gmu it 223 exam 2 studyguide

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/32

flashcard set

Earn XP

Description and Tags

Flashcards covering key terms and definitions from Modules 5 to 8 on Cryptography and Network Security.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

33 Terms

1
New cards

Cryptography

The science of securing communication through encoding information.

2
New cards

Cryptanalysis

The science of breaking cryptographic codes and ciphers.

3
New cards

Plaintext

The original readable message before encryption.

4
New cards

Ciphertext

The encrypted version of the plaintext.

5
New cards

Code

Replaces entire words or phrases in a message.

6
New cards

Cipher

Replaces individual letters or bits in a message.

7
New cards

Algorithm

A set of rules or steps used to encrypt or decrypt information.

8
New cards

Key

A value that works with an algorithm to encrypt or decrypt data.

9
New cards

Keyspace

The total number of possible keys in an algorithm.

10
New cards

Encryption

Converts plaintext to ciphertext.

11
New cards

Decryption

Converts ciphertext back to plaintext.

12
New cards

Symmetric Cryptography

A method using the same key for both encryption and decryption.

13
New cards

Asymmetric Cryptography

A method using a public key for encryption and a private key for decryption.

14
New cards

Hashing

A one-way function that converts data into a fixed-length string (digest).

15
New cards

Substitution Cipher

Replaces elements of plaintext with ciphertext.

16
New cards

Transposition Cipher

Reorders characters without changing them.

17
New cards

Product Cipher

Combines both substitution and transposition ciphers.

18
New cards

Brute Force Attack

Trying all possible key combinations until the correct one is found.

19
New cards

Dictionary Attack

Uses a list of common passwords to crack a password.

20
New cards

Side-Channel Analysis

Attacks based on physical implementation, like timing or power consumption.

21
New cards

Digital Signature

Provides integrity and non-repudiation to a message.

22
New cards

MAC Function

Message Authentication Code; verifies data integrity and authenticity.

23
New cards

Hash Collision

When two different inputs produce the same hash output.

24
New cards

HMAC

A MAC based on a hash function and a secret key.

25
New cards

Quantum Computing Impact on Cryptography

Could break current algorithms like RSA by factoring large primes quickly.

26
New cards

Steganography

Hiding data within other files, such as images.

27
New cards

Multi-Factor Authentication (MFA)

Using two or more factors to authenticate identity.

28
New cards

Access Control

Mechanisms to restrict access to resources.

29
New cards

Principle of Least Privilege

Users are granted the minimum level of access necessary.

30
New cards

NAT (Network Address Translation)

Allows private IPs to access the internet.

31
New cards

Three-Way Handshake

SYN → SYN-ACK → ACK; a method to establish a TCP connection.

32
New cards

Firewall

A device or software that filters network traffic.

33
New cards

proper format of socket

ip address, port