Security+ Lecture Notes – Encryption, PKI, Hashing, Authentication, Access Control, Networking

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/116

flashcard set

Earn XP

Description and Tags

A comprehensive set of vocabulary flashcards covering encryption, PKI, hashing, authentication, access control, and networking concepts from the lecture notes.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

117 Terms

1
New cards

Symmetric encryption

Encryption that uses a single shared private key on both ends; fast and suitable for bulk data.

2
New cards

Pre-Shared Key (PSK)

A secret key shared in advance used by symmetric encryption.

3
New cards

AES

Advanced Encryption Standard; symmetric cipher used for bulk data with 128/192/256-bit keys.

4
New cards

AES-256

AES variant with a 256-bit key length providing stronger security.

5
New cards

AES-512

Mentioned in notes as a larger-key option for AES; not a standard widely used variant.

6
New cards

RC4

A stream cipher; historically fast but now considered insecure for many uses.

7
New cards

DES

Data Encryption Standard; old symmetric cipher with a 56-bit key; now insecure.

8
New cards

3DES

Triple DES; applies DES three times for greater security; slower and being phased out.

9
New cards

Asymmetric encryption

Public-key cryptography using a key pair (public and private keys) for encryption and signatures.

10
New cards

Public Key Infrastructure (PKI)

Framework for managing digital certificates and public-key cryptography.

11
New cards

RSA

Widely used asymmetric algorithm; typically used with 2048–4096-bit keys for encryption and digital signatures.

12
New cards

RSA 2048-4096

RSA key size range commonly recommended for security; larger keys offer stronger protection.

13
New cards

Elliptic Curve Cryptography (ECC)

Public-key crypto based on elliptic curves; provides equivalent security with smaller key sizes (efficient for low-power devices).

14
New cards

Diffie-Hellman (DH)

Key exchange protocol that enables two parties to establish a shared secret; with ephemeral keys it provides forward secrecy.

15
New cards

Hashing

One-way function that produces a fixed-size digest; used to ensure data integrity.

16
New cards

MD5-128

128-bit hash; vulnerable to collisions and rainbow-table attacks; considered insecure.

17
New cards

SHA-1

Hash function in the SHA family; vulnerability to collisions; replaced by SHA-256/512 in secure systems.

18
New cards

SHA-256

256-bit hash function in the SHA-2 family; widely used for secure digests.

19
New cards

SHA-512

512-bit hash function in the SHA-2 family; provides very strong digests.

20
New cards

Key exchange

Process by which two parties establish a shared secret or session keys for encryption.

21
New cards

Private key

Secret key used in asymmetric cryptography; must be kept secure to maintain confidentiality and authenticity.

22
New cards

Public key

Publicly shared key used to encrypt data or verify signatures; paired with a private key.

23
New cards

MD5 weaknesses

MD5 is susceptible to collisions and birthday attacks, making it unsuitable for secure hashing.

24
New cards

Digital signatures

Cryptographic signatures that verify the sender's identity and data integrity using a private key.

25
New cards

Root CA

Root of trust in a PKI; typically offline and highly trusted; signs intermediate CAs or certificates.

26
New cards

Certification Authority (CA)

Entity that issues and signs digital certificates trusted by users.

27
New cards

Registration Authority (RA)

Entity that verifies identity information before a certificate is issued by a CA.

28
New cards

Certificate Signing Request (CSR)

Request sent to a CA to issue a certificate; includes identifiers like FQDN.

29
New cards

Fully Qualified Domain Name (FQDN)

Complete domain name for a device or service, including subdomain and top-level domain.

30
New cards

IPv4

Internet Protocol version 4 address format (e.g., 192.0.2.1).

31
New cards

IPv6

Internet Protocol version 6 address format; longer addresses and new features.

32
New cards

Digital Certificate

X.509 public key certificate binding a public key to an entity; signed by a CA.

33
New cards

X.509

Standard format for public key certificates used in PKI.

34
New cards

PKIX

PKI X.509 standard; defines certificate path validation and trust models.

35
New cards

PKCS

Public Key Cryptography Standards; a set of standards for PKI operations.

36
New cards

Self-Signed Certificate

Certificate signed by the entity itself rather than by a trusted CA; no external root of trust.

37
New cards

Certificate Revocation List (CRL)

List published by a CA of certificates that have been revoked before expiration.

38
New cards

Online Certificate Status Protocol (OCSP)

Protocol to check certificate revocation status in real time; stapling can optimize this.

39
New cards

OCSP stapling

Server provides OCSP response to clients, reducing certificate-status checks by clients.

40
New cards

Certificate pinning

Storing known-good certificates or public keys in a client to prevent MITM with forged certs.

41
New cards

Common Name (CN)

Primary domain name listed in a certificate's subject field.

42
New cards

Subject Alternative Name (SAN)

Additional hostnames or identities covered by a certificate.

43
New cards

Key Management Interoperability Protocol (KMIP)

Standard protocol for managing cryptographic keys across systems.

44
New cards

Trusted Platform Module (TPM)

Hardware-based root of trust embedded in a computer’s motherboard or chipset.

45
New cards

Hardware Security Module (HSM)

Removable or dedicated device that safeguards and manages cryptographic keys.

46
New cards

Key Escrow

Backup of cryptographic keys held by a trusted party for recovery purposes.

47
New cards

Secure Enclave

Dedicated secure environment (e.g., password management) within a device.

48
New cards

Bulk Encryption

Encrypting large amounts of data efficiently, typically with AES.

49
New cards

Private asymmetric key inefficiency

Asymmetric keys are computationally heavy; bulk data should be encrypted with a symmetric key.

50
New cards

Perfect Forward Secrecy (PFS)

Property ensuring session keys are ephemeral and not derived from server private keys.

51
New cards

Salting

Adding random data to passwords before hashing to defend against precomputed attacks.

52
New cards

Key stretching

Applying multiple rounds of hashing or derivation to slow offline attacks.

53
New cards

Steganography

Concealing information within ordinary media or cover text to hide its presence.

54
New cards

Data Masking

Redacting or obscuring sensitive data to protect privacy.

55
New cards

Tokenization

Replacing sensitive data with non-sensitive tokens; often reversible in controlled environments.

56
New cards

De-identification

Removing or masking personal identifiers from data sets.

57
New cards

TLS (Transport Layer Security)

Protocol that provides encryption for data in transit; successor to SSL.

58
New cards

Key Enclave

Memory-resident secure area for secrets like passwords within a device.

59
New cards

Wildcard certificate

Certificate that covers multiple subdomains using a wildcard in the CN (e.g., *.example.com).

60
New cards

Hard Authentication Tokens

Strong factors used for authentication, often cryptographic or token-based.

61
New cards

Certificate-based authentication

Authentication using digital certificates issued within PKI.

62
New cards

One-Time Password (OTP)

A password valid for only one login session or transaction.

63
New cards

FIDO

Fast Identity Online; standard for strong, phishing-resistant authentication.

64
New cards

U2F (Universal 2nd Factor)

Open authentication standard using hardware security keys for second factors.

65
New cards

Soft Authentication Tokens

Non-cryptographic or easily delivered tokens like SMS, email, or push notifications.

66
New cards

SMS

Short Message Service used as a soft authentication token.

67
New cards

Email

Email-based one-time codes or links used for authentication.

68
New cards

Phone call

Voice call delivering authentication codes or prompts.

69
New cards

Notification (push)

Push-based authentication prompt sent to a device.

70
New cards

Authenticator App

App-based codes (e.g., TOTP) used for multi-factor authentication.

71
New cards

Vulnerabilities: interception

Risk that tokens or codes can be intercepted during transmission.

72
New cards

Passwordless authentication

Authentication method that does not require a password (e.g., tokens, biometrics).

73
New cards

FRR (False Rejection Rate)

Probability of incorrectly rejecting a legitimate user.”

74
New cards

FAR (False Acceptance Rate)

Probability of incorrectly accepting an imposter; typically more problematic than FRR.

75
New cards

Discretionary Access Control (DAC)

Access rights are assigned by the resource owner; user-driven.

76
New cards

Mandatory Access Control (MAC)

System-enforced access control based on policy labels and classifications.

77
New cards

RBAC (Role-Based Access Control)

Access rights are granted based on user roles.

78
New cards

RUBAC (Rule-Based Access Control)

Access decisions driven by rules, often used with firewalls and policies.

79
New cards

ABAC (Attribute-Based Access Control)

Access determined by attributes (user, environment, resource).

80
New cards

Principle of least privilege

Give users the minimum permissions necessary to perform tasks.

81
New cards

Provisioning

Process of creating and issuing identities and credentials.

82
New cards

Deprovisioning

Removing access when an employee or contractor leaves or changes roles.

83
New cards

User Account Provisioning

Managing user identities, credentials, and access rights.

84
New cards

Privileged Access Management (PAM)

Policies and controls to prevent abuse of privileged accounts.

85
New cards

LDAP (Lightweight Directory Access Protocol)

Directory service protocol using distinguished names and attribute-value pairs.

86
New cards

SAML (Security Assertion Markup Language)

Open standard for exchanging authentication/authorization data between parties.

87
New cards

OAuth

Authorization framework for granting access to resources via tokens.

88
New cards

Single Sign-On (SSO)

Authentication allows access to multiple systems with one credential; Kerberos is common in enterprise SSO.

89
New cards

Kerberos

Network authentication protocol using tickets; enables SSO within a domain.

90
New cards

NGFW (Next-Generation Firewall)

Firewall with advanced features like application awareness and DPI.

91
New cards

Deep Packet Inspection (DPI)

Examines data packets beyond headers to enforce security rules.

92
New cards

Stateful firewall

Tracks connection state and context to make decisions.

93
New cards

Stateless firewall

Makes decisions without keeping track of past connections.

94
New cards

Web Application Firewall (WAF)

Firewall focused on protecting web applications from SQLi, XSS, CSRF, and similar attacks.

95
New cards

Unified Threat Management (UTM)

Single firewall appliance offering multiple security features (firewall, VPN, IDS/IPS, etc.).

96
New cards

DNS (Domain Name System)

Resolves domain names to IP addresses.

97
New cards

Secure Admin Workstation (SAW)

Dedicated, hardened workstation for administrative tasks.

98
New cards

Jump Server

Hardened intermediary server in a DMZ that administrators use to reach internal systems.

99
New cards

Network Access Control (NAC)

Controls access to network resources, often using 802.1X and posture checks.

100
New cards

802.1X

Port-based network access control protocol for authenticating devices on a LAN.