1.4 - CompTIA Security+

0.0(0)
Studied by 1 person
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/32

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 12:16 AM on 10/27/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

33 Terms

1
New cards

Public Key Infrastructure (PKI)

Management of digital certificates and the binding of public keys to people or devices.

2
New cards

Public key

A cryptographic key that is shared publicly and used to encrypt information, which can only be decrypted by the corresponding private key.

3
New cards

Private key

A cryptographic key kept secret by the owner, used to decrypt information that has been encrypted with the corresponding public key.

4
New cards

Key Escrow

Refers to someone else holding the decryption keys, with private keys held by a third party.

5
New cards

Full-Disk Encryption

Encryption that protects an entire hard disk/storage drive, like BitLocker or FileVault.

6
New cards

Partition/volume encryption

Encryption of sections of a storage drive - also achievable via BitLocker and FileVault.

7
New cards

File encryption

Encryption of individual files on a storage device, ensuring that only authorized users can access the contents. Examples include Encrypting File System (EFS) on Windows.

8
New cards

Transport Encryption

Encryption of data in transit or traversing a network, such as HTTPS or using a VPN.

9
New cards

Asymmetric Encryption

A cryptographic method using a pair of keys, a public key for encryption and a private key for decryption.

10
New cards

Symmetric Encryption

A cryptographic method that uses the same key for both encryption and decryption.

11
New cards

Key Length

Refers to the size of the key used in an encryption algorithm, impacting strength and performance.

12
New cards

Trusted Platform Module (TPM)

Hardware that performs cryptographic functions and contains a cryptographic processor.

13
New cards

Database encryption

Encryption of data stored in a database. Involves transparent encryption, where all database information is encrypted with a symmetric key.

14
New cards

Record-level encryption

Encryption of individual columns within a database - separate symmetric keys are used for each column.

15
New cards

Key Management System

Software used to manage and protect cryptographic keys throughout their lifecycle.

16
New cards

Obfuscation

A technique used to alter or obscure data to prevent unauthorized access.

17
New cards

Steganography

A security method that conceals a message within another message or object.

18
New cards

Tokenization

Replacing sensitive data with a non-sensitive placeholder to protect original information.

19
New cards

Data masking

A data protection technique that replaces sensitive data with fictional but realistic values to protect confidentiality.

20
New cards

Digital Signatures

A method for verifying the authenticity and integrity of a message using a hash and encryption.

21
New cards

Blockchain

A distributed ledger technology that securely records transactions across multiple computers.

22
New cards

Blockchain (function)

Requested transactions are verified by nodes (devices) on a network, adding transactions to blocks, then calculating hashes to verify blocks. If transactions/blocks are tampered with, the block is rejected by the blockchain.

23
New cards

Certificate Authorities

Organizations that issue and manage digital certificates, verifying identities.

24
New cards

Certificate Revocation List

A list of revoked digital certificates, managed by a certificate authority.

25
New cards

Online Certificate Status Protocol (OSCP)

A protocol used for obtaining the revocation status of a digital certificate in real-time via the SSL handshake.

26
New cards

Self-signed Certificate

A digital certificate signed by the entity it certifies, not recommended for widespread use.

27
New cards

Root of Trust

PKI model ensuring that digital certificates are authentic and issued by a trusted authority.

28
New cards

Wildcard Certificate

A digital certificate allowing a single certificate to secure multiple subdomains of a domain.

29
New cards

Encryption algorithms

Formulae used to encrypt/decrypt data that can vary in complexity, security, and performance.

30
New cards

Out-of-band key exchange

Non-Internet transfer of encryption keys (e.g., telephone, postal services, or physical delivery methods).

31
New cards

Hardware security module (HSM)

High-end cryptographic hardware designed to manage thousands of cryptographic keys for hardware devices. Includes key backups and cryptographic accelerators.

32
New cards

In-band key exchange

Internet-based key exchange - the key is protected with additional symmetric encryption.

33
New cards

Secure enclave

A secure area within a processor that protects sensitive data, allowing for secure execution of code and storage of cryptographic keys.

Explore top notes

note
English 2 Vocab 1
Updated 1198d ago
0.0(0)
note
Ch 2: Ecosystems and Ecology
Updated 1064d ago
0.0(0)
note
Factors and Multiples
Updated 1189d ago
0.0(0)
note
2.8: acids
Updated 1257d ago
0.0(0)
note
2. New and Emerging Technologies
Updated 1121d ago
0.0(0)
note
In Sickness and in Health
Updated 1064d ago
0.0(0)
note
concussion infographics
Updated 467d ago
0.0(0)
note
English 2 Vocab 1
Updated 1198d ago
0.0(0)
note
Ch 2: Ecosystems and Ecology
Updated 1064d ago
0.0(0)
note
Factors and Multiples
Updated 1189d ago
0.0(0)
note
2.8: acids
Updated 1257d ago
0.0(0)
note
2. New and Emerging Technologies
Updated 1121d ago
0.0(0)
note
In Sickness and in Health
Updated 1064d ago
0.0(0)
note
concussion infographics
Updated 467d ago
0.0(0)

Explore top flashcards

flashcards
3. Fallacies
30
Updated 831d ago
0.0(0)
flashcards
Spanish capitals
20
Updated 1210d ago
0.0(0)
flashcards
honors english exam terms
40
Updated 1197d ago
0.0(0)
flashcards
17 - TỪ VỰNG | Quizlet
23
Updated 560d ago
0.0(0)
flashcards
vocab 4
42
Updated 539d ago
0.0(0)
flashcards
Wetter
47
Updated 1062d ago
0.0(0)
flashcards
3. Fallacies
30
Updated 831d ago
0.0(0)
flashcards
Spanish capitals
20
Updated 1210d ago
0.0(0)
flashcards
honors english exam terms
40
Updated 1197d ago
0.0(0)
flashcards
17 - TỪ VỰNG | Quizlet
23
Updated 560d ago
0.0(0)
flashcards
vocab 4
42
Updated 539d ago
0.0(0)
flashcards
Wetter
47
Updated 1062d ago
0.0(0)