Sec+

studied byStudied by 1 person
0.0(0)
Get a hint
Hint

Version control

1 / 38

39 Terms

1

Version control

Software that tracks changes and allows reverting to previous versions.

New cards
2

Public key infrastructure (PKI)

System using public and private keys for data encryption and verification.

New cards
3

Public key

Visible digital lock used for encryption in PKI; requires private key for decryption.

New cards
4

Private key

Secret key paired with a public key for decrypting encrypted data.

New cards
5

Key escrow

Process of storing private keys with a trusted third party for data access if keys are lost.

New cards
6

Full-disk encryption

Encrypting all data on a disk including OS, applications, and user files.

New cards
7

Partition encryption

Encrypting specific partitions or sections of a hard drive.

New cards
8

File encryption

Encrypting files or folders to protect their contents.

New cards
9

Volume encryption

Encrypting a virtual container or disk image acting as a separate storage volume.

New cards
10

Database encryption

Securing a database by encrypting sensitive stored data.

New cards
11

Transport/communication encryption

Encoding information before sending over a network to prevent unauthorized interception.

New cards
12

Asymmetric encryption

Using separate keys for encryption and decryption (public and private keys).

New cards
13

Symmetric encryption

Using a single shared key for both encryption and decryption.

New cards
14

Key exchange

Securely sharing cryptographic keys between parties for message encryption.

New cards
15

Algorithms

Mathematical procedures for generating cryptographic keys and ensuring secure communication.

New cards
16

Key length

The longer the key, the more secure it is against guessing or attacks.

New cards
17

Trusted Platform Module (TPM)

Microchip on a computer's motherboard for secure storage of keys and sensitive data.

New cards
18

Hardware security module (HSM)

Hardware device for secure key storage, commonly used in high-security environments.

New cards
19

Key management system

System for generating, storing, distributing, and revoking encryption keys.

New cards
20

Secure enclave

Highly protected area for secure operations like encryption within computer systems.

New cards
21

Obfuscation

Technique to make code or data harder to understand without changing its functionality.

New cards
22

Steganography

Method of hiding secret information within non-secret files or messages.

New cards
23

Tokenization

Protecting sensitive data by replacing it with non-sensitive placeholders.

New cards
24

Data masking

Protecting data by replacing it with fictional or anonymized data while maintaining format.

New cards
25

Hashing

Process of converting data into a unique, scrambled output (hash value) in cryptography.

New cards
26

Salting

Adding random data to passwords when hashing to enhance security.

New cards
27

Digital signatures

Digital signatures authenticate the identity of message senders or document signers.

New cards
28

Key stretching

Technique to increase password security by requiring more time and resources for attackers.

New cards
29

Blockchain

Distributed digital ledger technology recording transactions across a network.

New cards
30

Open public ledger

System where transactional data is transparently shared and accessible to all network participants.

New cards
31

Certificates

Digital documents validating entity identity for secure internet communication.

New cards
32

Certificate authorities

Trusted entities issuing digital certificates to authenticate individuals, organizations, or devices.

New cards
33

Certificate revocation lists (CRLs)

Lists by CAs containing revoked digital certificate serial numbers before expiration.

New cards
34

Online Certificate Status Protocol (OCSP)

Protocol for real-time verification of digital certificate revocation status.

New cards
35

Self-signed

Digital certificate signed by its creator rather than a trusted CA.

New cards
36

Third-party

Entity validating certificate authenticity but not the issuer or subject.

New cards
37

Root of trust

Inherently trusted security system serving as the basis for trust relationships.

New cards
38

Certificate signing request (CSR) generation

Process of generating key pair, creating CSR file, and submitting it to a CA for approval.

New cards
39

Wildcard

Digital certificate securing a domain and its subdomains with a single certificate.

New cards

Explore top notes

note Note
studied byStudied by 18 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 3 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 10 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 43 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 3 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 11 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 15 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 58 people
Updated ... ago
5.0 Stars(3)

Explore top flashcards

flashcards Flashcard40 terms
studied byStudied by 10 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard85 terms
studied byStudied by 8 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard62 terms
studied byStudied by 3 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard58 terms
studied byStudied by 35 people
Updated ... ago
5.0 Stars(2)
flashcards Flashcard34 terms
studied byStudied by 6 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard55 terms
studied byStudied by 7 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard84 terms
studied byStudied by 6 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard40 terms
studied byStudied by 27 people
Updated ... ago
5.0 Stars(8)