Encryption, Hashing, Threats, and mitigations, Authentication.... etc Comptia sec+

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/54

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

55 Terms

1
New cards

Symmetric key

Single shared key, shared secret key

2
New cards

asymmetric encryption

Different keys used for encryption and decryption, (public key cryptography)

3
New cards

Stream cipher

Encrypts bit by bit ( symmetric algorithm)

4
New cards

Block cipher 

encrypts fixed length blocks 

5
New cards

DES

symmetric block encryption, breaks input into 64 bit blocks, with an effective key strength of 56 bits, transposition and substitution

6
New cards

3DES

three separate symm keys to encrypt decrypt then encrypt again into stronger cipher text 

7
New cards

IDEA

Symmetric cipher block encryption 128 bit key and with 64 bit blocks

8
New cards

AES

symmetric block cipher that uses 128 192 or 256 bit blocks and matching keys

9
New cards

Blowfish

A block cipher with key sizes ranging from 32 to 448 bits Developed as a DES replacement but not widely adopted

10
New cards

Twofish 

A block cipher supporting 128-bit block size and key sizes of 128, 192, or 256 bits Open source and available for use

11
New cards

RC4

a stream cipher with variable key sizes from 40 to 2048 bits, used in SSL

and WEP

12
New cards

RC5

is a block cipher with key sizes up to 2048 bits

13
New cards

Asymmetric algorithm

does not require a shared secrt key, provides CIA and non repudiation, private key is the only key that decrypts 

14
New cards

Diffie- Hellman(DH)

Used for key exchange and secure key distribution  Vulnerable to man-in-the-middle attacks, requires authentication commonly used in VPN tunnel establishment (IPSec)

15
New cards

RSA

Used for key exchange, encryption, and digital signatures, Relies on the mathematical difficulty of factoring large prime numbers Supports key sizes from 1024 to 4096 bits 

Widely used in organizations and multi-factor authentication

16
New cards

ECC

Efficient and secure, uses algebraic structure of elliptical curves Commonly used in mobile devices and low-power computing Six times more efficient than RSA for equivalent security

17
New cards

Hashing

One-way cryptographic function that produces a unique message digest from an input

18
New cards

MD5

Creates a 128-bit hash value, has a collision vulnerability

19
New cards

SHA-1

160-bit hash digest, reducing the number of collision that can occur compared to MD5

20
New cards

SHA-2

Offers longer hash digests (SHA-224, SHA-256, SHA-384, SHA-512)

21
New cards

SHA-3

Uses 224-bit to 512-bit hash digests, more secure, 120 rounds of computations

22
New cards

RIPEMD

Open-source competitor to SHA but less popular -160 bit the most common

23
New cards

HMAC

Checks message integrity and authenticity  Utilizes other hashing algorithms

24
New cards

Digital signatures

created by hashing a file then encrypting with a private key 

25
New cards

DSA

Uses a 160-bit message digest created by DSS (Digital Security Standard)

26
New cards

RSA

 Supports digital signatures, encryption, and key distribution

 Widely used in various applications, including code signing

27
New cards

Public Key Infrastructure (PKI)

  • ●  Encompasses the entire system for managing key pairs, policies, and trust

  • ●  Involves generating, validating, and managing public and private key pairs

    that are used in the encryption and decryption process

  • ●  Ensures the security and trustworthiness of keys

28
New cards

Public Key Cryptography

Refers to the encryption and decryption process using public and private

keys

29
New cards

Key Escrow

  • Storage of cryptographic keys in a secure, third-party location Enables key retrieval in cases of key loss or for legal investigations

30
New cards

Digital certificate

  • Bind a public key with a user's identity

  • Used for individuals, servers, workstations, or devices

  • Use the X.509 Standard

31
New cards

Wildcard certificate 

  • ●  Allows multiple subdomains to use the same certificate

  • ●  Easier management, cost-effective for subdomains

  • ●  Compromise affects all subdomains

32
New cards

SAN (Subject Alternate Name) field

  Certificate that specifies what additional domains and IP addresses are

going to be supported

 Used when domain names don’t have the same root domain

33
New cards

Single-sided certificate 

Only requires the server to be validated

34
New cards

Dual-sided

  • ○  Both server and user validate each other higher security, requires more processing power

35
New cards

Self-Signed Certificates

  • ●  Digital certificate that is signed by the same entity whose identity it certifies

  • ●  Provides encryption but lacks third-party trust

  • ●  Used in testing or closed systems

36
New cards

Third-Party Certificates

  • ●  Digital certificate issued and signed by trusted certificate authorities (CAs)

  • ●  Trusted by browsers and systems

  • ●  Preferred for public-facing websites

37
New cards

Root of trust 

  • ●  Highest level of trust in certificate validation

  • ●  Trusted third-party providers like Verisign, Google, etc.

  • ●  Forms a certification path for trust

38
New cards

Certificate authority

  • ●  Trusted third party that issues digital certificates

    • ●  Certificates contain information and digital signature

    • ●  Validates and manages certificates

39
New cards

registration Authority

●  Requests identifying information from the user and forwards certificate

request up to the CA to create a digital certificate

  • ●  Collects user information for certificates

  • ●  Assists in the certificate issuance process

40
New cards

Certificate Signing Request (CSR)

  • ●  A block of encoded text with information about the entity requesting the

    certificate

  • ●  Includes the public key

  • ●  Submitted to CA for certificate issuance

  • ●  Private key remains secure with the requester

41
New cards

Certificate Revocation List (CRL)

  • ●  Maintained by CAs

  • ●  List of all digital certificates that the certificate authority has already
    revoked 

42
New cards
  • Online Certificate Status Protocol (OCSP

●  Determines certificate revocation status or any digital certificate using the

  • certificate's serial number

  • ●  Faster but less secure than CRL

43
New cards

OCSP Stapling

  • ●  Alternative to OCSP

  • ●  Allows the certificate holder to get the OCSP record from the server at regular intervals

  • ●  Includes OCSP record in the SSL/TLS handshake

  • ●  Speeds up the secure tunnel creation

44
New cards

Public Key Pinning

  • ●  Allows an HTTPS website to resist impersonation attacks from users who are trying to present fraudulent certificates

  • ●  Presents trusted public keys to browsers

  • ●  Alerts users if a fraudulent certificate is detected

45
New cards
46
New cards

Key Escrow Agents

  • ●  Securely store copies of private keys

  • ●  Ensures key recovery in case of loss

  • ●  Requires strong access controls

47
New cards

Key Recovery Agents

  • ●  Specialized type of software that allows the restoration of a lost or

    corrupted key to be performed

  • ●  Acts as a backup for certificate authority keys

48
New cards

Blockchain

  • Shared immutable ledger for transactions and asset tracking

  • Builds trust and transparency

  • Widely associated with cryptocurrencies like Bitcoin

  • Is essentially a really long series of information with each block containing

    information in it

● Each block has the hash for the block before it

49
New cards

TPM (Trusted Platform Module)

  • ●  Dedicated microcontroller for hardware-level security

  • ●  Protects digital secrets through integrated cryptographic keys

  • ●  Used in BitLocker drive encryption for Windows devices

  • ●  Adds an extra layer of security against software attacks

50
New cards

HSM (Hardware Security Module

  • ●  Physical device for safeguarding and managing digital keys

  • ●  Ideal for mission-critical scenarios like financial transactions

  • ●  Performs encryption operations in a tamper-proof environment

  • ●  Ensures key security and regulatory compliance

51
New cards

Key Management System

  • ●  Manages, stores, distributes, and retires cryptographic keys

  • ●  Centralized mechanism for key lifecycle management

  • ●  Crucial for securing data and preventing unauthorized access

  • ●  Automates key management tasks in complex environments

52
New cards

Secure Enclaves

  • ●  Coprocessor integrated into the main processor of some devices

  • ●  Isolated from the main processor for secure data processing and storage

  • ●  Safeguards sensitive data like biometric information

  • ●  Enhances device security by preventing unauthorized access

53
New cards

Steganography

  • ●  Conceals a message within another to hide its very existence

  • ●  Involves altering image or data elements to embed hidden information

  • ●  Primary goal is to prevent the suspicion that there’s any hidden data at all

  • ●  Used alongside encryption for added security

  • ●  Detection is challenging due to hiding data in plain sight

54
New cards

Tokenization

  • ●  Substitutes sensitive data with non-sensitive tokens

  • ●  Original data securely stored elsewhere

  • ●  Tokens have no intrinsic value

  • ●  Reduces exposure of sensitive data during transactions

  • ●  Commonly used for payment systems to comply with security standards

55
New cards

Data Masking (Data Obfuscation)

  • ●  Disguises original data to protect sensitive information

  • ●  Maintains data authenticity and usability

  • ●  Used in testing environments, especially for software development

  • ●  Reduces the risk of data breaches in non-production settings

  • ●  Common in industries handling personal data

  • ●  Masks portions of sensitive data for privacy, e.g., credit card digits, social

    security numbers