1/22
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Trusted Platform Module
hardware that provides cryptological solutions to devices
TPM
initials for Trusted Platform Module
True
True or false, a trusted platform module includes keys burned into it that are unique to the device it belongs to
secure key generation and storage, and password protection
two functions of trusted platform modules
brute force and dictionary
encryption keys stored in a TPM are password protected making them immune to two types of cyberattacks
hardware security module
centralized device that provides cryptological solutions to large-scale environments.
Hardware Security Module
how are encryption keys securely stored in a data center with thousands of web servers?
coming with separate plug-in-cards or hardware that connects to the HSM to run fast cryptography operations
how do Hardware Security Modules handle large-scale cryptography in a hardware of a device?
True
true or false, encryption keys can be securely stored in a centralized HSM while preventing unauthorized access to the keys
cryptographic accelerators
What can be used on a hardware security module if it needs to perform cryptography operations in real-time
HSM
initials for Hardware Security Module
redundancy
how do Hardware Security Modules maintain availability
fault tolerance: device continues even after components fail, redundancy: having multiple of the same device, so in case one fails, the others function
Difference between redundancy and fault tolerance
key management system
centralized local or cloud-based software providing encryption key management.
Manage keys from a single platform, link keys to users, rotate keys, and log/report key usage
four functions of a key management system
types of keys, certificate authorities used, and when certs expire
three things that can be viewed in a key management system dashboard
secure enclave
security processer, separate from the main processor solely dedicated to protecting data on a device (think fallout 4)
True
True or false, secure enclaves protect a user’s data, even if their device falls into the hands of someone else
monitors processes, random number generator, real-time encryption, fixed keys, and AES
five functions of a secure enclave
preventive technical control that ensure confidentially by preventing unauthorized access to encryption keys and availability through redundancy
describe the security control type plus category and the two parts of the CIA triad ensured by HSM’s and why
one is used to secure keys in individual device while the other in large-scale environments
difference between Trusted Platform and Hardware Security Modules?
preventive technical control that ensures confidentiality by protecting data from unauthorized access
What security control types, plus categories, and part of the CIA triad does a secure enclave ensure