1.4 simple

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/39

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

40 Terms

1
New cards

PKI (Public Key Infrastructure)

A framework that manages digital keys and certificates to enable secure electronic communication

2
New cards

Symmetric Encryption

Uses the same key for both encryption and decryption

3
New cards

Asymmetric Encryption

Uses a pair of keys - one public and one private - for encryption and decryption

4
New cards

Symmetric

Uses the same key for encrypting and decrypting.

5
New cards

Key exchange

How parties share encryption keys securely.

6
New cards

Algorithms

Formulas used to encrypt and decrypt data

7
New cards

Key length

The size of the cryptographic key (longer = stronger).

8
New cards

Trusted Platform Module (TPM)

Chip that stores keys securely.

9
New cards

Hardware Security Module (HSM)

Specialized device for key management.

10
New cards

Key management system

Software for generating, storing, and handling keys.

11
New cards

Secure enclave

Isolated area for sensitive processing.

12
New cards

Steganography

Hides data within other data (like a picture).

13
New cards

Tokenization

Replaces sensitive data with tokens.

14
New cards

Data masking

Hides real data with fake but realistic values.

15
New cards

Hashing

One-way conversion of data, often used for passwords.

16
New cards

Salting

Adding random data before hashing to make it unique.

17
New cards

Digital signatures

Signing data to prove authenticity.

18
New cards

Key stretching

Making weak keys stronger using extra algorithms.

19
New cards

Blockchain

Linked records secured by cryptography.

20
New cards

Open public ledger

Blockchain that is visible to everyone.

21
New cards

Certificates

Digital documents that prove identity

22
New cards

Certificate authorities

Trusted organizations that issue certificates.

23
New cards

Certificate revocation lists (CRLs)

List of invalid certificates.

24
New cards

Online Certificate Status Protocol (OCSP)

Checks if a certificate is still valid.

25
New cards

Self-signed

Certificate signed by its owner.

26
New cards

Third-party

Signed by a trusted certificate authority.

27
New cards

Root of trust:

Trusted starting point for a chain of certificates.

28
New cards

Certificate signing request (CSR)

Request to a CA for a certificate.

29
New cards

Wildcard

Certificate that can cover multiple domains.

30
New cards

Public Key

Key everyone can know, used to encrypt or verify.

31
New cards

Private key

Secret key, used to decrypt or sign.

32
New cards

Key escrow

Secure way for a third party to keep keys for recovery.

33
New cards

Encryption

Converting data into a coded form to protect it.

34
New cards

Full-disk

Encrypts whole drives.

35
New cards

Partition

Encrypts sections of storage.

36
New cards

File

Encrypts a single file.

37
New cards

Volume

Encrypts a whole storage volume.

38
New cards

Database

Encrypts entire databases.

39
New cards

Record

Encrypts specific data entries.

40
New cards

Transport/communication

Encrypts data being sent over networks.