1/25
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
algorithm
A set of procedures based on a mathematical formula used to encrypt and decrypt the data. Also called a cipher.
asymmetric cryptographic algorithm
Cryptography that uses two mathematically related keys.
birthday attack
A statistical phenomenon that makes finding collisions easier.
blockchain
A shared, immutable ledger that facilitates the process of recording transactions and tracking assets in a business network.
collision
When two files have the same hash.
cryptography
The practice of transforming information so that it is secure and cannot be understood by unauthorized persons.
database-level encryption
Applying cryptography to a database.
decryption
The process of changing encrypted text into the original text.
digital signature
An electronic verification of the sender.
downgrade attack
An attack in which the system is forced to abandon the current higher security mode of operation and “fall back” to implementing an older and less secure mode.
encryption
The process of changing plaintext into ciphertext.
file-level encryption
To encrypt or decrypt files individually.
full-disk encryption (FDE)
A technology to protect the entire hard drive using cryptography including the installed OS.
hardware security module (HSM)
A removable external cryptographic device.
hashing
The process of creating a digital fingerprint.
key exchange
The process of sending and receiving secure cryptographic keys.
key length
The number of bits in a key.
nonrepudiation
The process of proving that a user performed an action.
open public ledger
A public blockchain in which anyone can join the blockchain network and become part of it.
partition-level encryption
Applying cryptography to a partition of a hard drive.
record-level encryption
Applying cryptography to database records.
secure enclave
A technology for Apple and Android devices similar to TPM for PCs.
steganography
Hiding the existence of data within another type of file, such as an image file.
symmetric cryptographic algorithm
Encryption that uses a single key to encrypt and decrypt a message.
Trusted Platform Module (TPM)
An international standard for cryptoprocessors.
volume-level encryption
Applying cryptography to a volume of a hard drive.