1/19
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
(3.1) _____________ is the process of writing or solving messages using a secret code.
Cryptography
________________ is the process used to encrypt and decrypt a message.
Algorithm
________________ is the process of converting one value into another using a mathematical algorithm like MD5 or SHA.
Hashing
Two-way encryption scheme in which encryption and decryption are both performed by the same key.
Symmetric Encryption
A ________________ is a symmetric encryption method that encrypts data one bit at a time. Based on the one-time pad (OTP) concept used extensively during World War 2.
Stream Cipher
List four common cryptographic attacks.
Dictionary, Collision, Birthday, and Downgrade attacks
(3.2) ________________ is a technique that essentially hides or camouflages code or other information so that it is harder to read by unauthorized users.
Obfuscation
List the four stages of the key management lifecycle.
Key generation, storage, Revocation, expiration and renewal
A __________________ is a cryptoprocessor implemented as a module within the CPU on a computer or mobile device.
Trusted Platform Module (TPM)
Methods exposed by a script or program that allow other scripts or programs to use it. For example, enables software developers to access functions of the TCP/IP network stack under a particular operating system.
Application Programming interface (API)
(3.3) The _______________ is a function that converts an arbitrary-length string input to a fixed-length string output.
Hashing algorithm
The _______________ is a message digest encrypted using the sender's private key that is appended to a message to authenticate the sender and prove message integrity.
Digital signature
A _________________ is a security countermeasure that mitigates the impact of precomputed hash table attacks by adding a random value to (salting) each plaintext input.
Salt
List the two most popular implementations of hash algorithms.
Secure Hash Algoritm (SHA) and Message-Digest Algorithm #5 (MD5)
(3.4) List the three data states.
Data at rest, Data in Transist, Data in use
____________________ can be accomplished by encrypting all data on a disk (including system files, temporary files, and the pagefile).
Full Disk Encryption
(3.5) _________________ is a framework of certificate authorities, digital certificates, software, services, and other cryptographic components deployed for the purpose of validating subject identities.
Public Key Infrastructure
A _________________ is identification and authentication information presented in the X.509 format and issued by a certificate authority (CA) as a guarantee that a key pair (as identified by the public key embedded in the certificate) is valid for a particular subject (user or host).
Digital certificate
List the four attributes of a certificate revocation list.
Publish Period, Distribution points, Validity period, signature
In PKI, a CA that issues certificates to intermediate CAs in a hierarchical structure is referred to as the _______________.
Root certificate