Main Ideas

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/23

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 11:25 PM on 12/12/24
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

24 Terms

1
New cards

Confidentiality

Ensures that information is accessible only to authorized users.

2
New cards

Integrity

Guarantees that data is accurate and unaltered during transmission or storage.

3
New cards

Availability

Ensures that data and systems are accessible to authorized users when needed.

4
New cards

Symmetric Cryptography

Uses a single key for both encryption and decryption.

5
New cards

Data Encryption Standard (DES)

An older symmetric encryption algorithm with a 56-bit key, considered insecure.

6
New cards

Advanced Encryption Standard (AES)

A widely used symmetric encryption algorithm with key sizes of 128, 192, or 256 bits.

7
New cards

Asymmetric Cryptography

Uses a pair of keys: a public key for encryption and a private key for decryption.

8
New cards

RSA

An asymmetric cryptographic algorithm based on the difficulty of factoring large prime numbers.

9
New cards

Diffie-Hellman

An asymmetric protocol that enables secure key exchange over an insecure channel.

10
New cards

Elliptic Curve Cryptography (ECC)

Provides the same level of security as RSA with smaller key sizes.

11
New cards

Cryptographic Hash Functions

Convert data into a fixed-size hash value to verify data integrity.

12
New cards

SHA-1

Produces a 160-bit hash value, considered insecure due to vulnerabilities.

13
New cards

MD5

Produces a 128-bit hash value, also considered insecure.

14
New cards

Kerberos

Uses symmetric key cryptography and tickets for secure user authentication.

15
New cards

SQL Injection

Attackers manipulate database queries to gain unauthorized access.

16
New cards

Cross-Site Scripting (XSS)

Attackers inject malicious scripts into web pages viewed by others.

17
New cards

Cross-Site Request Forgery (CSRF)

Forces users to perform unwanted actions.

18
New cards

Secure Socket Layer (SSL) / Transport Layer Security (TLS)

Protocols that secure data transmission over the internet.

19
New cards

Pretty Good Privacy (PGP)

A cryptographic system for secure email communication using both symmetric and public-key encryption.

20
New cards

Risk Identification

The first step in risk analysis, identifying potential security threats.

21
New cards

Digital Forensics

The process of investigating digital evidence to uncover security incidents.

22
New cards

General Data Protection Regulation (GDPR)

Regulation that protects personal data in the EU.

23
New cards

Health Insurance Portability and Accountability Act (HIPAA)

Regulates the security of healthcare data in the US.

24
New cards

Payment Card Industry Data Security Standard (PCI DSS)

Ensures the security of payment card transactions.