CompTIA: Section 8

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/38

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

39 Terms

1
New cards

Asymmetric encryption

Uses two keys for encryption/decryption

2
New cards

Symmetric encryption

Uses one key for encryption/decryption

3
New cards

Types of Symmetric Algorithms:

DES

3DES

AES

Blowfish and Twofish

Rivest Ciphers(RC4, RC5, RC6)

4
New cards

DES

Symmetric encryption

5
New cards

3DES

Symmetric encryption

6
New cards

IDEA

Symmetric encryption

7
New cards

AES

Symmetric encryption

8
New cards

Blowfish and Twofish

Symmetric encryption

9
New cards

Digital signature

sender’s private key for non-repudiation and integrity

10
New cards

Types of Asymmetric Algorithms:

Diffie-Helman(DH)

RSA

Elliptic Curve Cryptography(ECC)

11
New cards

Diffie-Hellman(DH)

Asymmetric algorithm, for networks

12
New cards

RSA

Relies on large prime number factoring

13
New cards

Elliptic Curve Cryptography(ECC)

For mobile and low-power devices

14
New cards

Types of Hash Functions

MD5

Secure Hash Algorithm(SHA) Family

RIPEMD

HMAC

15
New cards

Secure Hash Algorithm(SHA) Family

Asymmetric algorithm that is known for its security

16
New cards

Code signing

Using hash keys to show a file is unmodified

17
New cards

Collision

When two has inputs have the same output

18
New cards

Hashing

One-way encryption that produces a key based on input

19
New cards

Pass the Hash attack

Uses hash keys to gain authentication

20
New cards

Birthday attack

Aims to get hash key collisions 

21
New cards

Key stretching

Increasing the strength of weaker keys

22
New cards

Salting

Adding random data to hash keys

23
New cards

Rainbow tables

Pre-computed tables for cracking hash keys

24
New cards

Nonce

Number used once. Dynamic numbers added to hash keys for security

25
New cards

Defences against hash attacks:

Key stretching

Nonces(Number used once)

Limiting failed login attempts

26
New cards

Public Key infrastructure(PKI)

System of asymmetric encryption

27
New cards

OCSP

List of revoked certificates using serial numbersBlock

28
New cards

Blockchain

Ledger for tracking all communications/transactions

29
New cards

Trusted platform module

Secures hardware through cryptographic keys

30
New cards

Hardware security model

Physical device that safeguards and manages digital keys

31
New cards

Secure Enclave

Ensures data protection, located separately from main processor

32
New cards

Types of Obfuscation

Steganography

Tokenization

Data Masking

33
New cards

Steganography

Hiding secrete messages in another message

34
New cards

Tokenization

Substituting sensitive data with non-sensitive tokens

35
New cards

Types of cryptographic attacks

Downgrade attacks

Collision Attacks

Quantum computingC

36
New cards

Downgrade attacks

Aims to force a system to use older and weaker security protocols

37
New cards

Collision attacks

Aims to find two different inputs that produces the same hash output

38
New cards

Quantum computing

Utilizes quantum bits for enormous processing power

39
New cards

Post-quantum cryptography

Encryption techniques that are resistant to quantum computing