cybersecurity 4.1

studied byStudied by 6 people
5.0(1)
Get a hint
Hint

ciphertext

1 / 42

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

43 Terms

1

ciphertext

The encrypted message generated by a cipher

New cards
2

Steganography

Concealing messages with other data

New cards
3

modulus/mod

operation finds the remainder of a division, used in ceasar and affine cipher

New cards
4

substitution cipher

when each letter in an alphabet is replaced with a different character or symbol

New cards
5

encryption key

A string of characters used as a parameter that determines the output of an encryption algorithm

New cards
6

private/symmetric key encryption

an encryption method where the sender and receiver share a single private key

New cards
7

cipher

an algorithm used for encryption or decryption

New cards
8

cryptography

The science and art of delivering a message securely and confidentially

New cards
9

plaintext

The original message that needs to be encrypted

New cards
10

public/asymmetric key encryption

an encryption method that uses two keys, a public key available to everyone and a private key belonging to one owner.

New cards
11

ALGORITHM

steps needed to accomplish a task

New cards
12

What is the difference between “Sign and Encrypt”, “Encrypt” and “Sign”?

With encrypt, you’re using a public key and the receiver will have to use their private key to decrypt the message. With sign, the opposite of encrypt is happening, I’ll be using my private key and the receiver will be using my public key.

New cards
13

one-way function

a math function that is easy to do but very hard to undo.

New cards
14

statements that are true about symmetric encryption.

It has a large key space

New cards
15

statements that are true about symmetric encryption.

It exchanges one shared key.

New cards
16

statements that are true about symmetric encryption.

It uses a relatively simple and fast algorithm.

New cards
17

statements that are true about asymmetric encryption.

It uses a relatively smaller key space.

New cards
18

statements that are true about asymmetric encryption.

It is more secure because of the privately held keys.

New cards
19

statements that are true about asymmetric encryption.

It is relatively slow due to its more complex calculations.

New cards
20

statements that are true about asymmetric encryption.

It can be used for encrypting and signing a message.

New cards
21

Data at rest

Data that’s stored somewhere else; ex: bank account

New cards
22

Data in transit

data that’s being transferred between applications,host or around the network; ex: an email on its way to a recipient; the results coming back from an internet search

New cards
23

Data in process

data that is manipulated by an application; ex: A website calculating the tax of an item

New cards
24

TRUSTED PLATFORM MODULE

mechanism that provides secure encryption for a device

New cards
25

How do recovery keys and hash values differ

Recovery keys are created by the operating system to store the key to the drive, in the event a password is lost. \n Hash values are created at encryption time and represent passwords that control access to the encrypted data.

New cards
26

Disks

physical drives inside of a pc

New cards
27

volume

the accessible storage area on a hard drive or disk

New cards
28

Partition

a part of a volume that's formatted for the operating system to use as a storage area

New cards
29

container

a file that has other data and acts like a drive

New cards
30

HASH

a computational process that converts data of varying size to a fixed-size.

New cards
31

CRYPTOCURRENCY

A digital cash system

New cards
32

what can be encrypted to secure data at rest?

  • Entire disk drives

New cards
33

what can be encrypted to secure data at rest?

  • Portions of disk drives, such as containers

New cards
34

what can be encrypted to secure data at rest?

  • Individual files

New cards
35

what can be encrypted to secure data at rest?

Application specific documents

New cards
36

what happens when you mount vs dismount the container.

When you mount it, the drive is visible in file explorer, but when you dismount it, it is no longer visible

New cards
37

With all of these historical examples of writing, what are the limitations?

  • Today, computer algorithms could quickly discover patterns and find the hidden data.

New cards
38

With all of these historical examples of writing, what are the limitations?

  • Messages and keys could be discovered by outsiders.

New cards
39

covert

messages that we want to keep hidden

New cards
40

overt

messages that you don’t mind if people can see

New cards
41

SUBSTITUTION STEGANOGRAPHY

Substitution just replaces data that isn’t important or redundant information with the covert data.

New cards
42

ALTERNATE DATA STREAMS

Files can be separated into multiple resources, so you can attach an icon to a file and the icon will be stored with the file.

New cards
43

STEGANALYSIS

the process of analyzing data for hidden content

New cards

Explore top notes

note Note
studied byStudied by 127 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 39 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 7 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 33 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 15 people
Updated ... ago
5.0 Stars(3)
note Note
studied byStudied by 16 people
Updated ... ago
5.0 Stars(3)
note Note
studied byStudied by 1 person
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 18828 people
Updated ... ago
4.6 Stars(97)

Explore top flashcards

flashcards Flashcard61 terms
studied byStudied by 23 people
Updated ... ago
5.0 Stars(2)
flashcards Flashcard54 terms
studied byStudied by 102 people
Updated ... ago
4.4 Stars(5)
flashcards Flashcard20 terms
studied byStudied by 11 people
Updated ... ago
5.0 Stars(3)
flashcards Flashcard148 terms
studied byStudied by 2 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard20 terms
studied byStudied by 3 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard33 terms
studied byStudied by 26 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard186 terms
studied byStudied by 15 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard110 terms
studied byStudied by 12 people
Updated ... ago
5.0 Stars(1)