1/23
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
public key infrastructure
technical or managerial controls responsible for managing processes associated with digital certificates.
PKI
initials public key infrastructure
symmetric encryption
encryption and decryption involving a single key
anyone with the key can decrypt encrypted data
why is it important to limit access to a symmetric key?
secret key inside a suitcase cuffed to deliveryman, single secret key algorithm, and shared secret key
three things a symmetric key is referred to
it is shared because it can encrypt and decrypt
why is a symmetric key sometimes referred to as shared secret key
difficulty managing key sharing
why does symmetric key sharing become a scalability issue when multiple users are involved?
asymmetric encryption
encrypting and decrypting with different keys
created at the same time and
how are the two keys in asymmetric encryption mathematically related
private and public
what are the two keys created during asymmetric encryption?
private key
asymmetric encryption key used to decrypt and is only available to one person or device
public key
asymmetric encryption key used to encrypt and is available to anyone
No, because the private key is needed to decrypt
In asymmetric encryption, can a middleman who gains access to an encrypted message decrypt it with their public key, true or false, and why?
reverse engineering private keys
what does the math involved when creating private and public keys in asymmetric encryption prevent?
true
does the process of creating a private-public key pair occur simultaneously, True or false?
keys are created by app or person, public key is distributed, and the private key stored locally and protected with a password.
describe the private-public key formation process. It’s 3 steps.
prevents attackers who found the key from using it. preventive technical control that ensures confidentiality.
describe the benefits of securing a private key with a password, what part of the CIA triad does it ensure, and what control type and category does it fall under?
person a encrypts a message with person b’s public key and sends it, person a decrypts the message with their private key.
describe how the private-public key pairs are used. 2 steps.
ciphertext
asymmetric encryption method created by a combination of a public key and a plaintext message.
key escrow
method to manage private-public key pairs in a large organization by handing the keys to a third party until they are needed
it allows an org to decrypt data encrypted by the ex-worker
What is the benefit of a key escrow, especially when an employee leaves a job?
symmetric- encrypts and decrypts with one key, asymmetric- one key encrypts while the other decrypts.
difference between symmetric and asymmetric encryption?
public- encrypts and accessible to anyone, private-encrypts and only accessible to one person or device.
define the private-public key pair of asymmetric encryption
availability
What function of the CIA triad does handing your private keys to a third party until needed ensure