1/11
Vocabulary flashcards covering key management concepts: generation, exchange, storage, secure transmission, and periodic rotation of encryption keys.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Key management
The process by which an organization generates, exchanges, stores, and uses encryption keys to protect data.
Master password
A password used to create the initial encryption key for systems like BitLocker or FileVault.
Strong key
A robust encryption key whose security depends on its quality and unpredictability; a weak key (eg, a weak password) compromises security.
BitLocker / FileVault
Disk encryption tools that encrypt the contents of a hard drive and typically rely on a master password as the key.
Weak password risk
Using a weak password as the key allows attackers to guess the key and breach confidentiality despite strong algorithms.
Symmetric encryption
Encryption that uses the same key to encrypt and decrypt data; the key must be exchanged securely.
Asymmetric encryption
Public-key cryptography used to protect a symmetric key during transmission to the intended recipient.
Diffie-Hellman
An example of a secure key-exchange algorithm used to establish a symmetric key over an insecure channel.
Secure key storage
Storing encryption keys securely when they are not in use to prevent unauthorized access.
Key rotation
Changing encryption keys periodically to limit the time an attacker has to compromise a key.
Confidentiality breach
A breach that occurs if an attacker gains access to the key and can decrypt sensitive data.
Attack window / clock reset
The period during which an attacker can try to break a key; changing the key resets this clock and enhances security.