4-rto rpo, cryptography intro (symmetric algorithms)

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/30

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

31 Terms

1
New cards

Recovery Time Objective (RTO)

Maximum amount of time that it should take to recover a service after a disaster

2
New cards

Recovery Point Objective (RPO)

Maximum time period from which data may be lost in the wake of a disaster

3
New cards

Recovery service level (RSL)

Percentage of a service that must be available during disaster

4
New cards

Differential backup

Includes all data that has changed since last full backup

5
New cards

Incremental backup

Includes data that has changed since last full or incremental backup

6
New cards

Hot site

Fully operational data centers stocked with equipment and data, available at a moments notice

7
New cards

Cold site

Empty data centers stocked with core equipment and relatively inexpensive

8
New cards

Warm sites

In-between hot and cold. Somewhat stocked

9
New cards

Read through disaster recovery test

Read through procedures and team provides feedback

10
New cards

Walk through/table top excersize

Gathers the team together for a formal review of the disaster recovery plan

11
New cards

Simulation test disaster recovery

Uses a practice scenario to test the disaster recovery pan

12
New cards

Parallel disaster recovery test

Activates the disaster recovery environment but does not switch operations there

13
New cards

Full interruption test

Switches primary operations to the alternate environment

14
New cards

After action report

Creates a formal record of a disaster recovery (DR) or business continuity (BC) event

15
New cards
16
New cards

Code

A system that substitutes one word or phrase for another, codes are intended to provide secrecy/ efficiency

17
New cards

Cipher

A system that uses mathematical algorithms to encrypt and decrypt messages

18
New cards

Stream cipher

Operates on one character or bit of a message at a time

19
New cards

Block cipher

Operates on large segments of the message at the same time

20
New cards

Substitution cipher

Changes the characters in a message. Wx: ROT13

21
New cards

Transposition cipher

Rearranges the characters in a message

22
New cards

NIST cryptographic life cycle

  1. Initiation

  2. Acquisition/development

  3. Implementation/assessment

  4. Operation/maintenance

  5. Disposition (sunset)

23
New cards

If Alice wants to send a message to Bob using symmetric cryptography, what key does she use to encrypt the message?

Shared secret key

24
New cards
25
New cards

3DES

  • Symmetric encryption algorithm

  • Block cipher operating on 64 bit blocks

  • Effective key length of 112 bits

  • Is weak being phased out

26
New cards

Advanced Encryption standard (AES)

  • Considered secure

  • Block cipher operating on 128 bit blocks

  • Key length of 128, 192, or 256 bits

27
New cards

Blowfish

  • Symmetric encryption algorithm

  • Block cipher operating on 64 bit blocks

  • Key length between 32 bit and 448 bit

  • Not secure anymore

28
New cards

Twofish

  • Symmetric algorithm using a block cipher operating on 128 bit blocks

  • Key length of 128, 192, or 256 bits

  • Secure

29
New cards

RC4

  • Not secure anymore

  • Symmetric algorithm

  • Stream cipher

  • Variable key length between 40 and 2048 bits

30
New cards

What basic cryptographic functions does the AES algorithm use to encrypt plaintext?

Both substitution and transposition

31
New cards