Sec+

0.0(0)
studied byStudied by 1 person
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/38

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

39 Terms

1
New cards
Version control
Software that tracks changes and allows reverting to previous versions.
2
New cards
Public key infrastructure (PKI)
System using public and private keys for data encryption and verification.
3
New cards
Public key
Visible digital lock used for encryption in PKI; requires private key for decryption.
4
New cards
Private key
Secret key paired with a public key for decrypting encrypted data.
5
New cards
Key escrow
Process of storing private keys with a trusted third party for data access if keys are lost.
6
New cards
Full-disk encryption
Encrypting all data on a disk including OS, applications, and user files.
7
New cards
Partition encryption
Encrypting specific partitions or sections of a hard drive.
8
New cards
File encryption
Encrypting files or folders to protect their contents.
9
New cards
Volume encryption
Encrypting a virtual container or disk image acting as a separate storage volume.
10
New cards
Database encryption
Securing a database by encrypting sensitive stored data.
11
New cards
Transport/communication encryption
Encoding information before sending over a network to prevent unauthorized interception.
12
New cards
Asymmetric encryption
Using separate keys for encryption and decryption (public and private keys).
13
New cards
Symmetric encryption
Using a single shared key for both encryption and decryption.
14
New cards
Key exchange
Securely sharing cryptographic keys between parties for message encryption.
15
New cards
Algorithms
Mathematical procedures for generating cryptographic keys and ensuring secure communication.
16
New cards
Key length
The longer the key, the more secure it is against guessing or attacks.
17
New cards
Trusted Platform Module (TPM)
Microchip on a computer's motherboard for secure storage of keys and sensitive data.
18
New cards
Hardware security module (HSM)
Hardware device for secure key storage, commonly used in high-security environments.
19
New cards
Key management system
System for generating, storing, distributing, and revoking encryption keys.
20
New cards
Secure enclave
Highly protected area for secure operations like encryption within computer systems.
21
New cards
Obfuscation
Technique to make code or data harder to understand without changing its functionality.
22
New cards
Steganography
Method of hiding secret information within non-secret files or messages.
23
New cards
Tokenization
Protecting sensitive data by replacing it with non-sensitive placeholders.
24
New cards
Data masking
Protecting data by replacing it with fictional or anonymized data while maintaining format.
25
New cards
Hashing
Process of converting data into a unique, scrambled output (hash value) in cryptography.
26
New cards
Salting
Adding random data to passwords when hashing to enhance security.
27
New cards
Digital signatures
Digital signatures authenticate the identity of message senders or document signers.
28
New cards
Key stretching
Technique to increase password security by requiring more time and resources for attackers.
29
New cards
Blockchain
Distributed digital ledger technology recording transactions across a network.
30
New cards
Open public ledger
System where transactional data is transparently shared and accessible to all network participants.
31
New cards
Certificates
Digital documents validating entity identity for secure internet communication.
32
New cards
Certificate authorities
Trusted entities issuing digital certificates to authenticate individuals, organizations, or devices.
33
New cards
Certificate revocation lists (CRLs)
Lists by CAs containing revoked digital certificate serial numbers before expiration.
34
New cards
Online Certificate Status Protocol (OCSP)
Protocol for real-time verification of digital certificate revocation status.
35
New cards
Self-signed
Digital certificate signed by its creator rather than a trusted CA.
36
New cards
Third-party
Entity validating certificate authenticity but not the issuer or subject.
37
New cards
Root of trust
Inherently trusted security system serving as the basis for trust relationships.
38
New cards
Certificate signing request (CSR) generation
Process of generating key pair, creating CSR file, and submitting it to a CA for approval.
39
New cards
Wildcard
Digital certificate securing a domain and its subdomains with a single certificate.