1/23
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Confidentiality
Ensures that information is accessible only to authorized users.
Integrity
Guarantees that data is accurate and unaltered during transmission or storage.
Availability
Ensures that data and systems are accessible to authorized users when needed.
Symmetric Cryptography
Uses a single key for both encryption and decryption.
Data Encryption Standard (DES)
An older symmetric encryption algorithm with a 56-bit key, considered insecure.
Advanced Encryption Standard (AES)
A widely used symmetric encryption algorithm with key sizes of 128, 192, or 256 bits.
Asymmetric Cryptography
Uses a pair of keys: a public key for encryption and a private key for decryption.
RSA
An asymmetric cryptographic algorithm based on the difficulty of factoring large prime numbers.
Diffie-Hellman
An asymmetric protocol that enables secure key exchange over an insecure channel.
Elliptic Curve Cryptography (ECC)
Provides the same level of security as RSA with smaller key sizes.
Cryptographic Hash Functions
Convert data into a fixed-size hash value to verify data integrity.
SHA-1
Produces a 160-bit hash value, considered insecure due to vulnerabilities.
MD5
Produces a 128-bit hash value, also considered insecure.
Kerberos
Uses symmetric key cryptography and tickets for secure user authentication.
SQL Injection
Attackers manipulate database queries to gain unauthorized access.
Cross-Site Scripting (XSS)
Attackers inject malicious scripts into web pages viewed by others.
Cross-Site Request Forgery (CSRF)
Forces users to perform unwanted actions.
Secure Socket Layer (SSL) / Transport Layer Security (TLS)
Protocols that secure data transmission over the internet.
Pretty Good Privacy (PGP)
A cryptographic system for secure email communication using both symmetric and public-key encryption.
Risk Identification
The first step in risk analysis, identifying potential security threats.
Digital Forensics
The process of investigating digital evidence to uncover security incidents.
General Data Protection Regulation (GDPR)
Regulation that protects personal data in the EU.
Health Insurance Portability and Accountability Act (HIPAA)
Regulates the security of healthcare data in the US.
Payment Card Industry Data Security Standard (PCI DSS)
Ensures the security of payment card transactions.