Send a link to your students to track their progress
7 Terms
1
New cards
The process of encrypting data when it is stored or saved in a storage device or server to protect it from unauthorized access.
Data encryption at rest
2
New cards
The key used to encrypt and decrypt data at rest. If obtained by an attacker, it can be used to access and modify the data.
Data encryption key (DEK)
3
New cards
An asymmetric encryption key used to encrypt the DEK. It helps protect the DEK and is stored in a key management server (KMS).
Key encryption key (KEK)
4
New cards
A server that stores and manages encryption keys, including the encrypted DEK. It grants access to the DEK based on the validity of the KEK.
Key management server (KMS)
5
New cards
The process of encrypting data when it is being transmitted or sent over a network to protect it from unauthorized interception or manipulation.
Encryption of data in transit
6
New cards
Another term for data in transit, referring to data that is being transmitted or sent over a network.
Data in flight
7
New cards
A network connection that connects different locations or networks over a wide geographic area, such as the connection between private and public clouds in a hybrid cloud environment.