Cybersecurity: Encryption, Hashing, and Network Security Principles

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/32

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 6:46 PM on 5/12/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

33 Terms

1
New cards

Encryption

process of converting an original message into a form that is unreadable to

unauthorized individuals − that is, to anyone without the tools to convert the encrypted

message back to its original format.

2
New cards

Decryption

process of converting the ciphertext message back into plaintext so that it can be

readily understood.

3
New cards

algorithm

programmatic steps used to convert an unencrypted message into an

encrypted sequence of bits that represents the message.

4
New cards

Substitution

process of replacing plaintext values with other values to form ciphertext.

5
New cards

Hash algorithms

mathematical functions that create a hash value, also known as a message digest, by

converting variable-length messages into a single fixed-length value.

6
New cards

Salting

process of providing a nonsecret, random piece of data to the hashing function when

the hash is first calculated.

7
New cards

rainbow table

describes a database of precomputed hashes from sequentially calculated

passwords

8
New cards

message authentication code (MAC)

describe a key-dependent, one-way hash function that allows only

specific recipients (symmetric key holders) to access the message digest.

9
New cards

Least privilege

principle by which members of the organization are allowed to access the minimal

amount of information for the minimal amount of time necessary to perform their required

duties.

10
New cards

smart card

plastic card with an embedded microchip that can store data about the owner

11
New cards

dictionary attack

throws every known word (sometimes in many languages) into the authentication system until something matches what's stored on the system.

12
New cards

brute-force attack

tries every possible character, number, and symbol combination to guess the

password.

13
New cards

ward dialer

automatic phone-dialing program that dials every phone number in a configured

range (e.g., from 555-1000 to 555-2000) and checks to see if a person, answering machine, or modem answers.

14
New cards

intranet

internal network restricted to employees within the organization, also using Internet technologies.

15
New cards

End points

hardware devices or software modules that perform encryption to secure data,

perform authentication to make sure the host requesting the data is an approved user of

the VPN, and perform encapsulation to protect the integrity of the information being sent

16
New cards

tunnel

channel or pathway over a packet network used by the VPN; it runs through the

Internet from one endpoint to another.

17
New cards

intrusion

occurs when an attacker attempts to gain entry or disrupt the normal operations of an

information system, almost always with the intent to do harm

18
New cards

Incident response

encompasses the actions an organization takes when an intrusion is detected

19
New cards

Tuning

process of adjusting an IDPS to maximize its efficiency in detecting true positives while minimizing both false positives and false negatives

20
New cards

application protocol verification

higher-order protocols (HTTP, FTP, Telnet) are examined for unexpected packet

behavior or improper use

21
New cards

Honeypots

decoy systems designed to lure potential attackers away from critical systems

22
New cards

honeynet

When a collection of honeypots connects several honeypot systems on a subnet

23
New cards

Enticement

process of attracting attention to a system by placing tantalizing information

in key locations

24
New cards

Entrapment

act of luring an individual into committing a crime to get a conviction

25
New cards

SSL

cryptographic protocol designed to provide secure communication over a computer network

26
New cards

TSL

successor to SSL and is a more secure and modern cryptographic protocol

27
New cards

IPsec

designed to secure IP communications by authenticating and encrypting each IP packet in a data stream

28
New cards

Symmetric Encryption

cryptographic technique where one secret key is shared between parties to securely encrypt and decrypt messages

29
New cards

Hashing

process of running input data (of any size) through a hash function to produce a fixed-size output called a hash value

30
New cards

CIA

core goals of information security that guide policies, controls, and risk management

31
New cards

Confidentiality

Ensuring information is not disclosed to unauthorized individuals, systems, or processes

32
New cards

Integrity

Ensuring information is accurate, complete, and unchanged except by authorized actions

33
New cards

Availability

Ensuring authorized users and systems can access information and services when needed.