Security+ Encryption, PKI, Authentication, and Network Security Concepts (Vocabulary Flashcards)

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/109

flashcard set

Earn XP

Description and Tags

A comprehensive set of vocabulary flashcards covering encryption (symmetric/asymmetric, PKI), hashing, digital certificates, TLS/SSL, authentication methods, access control models, PAM, directory services, and network security concepts mentioned in the notes.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

110 Terms

1
New cards

Symmetric Encryption

Encryption that uses the same key for encryption and decryption; fast and suitable for bulk data.

2
New cards

Pre-Shared Key (PSK)

A secret key shared in advance by both communicating parties for symmetric encryption.

3
New cards

AES

Advanced Encryption Standard; symmetric cipher used for bulk data encryption.

4
New cards

AES-256

AES variant using 256-bit keys, offering strong security.

5
New cards

RC4

A stream cipher once common in TLS; now considered insecure and deprecated.

6
New cards

DES

Data Encryption Standard; 56-bit key; deprecated due to vulnerability to brute-force attacks.

7
New cards

3DES

Triple DES; applies DES three times; stronger than DES but slower and largely deprecated.

8
New cards

Asymmetric Cryptography

Public-key cryptography using a key pair (public and private) for encryption and digital signatures.

9
New cards

PKI

Public Key Infrastructure; framework for managing keys and digital certificates.

10
New cards

RSA

Public-key algorithm used for encryption and digital signatures; widely used in emails and data protection.

11
New cards

RSA 2048-4096

RSA key size range; larger keys provide greater security but require more processing.

12
New cards

ECC (Elliptic Curve Cryptography)

Elliptic Curve Cryptography; provides equivalent security with smaller key sizes; efficient for devices.

13
New cards

Diffie-Hellman (DH)

Key exchange protocol that enables two parties to establish a shared secret over an insecure channel.

14
New cards

Key Exchange

Process by which cryptographic keys are agreed upon between parties.

15
New cards

Hashing

Process that produces a fixed-size digest to verify data integrity.

16
New cards

MD5-128

MD5 producing 128-bit hashes; now considered insecure due to collision vulnerabilities.

17
New cards

SHA-1

Hash function; deprecated due to collision weaknesses; successors include SHA-256/512.

18
New cards

SHA-256

Secure Hash Algorithm with 256-bit output; widely used for integrity and signatures.

19
New cards

SHA-512

Secure Hash Algorithm with 512-bit output; strong integrity protection.

20
New cards

MD5 vulnerabilities (birthday attack, collisions)

MD5 is susceptible to collisions via birthday attack, compromising integrity.

21
New cards

Digital Signatures

Cryptographic signatures proving authenticity and integrity; often tied to certificates.

22
New cards

CAC Card

Common Access Card; smart card used for identity and authentication in certain environments.

23
New cards

Root CA

Root Certificate Authority; ultimate trusted authority; often offline to protect trust.

24
New cards

RA (Registration Authority)

Entity that authenticates identities and issues requests to a CA; may be offline or online.

25
New cards

CSR

Certificate Signing Request; request containing identity and public key for certificate issuance.

26
New cards

IPv4

Internet Protocol version 4; 32-bit addressing.

27
New cards

IPv6 / AAAA

Internet Protocol version 6; 128-bit addressing; AAAA records denote IPv6 addresses.

28
New cards

Digital Certificate

Electronic document that asserts identity and contains a public key (X.509 format common).

29
New cards

X.509

Directory standard for public key certificates used in PKI.

30
New cards

PKIX

Public Key Infrastructure X.509; standard for certificate path validation.

31
New cards

PKCS

Public Key Cryptography Standards; family of protocols for certificates and cryptography.

32
New cards

Self-Signed Certificate

Certificate signed with its own private key; lacks a trusted chain unless manually trusted.

33
New cards

CRL

Certificate Revocation List; list of certificates revoked before expiry.

34
New cards

OCSP

Online Certificate Status Protocol; real-time certificate status checking.

35
New cards

OCSP Stapling

OCSP response is stapled to the TLS handshake to reduce latency and privacy concerns.

36
New cards

Certificate Pinning

Associating a host with a specific certificate or public key to prevent MitM attacks.

37
New cards

Common Name (CN)

Main domain name in a certificate; part of the subject field.

38
New cards

Subject Alternative Name (SAN)

Additional identities (domains/addresses) listed in a certificate.

39
New cards

KMIP

Key Management Interoperability Protocol; standard for managing cryptographic keys.

40
New cards

TPM

Trusted Platform Module; hardware root of trust integrated in CPU/motherboard.

41
New cards

HSM

Hardware Security Module; removable hardware device for secure key generation and storage.

42
New cards

Key Escrow

Backup of cryptographic keys with a trusted party for recovery purposes.

43
New cards

Secure Enclave

Isolated hardware/firmware environment to protect sensitive data like passwords.

44
New cards

Bulk Encryption

Encryption of large data sets; typically uses AES for efficiency.

45
New cards

Perfect Forward Secrecy (PFS)

Ephemeral session keys ensure past communications remain secure if a key is compromised.

46
New cards

Salting

Adding random data to passwords before hashing to resist precomputed attacks.

47
New cards

Key Stretching

Applying multiple hashing or cryptographic operations to increase password resistance.

48
New cards

Steganography

Hiding information within other media to conceal its presence.

49
New cards

Data Masking

Redacting or obscuring sensitive data in outputs or datasets.

50
New cards

Tokenization

Substituting sensitive data with non-sensitive tokens; reversible with mapping.

51
New cards

De-Identification

Removing identifying information to protect privacy.

52
New cards

TLS

Transport Layer Security; secures data in transit via certificate-based protocols.

53
New cards

ECC for low power devices

ECC’s small key sizes are advantageous for devices with limited resources.

54
New cards

Key Enclave

Secure area in memory or hardware used to protect credentials (e.g., password managers).

55
New cards

MD5 (old hashing)

MD5 hashing; deprecated due to collision vulnerabilities.

56
New cards

Hard Authentication Tokens

Tokens used for authentication; include certificate-based PKI, OTP, FIDO, U2F.

57
New cards

Certificate-based PKI

Use of digital certificates issued by a PKI to establish identity.

58
New cards

OTP

One-Time Password; valid for a single login session.

59
New cards

FIDO

Fast Identity Online; standard for passwordless, strong authentication.

60
New cards

U2F

Universal 2nd Factor; hardware security keys for authentication.

61
New cards

Soft Authentication Tokens

Codes or prompts delivered via software channels (SMS, email, push).

62
New cards

SMS

Text message-based one-time codes for authentication.

63
New cards

Email

Email-based authentication tokens or links.

64
New cards

Phone Call

Voice-based verification codes or prompts for authentication.

65
New cards

Notification

Push or in-app notifications used for authentication prompts.

66
New cards

Authenticator App

Apps that generate time-based or event-based one-time codes.

67
New cards

Passwordless Authentication

Authentication without passwords (e.g., hardware keys, biometrics, push).

68
New cards

FRR

False Rejection Rate; probability a legitimate user is rejected.

69
New cards

FAR

False Accept Rate; probability an impostor is accepted.

70
New cards

DAC

Discretionary Access Control; access determined by object owner.

71
New cards

MAC

Mandatory Access Control; access determined by centralized policy.

72
New cards

RBAC

Role-Based Access Control; access based on user roles.

73
New cards

RUBAC

Rule-Based Access Control; access based on pre-defined rules (policy).

74
New cards

ABAC

Attribute-Based Access Control; access based on attributes like role, location.

75
New cards

PoLP

Principle of Least Privilege; grant only necessary permissions.

76
New cards

Provisioning

Onboarding: proofing identity, issuing credentials, assigning assets.

77
New cards

Deprovisioning

Removing access and credentials when a user leaves or role changes.

78
New cards

PAM

Privileged Access Management; controls and monitors privileged accounts.

79
New cards

LDAP

Lightweight Directory Access Protocol; directory service with DN and attribute-value pairs.

80
New cards

SAML

Security Assertion Markup Language; exchanging authentication/authorization data.

81
New cards

OAuth

Authorization framework for granting limited access to resources.

82
New cards

SSO

Single Sign-On; unify authentication across multiple systems.

83
New cards

Kerberos

Network authentication protocol used for secure, mutual authentication.

84
New cards

NGFW

Next-Generation Firewall; includes DPI and application awareness.

85
New cards

DPI

Deep Packet Inspection; analyzes content to enforce security policies.

86
New cards

Stateful

Firewall that tracks sessions and context to make decisions.

87
New cards

Stateless

Firewall that does not track session state; decisions based on rules only.

88
New cards

WAF

Web Application Firewall; protects web apps from SQLi, XSS, CSRF.

89
New cards

UTM

Unified Threat Management; integrates firewall, IPS/IDS, and more in one device.

90
New cards

Remember /24 subnet

CIDR notation for a 255.255.255.0 subnet; defines an IP range.

91
New cards

DNS

Domain Name System; resolves hostnames to IP addresses.

92
New cards

SAW

Secure Admin Workstation; dedicated secure workstation for admin tasks.

93
New cards

Jump Server

Hardened intermediary server in DMZ enabling access to internal hosts.

94
New cards

NAC

Network Access Control; enforces security policies at network access.

95
New cards

802.1x

Port-based network access control protocol used with RADIUS.

96
New cards

RADIUS

Remote Authentication Dial-In User Service; provides AAA services.

97
New cards

EAP

Extensible Authentication Protocol; framework for multiple authentication methods.

98
New cards

PEAP

Protected EAP; encapsulates EAP in a secure tunnel; often built on CHAP.

99
New cards

TLS

Transport Layer Security; strongest, certificate-based security for sessions.

100
New cards

HIDS/NIDS

Host-Based/Network-Based Intrusion Detection Systems; monitor threats.