1/6
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
A process that transforms readable information into an unreadable format to prevent unauthorized access, which can be reversed to retrieve the original content. Like putting a letter in a locked box and giving the key only to the intended recipient.
Encryption / Decryption
Exam Tips: Look for clues like “convert plaintext to ciphertext” or “restore original data”; consider whether data is at rest or in transit.
A software tool designed to encrypt individual files, making them unreadable without the correct password or key. Useful for protecting single documents or folders. Like writing a secret message in a private notebook with a lock.
AEScrypt
Exam Tips: File-level encryption; cross-platform; check for “encrypt single file” clues.
A Windows-based full disk encryption tool that secures the entire storage drive and integrates with TPM for hardware-backed key protection. Like locking an entire filing cabinet in your office.
BitLocker
Exam Tips: Full disk encryption on Windows; can use TPM for key storage; look for “Windows” or “full drive” clues.
A macOS-based full disk encryption system that secures the entire startup disk, using built-in hardware features for key storage. Like sealing your MacBook’s drive in a secure vault.
FileVault
Exam Tips: Full disk encryption on Mac; integrates with system keychain; “Mac” or “startup disk encryption” clues.
Encryption that relies on dedicated hardware to perform cryptographic operations efficiently, often improving performance compared to software-only methods. Like having a trusted vault inside your device instead of using software locks.
Hardware Encryption
Exam Tips: More efficient than software; look for “hardware-level” or “less resource-intensive” clues.
A dedicated chip that securely stores cryptographic keys and performs encryption tasks with minimal system performance impact. Like a trusted security guard inside your computer that only responds to you.
Trusted Platform Module (TPM)
Exam Tips: Device-level disk encryption; hardware-based key storage; minimal performance impact; look for “integrated processor.”
A tamper-evident physical device designed to safeguard cryptographic keys and perform related operations securely. Like a bank vault for digital secrets, often used in enterprise environments.
Hardware Security Module (HSM)
Exam Tips: Enterprise key management; secures keys and cryptographic processes; not typically for individual disk encryption.