the number of additional links.
Asymmetric: 2N, where N is the number of users.