1/34
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Encryption
Process of encoding plaintext into ciphertext using keys
Plaintext
Original readable data
Ciphertext
Encrypted unreadable data
Cipher
Algorithm used to perform encryption
Key
Value used to encrypt and decrypt data
SymmetricEncryption
Same key used for encryption and decryption
SymmetricKey
Shared secret known by sender and receiver
AsymmetricEncryption
Uses two mathematically related keys public and private
PublicKey
Used to encrypt data available to others
PrivateKey
Used to decrypt data kept secret by owner
AsymmetricBenefits
Provides confidentiality authentication and tamper detection
MobileEncryptionPurpose
Protect data in transit and at rest on mobile devices
AndroidFullDiskEncryption
Encrypts entire user data partition single password protected key Android5plus
FullDiskLimitation
Some functionality unavailable until device unlocked
AndroidFileBasedEncryption
Encrypts individual files with different keys Android7plus
FileBasedEncryptionBenefit
Supports DirectBoot limited functions before unlock
DirectBoot
Device boots to lock screen allows alarms calls before unlock
iOSKeychain
Stores small sensitive data like passwords securely
iOSKeychainEncryption
Uses AES256 encryption
iOSDeviceKey
Generated using userID key and passcode
iOSPasscodeKey
Stored in memory until device locked
iOSDataProtectionAPI
Controls when files or keychain items are accessible
DataProtectionClasses
Define access conditions always or unlocked only
CloudSecurityResponsibility
Customer ultimately responsible for protecting cloud data
StrongEncryptionStandard
Minimum 256bit key recommended
EncryptionInTransit
Data encrypted before transmission decrypted at destination
MultifactorAuthentication
MFA requires more than one authentication factor
MFAPurpose
Reduces breaches strengthens account security
MFAExample
Password plus SMS code
MFATokenLifespan
Code valid for short time usually minutes
MFAAlternatives
Authenticator app voice call email token
EncryptionGoal
Protect confidentiality of data
MFAObjective
Verify identity before granting access
EncryptionAndMFA
Together strengthen cloud data security