1.PKI

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/23

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

24 Terms

1
New cards

public key infrastructure

technical or managerial controls responsible for managing processes associated with digital certificates.

2
New cards

PKI

initials public key infrastructure

3
New cards

symmetric encryption

encryption and decryption involving a single key

4
New cards

anyone with the key can decrypt encrypted data

why is it important to limit access to a symmetric key?

5
New cards

secret key inside a suitcase cuffed to deliveryman, single secret key algorithm, and shared secret key

three things a symmetric key is referred to

6
New cards

it is shared because it can encrypt and decrypt

why is a symmetric key sometimes referred to as shared secret key

7
New cards

difficulty managing key sharing

why does symmetric key sharing become a scalability issue when multiple users are involved?

8
New cards

asymmetric encryption

encrypting and decrypting with different keys

9
New cards

created at the same time and

how are the two keys in asymmetric encryption mathematically related

10
New cards

private and public

what are the two keys created during asymmetric encryption?

11
New cards

private key

asymmetric encryption key used to decrypt and is only available to one person or device

12
New cards

public key

asymmetric encryption key used to encrypt and is available to anyone

13
New cards

No, because the private key is needed to decrypt

In asymmetric encryption, can a middleman who gains access to an encrypted message decrypt it with their public key, true or false, and why?

14
New cards

reverse engineering private keys

what does the math involved when creating private and public keys in asymmetric encryption prevent?

15
New cards

true

does the process of creating a private-public key pair occur simultaneously, True or false?

16
New cards

keys are created by app or person, public key is distributed, and the private key stored locally and protected with a password.

describe the private-public key formation process. It’s 3 steps.

17
New cards

prevents attackers who found the key from using it. preventive technical control that ensures confidentiality.

describe the benefits of securing a private key with a password, what part of the CIA triad does it ensure, and what control type and category does it fall under?

18
New cards

person a encrypts a message with person b’s public key and sends it, person a decrypts the message with their private key.

describe how the private-public key pairs are used. 2 steps.

19
New cards

ciphertext

asymmetric encryption method created by a combination of a public key and a plaintext message.

20
New cards

key escrow

method to manage private-public key pairs in a large organization by handing the keys to a third party until they are needed

21
New cards

it allows an org to decrypt data encrypted by the ex-worker

What is the benefit of a key escrow, especially when an employee leaves a job?

22
New cards

symmetric- encrypts and decrypts with one key, asymmetric- one key encrypts while the other decrypts.

difference between symmetric and asymmetric encryption?

23
New cards

public- encrypts and accessible to anyone, private-encrypts and only accessible to one person or device.

define the private-public key pair of asymmetric encryption

24
New cards

availability

What function of the CIA triad does handing your private keys to a third party until needed ensure