Cyber Chapter 3

5.0(2)
studied byStudied by 27 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/19

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 3:33 PM on 1/30/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

20 Terms

1
New cards

(3.1) _____________ is the process of writing or solving messages using a secret code.

Cryptography

2
New cards

________________ is the process used to encrypt and decrypt a message.

Algorithm

3
New cards

________________ is the process of converting one value into another using a mathematical algorithm like MD5 or SHA.

Hashing

4
New cards

Two-way encryption scheme in which encryption and decryption are both performed by the same key.

Symmetric Encryption

5
New cards

A ________________ is a symmetric encryption method that encrypts data one bit at a time. Based on the one-time pad (OTP) concept used extensively during World War 2.

Stream Cipher

6
New cards

List four common cryptographic attacks.

Dictionary, Collision, Birthday, and Downgrade attacks

7
New cards

(3.2) ________________ is a technique that essentially hides or camouflages code or other information so that it is harder to read by unauthorized users.

Obfuscation

8
New cards

List the four stages of the key management lifecycle.

Key generation, storage, Revocation, expiration and renewal

9
New cards

A __________________ is a cryptoprocessor implemented as a module within the CPU on a computer or mobile device.

Trusted Platform Module (TPM)

10
New cards

Methods exposed by a script or program that allow other scripts or programs to use it. For example, enables software developers to access functions of the TCP/IP network stack under a particular operating system.

Application Programming interface (API)

11
New cards

(3.3) The _______________ is a function that converts an arbitrary-length string input to a fixed-length string output.

Hashing algorithm

12
New cards

The _______________ is a message digest encrypted using the sender's private key that is appended to a message to authenticate the sender and prove message integrity.

Digital signature

13
New cards

A _________________ is a security countermeasure that mitigates the impact of precomputed hash table attacks by adding a random value to (salting) each plaintext input.

Salt

14
New cards

List the two most popular implementations of hash algorithms.

Secure Hash Algoritm (SHA) and Message-Digest Algorithm #5 (MD5)

15
New cards

(3.4) List the three data states.

Data at rest, Data in Transist, Data in use

16
New cards

____________________ can be accomplished by encrypting all data on a disk (including system files, temporary files, and the pagefile).

Full Disk Encryption

17
New cards

(3.5) _________________ is a framework of certificate authorities, digital certificates, software, services, and other cryptographic components deployed for the purpose of validating subject identities.

Public Key Infrastructure

18
New cards

A _________________ is identification and authentication information presented in the X.509 format and issued by a certificate authority (CA) as a guarantee that a key pair (as identified by the public key embedded in the certificate) is valid for a particular subject (user or host).

Digital certificate

19
New cards

List the four attributes of a certificate revocation list.

Publish Period, Distribution points, Validity period, signature

20
New cards

In PKI, a CA that issues certificates to intermediate CAs in a hierarchical structure is referred to as the _______________.

Root certificate