Cryptography & Data Protection - Sec+

0.0(0)
studied byStudied by 0 people
0.0(0)
call with kaiCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/46

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

47 Terms

1
New cards

HIPPA

Regulation protecting PHI - Protected Health Information.

2
New cards

Homomorphic Encryption

Allows data to be processed without being decrypted, effectively securing data-in-use.

3
New cards

HSM

Hardware Security Module - a dedicated hardware device or appliance that provides secure storage, management, and use of cryptographic keys and sensitive data.

4
New cards

Key Stretching

A technique used in cryptography to enhance the security of passwords or cryptographic keys by increasing the time and computational effort required to derive the original plaintext from its hashed form. This process makes brute-force attacks and other password cracking techniques more difficult and time-consuming.

5
New cards

Tokenization

The process of substituting a sensitive data element with a non-sensitive equivalent, referred to as a token.

6
New cards

OCSP

Online Certificate Status Protocol, an Internet protocol used to obtain the real-time revocation status of a digital certificate.

7
New cards

Cryptographic Erasure

Encrypting the data on the storage media and then securely deleting the encryption key, rendering the encrypted data unreadable without the key.

8
New cards

CRL

Certificate Revocation List, a list of digital certificates that have been revoked before their scheduled expiration dates.

9
New cards

Nonce

Number used once is a cryptographic term referring to a random or semi-random number that is generated for a specific purpose, typically to ensure the freshness and uniqueness of data in cryptographic communications or protocols. Nonces are used to prevent replay attacks and to add randomness to cryptographic operations.

10
New cards

PCI

Payment Card Information, a type of regulated data.

11
New cards

Salting

A technique used in cryptography to strengthen the security of hashed passwords or other data by adding a random value (known as a salt) to the input before hashing. This random value ensures that even if two users have the same password, their hashed values will differ.

12
New cards

TPM

A specialized hardware component designed to provide a secure foundation for various security-related functions in computing devices, particularly in the context of system integrity and cryptographic operations.

13
New cards

RSA

RSA (Rivest-Shamir-Adleman) is Asymmetric.

14
New cards

PKP

Public Key Pinning, a security mechanism that associates a specific cryptographic public key with a web server to prevent impersonation using fraudulent certificates.

15
New cards

Public Key Infrastructure (PKI)

A framework of policies, procedures, and technologies used to manage digital certificates and public-key encryption, providing a secure way to verify the authenticity of digital entities such as users, devices, or servers.

16
New cards

MD5

MD5 (Message Digest Algorithm 5) is used for hashing.

17
New cards

RIPEMD

RIPEMD (RACE Integrity Primitives Evaluation Message Digest) is used for hashing.

18
New cards

S/MIME

Secure Multipart Internet Message Extensions Leverages email certificates to both sign and encrypt email content, ensuring both authenticity and confidentiality.

19
New cards

PHI

Protected Health Information, a type of regulated data.

20
New cards

PII

Personally Identifiable Information, a type of regulated data.

21
New cards

Kernel Mode

Also known as Supervisor Mode or Ring 0, refers to a privileged mode of execution where the operating system's kernel has unrestricted access to the hardware and system resources.

22
New cards

MAC

Mandatory Access Control: Regulates access based on organization-set policies without user alteration.

23
New cards

Infrared Sensor

IR sensors can be either active or passive. Active IR sensors emit infrared light and measure the reflection, while passive IR sensors detect the infrared light naturally emitted by objects. Used in: Motion Detection, Remote Controls, Thermal Cameras, Temperature sensors.

24
New cards

Microwave Sensor

A microwave sensor uses microwave radar to detect objects and motion. These sensors emit microwaves and measure the time it takes for the waves to be reflected back after hitting an object. Used in: Automatic Doors, Speed Radars, Occupancy Sensing, Motion sensors.

25
New cards

MOA

Memorandum of Agreement: Formal document outlining specific responsibilities and roles of involved parties.

26
New cards

MOU

Memorandum of Understanding: Outlines a mutual agreement on project goals, often the first step toward collaboration.

27
New cards

3DES

3DES (Triple DES) is Symmetric.

28
New cards

AES

AES (Advanced Encryption Standard) is Symmetric.

29
New cards

DLP

Data Loss Prevention, a set of tools and processes used to ensure that sensitive data is not lost, misused, or accessed by unauthorized users.

30
New cards

Asymmetric Encryption

Uses a pair of keys: a public key and a private key. The public key is used to encrypt the data, while the private key is used to decrypt it. The public key can be shared openly, but the private key must be kept secure.

31
New cards

Asymmetric Encryption Algorithms

RSA (Rivest-Shamir-Adleman)
ECC (Elliptic Curve Cryptography)
DSA (Digital Signature Algorithm)

32
New cards

Block Cipher

An encryption algorithm that divides plaintext into fixed-size blocks, typically 64 or 128 bits, and then encrypts each block individually. The same key is used to encrypt and decrypt each block.

33
New cards

Chiper Lock

A Mechanical locking mechanism that uses a mechanical keypad for entry.

34
New cards

DES

DES (Data Encryption Standard) is Symmetric.

35
New cards

DH (Diffie-Hellman)

Diffie Hellman - Asymmetric algorithm commonly used for key exchange inside of VPN tunnels.

36
New cards

Digital Signature

A cryptographic mechanism used to verify the authenticity and integrity of digital messages or documents. It provides assurance that the message or document was created by a known sender (authentication) and has not been altered since it was signed (integrity).

37
New cards

Digital Signature Algorithms

Cryptographic mechanism used to verify authenticity and integrity using algorithms such as DSS (Digital Signature Standard), RSA (Rivest-Shamir-Adleman), and DSA (Digital Signature Algorithm)

38
New cards

DKIM

Domain Keys Identified Mail (DKIM) is a method of email authentication that helps prevent spammers and other malicious parties from impersonating a legitimate domain.

39
New cards

ECC

ECC (Elliptic Curve Cryptography) is Asymmetric.

40
New cards

Hash Attack Methods

Used to exploit weaknesses in hashing mechanisms, including Pass the Hash attacks and Birthday Attacks

41
New cards

Hashing Algorithms

MD5 (Message Digest Algorithm 5), SHA-1 (Secure Hash Algorithm 1), SHA-256 (Secure Hash Algorithm 256), SHA-3 (Secure Hash Algorithm 3), RIPEMD (RACE Integrity Primitives Evaluation Message Digest)

42
New cards

DMARC

DMARC tells mail servers what to do when DKIM or SPF fail, whether that is marking the failing emails as "spam," delivering the emails anyway, or dropping the emails altogether.

43
New cards

DSA

(DSA) Digital Signature Algorithm is Asymmetric.

44
New cards

SHA-1, SHA-256, SHA-3

SHA (Secure Hash Algorithm) 1,3, and 256 are used for hashing.

45
New cards

Stream Cipher

An encryption algorithm that encrypts plaintext one bit or byte at a time using a keystream. Unlike block ciphers, which process fixed-size blocks of data, stream ciphers encrypt data continuously, which can provide faster encryption for real-time communications.

46
New cards

Symmetric Encryption

Uses a single key for both encryption and decryption of data. The same key must be securely shared and kept secret between the communicating parties. This method is efficient and faster than asymmetric encryption.

47
New cards

Symmetric Encryption Algorithms

Advanced Encryption Standard (AES)
Data Encryption Standard (DES)
Triple DES (3DES)
Blowfish
RC Cipher Suite