CSEC 701 Cryptography Review

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/40

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

41 Terms

1
New cards

confidentiality

keeping information secret, avoiding disclosure vulnerabilities

2
New cards

integrity

protecting information from improper changes, avoiding forgery, subversion, and masquerade attacks

3
New cards

availability

keeping systems available and in operation, avoiding denial of service attacks

4
New cards

authentication

assurance that communicating entity is the one claimed, both peer entity and data origin authenticated

5
New cards

authorization

granting of specific permissions, based on the privileges held by the account

6
New cards

access control

ability to control whether a subject can interact with an object, prevention of the unauthorized

7
New cards

mutual authentication

a process in which each side of an electronic communication verifies the authenticity of the other

8
New cards

non-repudiation

protection against denial by one fo the parties in communication

9
New cards

threat

a potential for violation of security, which exists when there is a circumstance, capability, action, or event that could breach security or cause harm

10
New cards

vulnerability

weakness in the system that might be exploited

11
New cards

attack

an intelligent act that is a deliberate attempt to evade security services and violate the security policies of a system

12
New cards

control

an action, device, procedure, or technique that removes or reduces a vulnerability

13
New cards

zero day

vulnerabilities that are newly discovered and not yet addressed by a patch

14
New cards

NIST CSF

It provides a common taxonomy and mechanism to assist in aligning management practices with existing standards, guidelines, and practices. (govern, identify, protect, detect, respond, and recover)

15
New cards

MITRE ATT&CK framework

documents attacker tactics and techniques based on real world observations

16
New cards

MITRE D3FEND

detection, denial, and disruption framework empowering network defense

17
New cards

storage state

data at rest, data not being processed

18
New cards

processing state

data in use, being used by an active process

19
New cards

transmission state

data in transit, being moved from one place to another

20
New cards

defense in depth

the use of multiple different defense mechanisms with a goal of improving the defensive response to an attack, layered security

21
New cards

least privilege

subject should only have the necessary rights and privileges to perform its task with no additional permissions

22
New cards

complete mediation

each and every request should be verified

23
New cards

open design

the protection of an object should not rely upon the secrecy of the protection mechanism itself (cryptography)

24
New cards

kerckhoffs principle

cryptosystem should be secure even if everything about the system, except the key, is public knowledge

25
New cards

security through obscurity

not a security principle, illusion of protection by making protection mechanisms not generally known

26
New cards

economy of mechanism

always using the simple solutions when available

27
New cards

diversity of defense

making each layer of security different and diverse

28
New cards

fail-safe defaults

when something fails, it should do so to a safe state; default deny

29
New cards

cryptography early era

spartan scytale, substitution (Caeser), cipher alphabets, polyalphabets ciphers

30
New cards

cryptography mechanical era

1790 Jefferson stack of 26 disks, WWI & WWII coding machines, enigma, purple machine

31
New cards

cryptography modern era

IBM, Diffie-Helman public key, RSA, IDEA, AES

32
New cards

cryptography

converting plaintext to ciphertext (encryption and decryption)

33
New cards

key

info used in cipher only known to sender/reciever

34
New cards

keyless cipher

substitution, transposition

35
New cards

symmetric key

same key for encryption and decryption, shared common but private key

36
New cards

symmetric key challenges

key distribution, massive key requirements, unlimited compromising power one broken

37
New cards

asymmetric key

different keys for encryption and decryption

38
New cards

stream cipher

converts one symbol of plaintext immediately into a symbol of ciphertext

39
New cards

block cipher

encrypts a group of plaintext as one blobk

40
New cards

substitution

replacing an item with a different item

41
New cards

transposition

permutation, changing the order of items

Explore top flashcards