1.1-1.4

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/95

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

96 Terms

1
New cards

Public key

Used for encryption and validation of digital

signatures

2
New cards

Private key

Used for decryption and digital signatures

3
New cards

Key escrow

Stores cryptographic keys

4
New cards

Encryption

Changing plaintext into ciphertext

5
New cards

Level

The scope or layer at which encryption is applied

6
New cards

Full disk

Encrypts entire storage disk

7
New cards

Partition

Encrypts specific sections of storage device

8
New cards

File

Encrypts individual files, databases or records within

9
New cards

Volume

Encrypts a single volume

10
New cards

Database

Encrypts a database

11
New cards

Record

Encrypts a single database record

12
New cards

Transport/communication

Encrypted using SSL/TLS (data in transport)

13
New cards

Asymmetric

Uses two keys, a private key and a public key

14
New cards

Symmetric

Uses one key and encrypts a large amount of

data using block cipher

15
New cards

Key exchange

Delivers cryptographic keys from a sender

to a receiver securely

16
New cards

Algorithms

Employs intricate mathematical operations to

ensure the irreversibility of encryption (specific procedures for encrypting and decrypting)

17
New cards

Key length

The length of cryptographic keys impacts

resistance against attacks

18
New cards

Tools

The hardware and software solutions applied to

encryption

19
New cards

Trusted Platform Module (TPM)

ensures the

Stores keys, passwords and digital certificates

20
New cards

Hardware Security Module (HSM)

safeguards and manages digital keys, providing hardware level security

21
New cards

Key management system

manages cryptographic keys throughout their lifecycle

22
New cards

Secure enclave

Used to protect user data, biometric information, and cryptographic keys from potential software-based attacks (located in processor)

23
New cards

Obfuscation

Deliberately obscuring code

24
New cards

Steganography

Hiding data inside data, image, or audio

files

25
New cards

Tokenization

Transforming sensitive data into unique

tokens that hold no inherent value

26
New cards

Data masking

Concealing specific data within a database, inaccessible to unauthorized users

27
New cards

Hashing

Converts data into fixed sized string, ensuring data integrity

28
New cards

Salting & Peppering

Adding random values to a credential

29
New cards

Digital signatures

Ensures the authenticity, integrity, and

non-repudiation of a document

30
New cards

Key stretching

technique designed to transform a password into a longer, more complex key

31
New cards

Blockchain

A decentralized digital ledger for secure

transaction

32
New cards

Open public ledger

shared transparent record accessible

to all for verifying transactions

33
New cards

Certificates

Mechanisms that underpin secure digital

interactions

34
New cards

Certificate authorities (CA)

Organizations that issue digital certificates

35
New cards

Certificate Revocation Lists (CRLs)

Catalogs of

invalidated digital certificates, ensuring security

36
New cards

Online Certificate Status Protocol (OCSP)

Real-time checks of digital certificate validity

37
New cards

Self-signed

self-generated digital certificate lacking third-party validation, for internal use only

38
New cards

Third-party

Public-facing certificates issued by external

entities to verify the authenticity of data

39
New cards

Root of trust

Verify its authenticity by checking the certificate’s chain of trust

40
New cards

Certificate Signing Request (CSR) generation

Sent from and applicant to a CA to get digital identity certificate

41
New cards

Wildcard

A single certificate securing multiple servers using the same domain name

42
New cards

Diffusion

ensures that a small change in the plaintext results in a significantly different ciphertext, making it harder for attackers to find patterns and reverse the encryption

43
New cards

Approval process

Having the project and budget

authorized

44
New cards

Ownership

Person responsible for security task

45
New cards

Test results

Testing new security measures before implementation

46
New cards

Backout plan

Having a rollback option

47
New cards

Maintenance window

Designated times for changes

48
New cards

Standard operating procedure

Rulebook on how to

carry out tasks

49
New cards

Allow lists/deny lists

which activities or entities are permitted or prohibited

50
New cards

Restricted activities

changes that might limit certain operations

51
New cards

Downtime

Unplanned or extended time things cannot be accessed

52
New cards

Service restart

Can cause disruption to a system

53
New cards

Application restart

Weakness that can emerge on restart

54
New cards

Legacy applications

Vulnerabilities on older applications

no longer supported

55
New cards

Dependencies

Services, system drivers, and

interconnections that are intertwined

56
New cards

Updating diagrams

Outlines your current environment

57
New cards

Updating policies/procedures

Reflect changes that are

pivotal to maintain a secure environment

58
New cards

Version control

Tracks changes to documents and projects

59
New cards

CIA (CIANA)

(Confidentiality, Integrity, Availability) Non-repudiation and authentication are also part of this triad

60
New cards

Non-repudiation

Prevents denial of one’s actions, ensuring accountability

61
New cards

AAA

Authentication, Authorization, Accounting

62
New cards

Authenticating systems

Uses 802.1x to authenticate devices

63
New cards

Authorization models

Controls access permissions

64
New cards

Gap analysis

Helps to achieve the desired state security by analyzing the difference between what is and what should be (the gap)

65
New cards

Zero trust

Never trust, always verify

66
New cards

Control plane

Manages and configures network devices and resources

67
New cards

Adaptive identity

Flexible approach to identity management

68
New cards

Threat scope reduction

Reducing the attack surface

69
New cards

Policy engine

processes and evaluates access requests against set policies

70
New cards

Policy administrator

manages and updates access policies

71
New cards

Policy-driven access control

Access granted based on policies rather than static permissions

72
New cards

Implicit trust zones

Areas where trust is assumed by default

73
New cards

Subject/system

Entities requesting or being granted access

74
New cards

Policy enforcement point

Access decisions are executed here based on policies

75
New cards

Infrared sensor

Detects heat signatures

76
New cards

Pressure sensor

Detects weight or pressure changes such as footsteps

77
New cards

Microwave sensor

Emits pulses and detects frequency alterations

78
New cards

Ultrasonic sensor

Uses soundwaves to detect presence or movement

79
New cards

Honeypot

Lures attackers so that we can monitor the

latest attack methods

80
New cards

Honeynet

Network of honeypots

81
New cards

Honeyfile

Bait file designed to detect and track

unauthorized access attempts discreetly

82
New cards

Honeytoken

Piece of data used to alert when accessed, no real world value (only a trap)

83
New cards

Technical controls

Technology based measures eg. firewalls and encryption (hardware, software and firmware)

84
New cards

Managerial Controls (Administrative controls)

documented in org. security policy and focus and managing risk

85
New cards

Operational Controls

Day to day security management such as monitoring and access management

86
New cards

Physical controls

Measures to protect physical assets, including locks, surveillance cameras, and security personnel.

87
New cards

Preventive controls

Aimed at preventing security incidents or breaches

88
New cards

Detterent controls

Aimed at discouraging or dettering possible threats

89
New cards

Detective controls

Designed to discover or detect unwanted or unauthorized activity

90
New cards

Corrective controls

Intended to correct or mitigate damage after a security incident has occurred.

91
New cards

Compensating controls

Alternative measures that provide the same level of security when primary controls are not feasible. They are used to address specific risks.

92
New cards

Directive controls

Provide instructions on how to handle security related situations (guide or constrain user actions with recommended actions)

93
New cards

Functional controls

deterrent, preventive, detective, and corrective

94
New cards

Risk

the possibility or likelihood of a threat exploiting a vulnerability resulting in a loss

95
New cards

Threat

any circumstance or event that has the potential to compromise confidentiality, integrity, or availability

96
New cards

Vulnerability

weakness. It can be a weakness in the hardware, the software, the configuration, or even the users operating the system.