1/52
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
algorithm
A set of procedures based on a mathematical formula used to encrypt and decrypt the data. Also called a cipher.
cipher
algorithm
asymmetric cryptographic algorithm
Cryptography that uses two mathematically related keys.
birthday attack
A statistical phenomenon that makes finding collisions easier.
blockchain
A shared, immutable ledger that facilitates the process of recording transactions and tracking assets in a business network.
collision
When two files have the same hash.
cryptography
The practice of transforming information so that it is secure and cannot be understood by unauthorized persons.
database-level encryption
Applying cryptography to a database.
decryption
The process of changing encrypted text into the original text.
digital signature
An electronic verification of the sender.
encryption
The process of changing plaintext into ciphertext.
downgrade attack
An attack in which the system is forced to abandon the current higher security mode of operation and “fall back” to implementing an older and less secure mode.
file-level encryption
To encrypt or decrypt files individually.
full-disk encryption (FDE)
A technology to protect the entire hard drive using cryptography including the installed OS.
hardware security module (HSM)
A removable external cryptographic device.
hashing
The process of creating a digital fingerprint.
key exchange
The process of sending and receiving secure cryptographic keys.
key length
The number of bits in a key.
nonrepudiation
The process of proving that a user performed an action.
open public ledger
A public blockchain in which anyone can join the blockchain network and become part of it.
partition-level encryption
Applying cryptography to a partition of a hard drive.
record-level encryption
Applying cryptography to database records.
secure enclave
A technology for Apple and Android devices similar to TPM for PCs.
steganography
Hiding the existence of data within another type of file, such as an image file.
symmetric cryptographic algorithm
Encryption that uses a single key to encrypt and decrypt a message.
Trusted Platform Module (TPM)
An international standard for crypto processors.
volume-level encryption
Applying cryptography to a volume of a hard drive.
certificate authority (CA)
The entity that is responsible for digital certificates.
certificate revocation list (CRL)
A list of certificate serial numbers that have been revoked.
certificate signing request (CSR) generation
The process for requesting a digital certificate.
code signing
A process by which software developers digitally sign a program to prove that the software comes from the entity that signed it and that no unauthorized third party has altered it.
digital certificate
A technology used to associate a user’s identity to a public key and that has been “digitally signed” by a trusted third party.
Internet Protocol Security (IPSec)
A protocol suite for securing IP communications.
key escrow
A process in which keys are managed by a third party, such as a trusted CA.
key management system
A method of controlling public keys, private keys, and digital certificates.
Online Certificate Status Protocol (OCSP)
A process that performs a real-time lookup of a certificate’s status.
public key infrastructure (PKI)
The underlying infrastructure for the management of keys and digital certificates at scale.
root of trust
Tracing a certificate back to the highest level of a CA.
self-signed
A signed digital certificate that does not depend on any higher-level authority for authentication.
third party
An entity that is trusted by others.
transport/communication encryption
Cryptographic algorithms that are used to protect data in transit.
Transport Layer Security (TLS)
A widespread cryptographic transport algorithm that replaces SSL.
tunneling
Data that is encapsulated within a secure outer shell.
wildcard digital certificate
A certificate used to validate a main domain along with all subdomains.
CA
certificate authority
CRL
certificate revocation list
CSR
certificate signing request
IPSec
Internet Protocol Security
OCSP
Online Certificate Status Protocol
PKI
public key infrastructure
TLS
Transport Layer Security