1.4 Explain the importance of using appropriate cryptographic solutions

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/15

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

16 Terms

1
New cards

What does PKI stand for and what does it do?

PKI stands for (Public Key Infrastructure) and commonly refers to policies and procedures in terms of creating, managing, storing and revoking digital certificates. This can also refer to the binding of public keys to people or devices.

2
New cards

What is the difference between symmetric encryption and asymmetric encryption?

Symmetric: This kind of encryption is a single shared key to where you encrypt and decrypt the data using the same key.

Asymmetric: This kind of encryption is using 2 or more keys that are mathematically related. One key gets assigned as the private key and the other as the public key. The private key is the only key that can decrypt data encrypted with the public key.

3
New cards

Why does key length matter in encryption?

Key length is important because the longer the key, the better chance you have at that data staying encrypted. A short encryption key will not be hard for an attacker to crack it.

4
New cards

What is key stretching?

Key stretching is a technique used when a key is weak and short. This allows the key to hash the encryption, hash it again and again making it even harder for an attacker to crack it.

5
New cards

What does TPM stand for and what does this do?

TPM stands for Trusted Platform Module and is standardized hardware to provide cryptographic functions.

6
New cards

What is a HSM and what does this do?

HSM stands for (Hardware Security Module) is used in large environments to where multiple servers needs their keys stored securely. This is also designed for securing data on a system level.

7
New cards

What is Obfuscation?

This is a way to make information that was hard to read, even harder to read or understand. However, if you know how to read it, then you can decipher it.

8
New cards

What are the 3 ways to hide data using Obfuscation and describe the difference between each one.

The 3 ways to hide data are Steganography, Tokenization and Data Masking.

Steganography: This is used to hide data in an image. However, there are other forms of this to where you can hide data in a video or audio.

Tokenization: This is taking sensitive data and turning it into random data. This is most common in credit card processing to where when a payment is being made, a temporary token is being used during the payment to protect the actual credit card number.

Data Masking: This is hiding some of the original data and only showing a portion of the data. An example is the last 4 of a social security number with the rest showing “x” or with credit cards.

9
New cards

What is salting?

This is the process of adding random data to a password when hashing.

10
New cards

What is a blockchain?

This is a decentralized digital ledger that securely stores records across a network of computers in a way that is transparent and resistant to tampering. Each “block” contains data that is in a chronological chain. Each block relies on the previous hash of the previous block. If any data is altered in a previous block, the hash’s of those blocks will change which will then cause the computers to know that the data has been altered and will not record any more past that point.

11
New cards

What is the standard format for digital certificates?

X.509

12
New cards

What is a CSR?

CSR stands for Certificate Signing Request and this is a request for your public key to be signed and validated by a CA. After they sign it, they then sign your digital certificate with their private key and send it back to you.

13
New cards

What is a self-signed digital certificate?

This kind of certificate is installed on every computer in your company that will need access to an internal application. You personally sign the digital certificate using your internal CA so that way every PC knows that the application they are wanting to connect to is validated.

14
New cards

What is a SAN in terms of digital certificates.

This stands for (Subject Alternative Name) and is used as an extension to a .509 certificate and allows a certificate to support different domains. This is also based on the name of the server as well. An example would be *.countyapps.azurewebsites.net as the domain. The subdomains that could use the same certificate could be adair.countyapps.azurewebsites.net, ballard.countyapps.azurewebsites.net and so on

15
New cards

What is a CRL?

A CRL stands for Certificate Revocation List. This list is maintained by the CA and gives a list of certificates that are no longer valid and trusted.

16
New cards

What is OSCP Stapling?

OSCP (Online Certificate Status Protocol) stapling is where the browser can check for certificate revocation and the CA is responsible for responding to all clients OSCP requests. The status is “stapled” into the SSL/TLS handshake.