(1) Foundations / Encryption Basics

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/6

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

7 Terms

1
New cards

A process that transforms readable information into an unreadable format to prevent unauthorized access, which can be reversed to retrieve the original content. Like putting a letter in a locked box and giving the key only to the intended recipient.

Encryption / Decryption

Exam Tips: Look for clues like “convert plaintext to ciphertext” or “restore original data”; consider whether data is at rest or in transit.

2
New cards

A software tool designed to encrypt individual files, making them unreadable without the correct password or key. Useful for protecting single documents or folders. Like writing a secret message in a private notebook with a lock.

AEScrypt

Exam Tips: File-level encryption; cross-platform; check for “encrypt single file” clues.

3
New cards

A Windows-based full disk encryption tool that secures the entire storage drive and integrates with TPM for hardware-backed key protection. Like locking an entire filing cabinet in your office.

BitLocker

Exam Tips: Full disk encryption on Windows; can use TPM for key storage; look for “Windows” or “full drive” clues.

4
New cards

A macOS-based full disk encryption system that secures the entire startup disk, using built-in hardware features for key storage. Like sealing your MacBook’s drive in a secure vault.

FileVault

Exam Tips: Full disk encryption on Mac; integrates with system keychain; “Mac” or “startup disk encryption” clues.

5
New cards

Encryption that relies on dedicated hardware to perform cryptographic operations efficiently, often improving performance compared to software-only methods. Like having a trusted vault inside your device instead of using software locks.

Hardware Encryption

Exam Tips: More efficient than software; look for “hardware-level” or “less resource-intensive” clues.

6
New cards

A dedicated chip that securely stores cryptographic keys and performs encryption tasks with minimal system performance impact. Like a trusted security guard inside your computer that only responds to you.

Trusted Platform Module (TPM)

Exam Tips: Device-level disk encryption; hardware-based key storage; minimal performance impact; look for “integrated processor.”

7
New cards

A tamper-evident physical device designed to safeguard cryptographic keys and perform related operations securely. Like a bank vault for digital secrets, often used in enterprise environments.

Hardware Security Module (HSM)

Exam Tips: Enterprise key management; secures keys and cryptographic processes; not typically for individual disk encryption.