1/14
These flashcards cover key vocabulary terms and concepts related to encryption, data states, and access control.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Encryption Algorithm
A process that converts human-readable plaintext into ciphertext.
Ciphertext
The result of encryption, which can only be read by decrypting it with a key.
Decryption
The process of converting ciphertext back into plaintext using a key.
Cryptographic Hash Algorithm
Converts a variable-length string into a fixed-length hash that cannot be reverted to plaintext.
Data at Rest
Data that is stored persistently on storage media.
Data in Transit
Data that is being transmitted over a network.
Data in Use
Data that is currently present in volatile memory, such as RAM or CPU registers.
Access Control System
A mechanism that ensures systems meet the goals of confidentiality, integrity, and availability (CIA triad).
Subjects (in Access Control)
Entities such as people or devices that can request access to resources.
Objects (in Access Control)
Resources that subjects may access, such as networks or files.
Logical Security
A security approach relying on software components rather than physical security measures.
Transport Layer Security (TLS)
A protocol used to protect data in transit through encryption.
Self-Encrypting Drives
Hard drives that automatically encrypt data stored on them.
File System Encryption
An encryption method used to protect files on a computer or storage device.
Database Encryption
A security measure that encrypts data within a database to prevent unauthorized access.