4.encryption tech

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/22

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

23 Terms

1
New cards

Trusted Platform Module

hardware that provides cryptological solutions to devices

2
New cards

TPM

initials for Trusted Platform Module

3
New cards

True

True or false, a trusted platform module includes keys burned into it that are unique to the device it belongs to

4
New cards

secure key generation and storage, and password protection

two functions of trusted platform modules

5
New cards

brute force and dictionary

encryption keys stored in a TPM are password protected making them immune to two types of cyberattacks

6
New cards

hardware security module

centralized device that provides cryptological solutions to large-scale environments.

7
New cards

Hardware Security Module

how are encryption keys securely stored in a data center with thousands of web servers?

8
New cards

coming with separate plug-in-cards or hardware that connects to the HSM to run fast cryptography operations

how do Hardware Security Modules handle large-scale cryptography in a hardware of a device?

9
New cards

True

true or false, encryption keys can be securely stored in a centralized HSM while preventing unauthorized access to the keys

10
New cards

cryptographic accelerators

What can be used on a hardware security module if it needs to perform cryptography operations in real-time

11
New cards

HSM

initials for Hardware Security Module

12
New cards

redundancy

how do Hardware Security Modules maintain availability

13
New cards

fault tolerance: device continues even after components fail, redundancy: having multiple of the same device, so in case one fails, the others function

Difference between redundancy and fault tolerance

14
New cards

key management system

centralized local or cloud-based software providing encryption key management.

15
New cards

Manage keys from a single platform, link keys to users, rotate keys, and log/report key usage

four functions of a key management system

16
New cards

types of keys, certificate authorities used, and when certs expire

three things that can be viewed in a key management system dashboard

17
New cards

secure enclave

security processer, separate from the main processor solely dedicated to protecting data on a device (think fallout 4)

18
New cards

True

True or false, secure enclaves protect a user’s data, even if their device falls into the hands of someone else

19
New cards

monitors processes, random number generator, real-time encryption, fixed keys, and AES

five functions of a secure enclave

20
New cards

preventive technical control that ensure confidentially by preventing unauthorized access to encryption keys and availability through redundancy

describe the security control type plus category and the two parts of the CIA triad ensured by HSM’s and why

21
New cards

one is used to secure keys in individual device while the other in large-scale environments

difference between Trusted Platform and Hardware Security Modules?

22
New cards

preventive technical control that ensures confidentiality by protecting data from unauthorized access

What security control types, plus categories, and part of the CIA triad does a secure enclave ensure

23
New cards