Unit 2 CyberSecurity

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/26

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 9:41 PM on 1/16/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

27 Terms

1
New cards

Cryptography is the art and science of hiding information using __________ and _________ means

mathematical and computational

2
New cards

Who uses cryptography and for what purpose

any person or organization who wants to keep something confidential

3
New cards

a _____ is one of the simplest and easiest forms of cryptography, and is a code that’s used to transform language

cipher

4
New cards

using logic and analysis techniques to break codes is known as __________

cryptanalysis

5
New cards

transforming information such that is hidden, but can still be decoded, is referred to as _______

encryption

6
New cards

cryptography protects us against _______ & ________ threats in the CIA triad

confidentiality and integrity

7
New cards

data exists in three states, what are the three states?

data at rest, data in transit, and data in use

8
New cards

whats an example of data at rest

information sitting in a database

9
New cards

whats an example of data in transit

sending emails to your teacher

10
New cards

whats an example of data in use

powerpoints

11
New cards

what are the two types of encryption and how many keys do they use

symmetric uses one key and asymmetric uses two keys

12
New cards

what is the most common symmetric encryption algorithm (hint. ends in s, so it’s symmetric)

AES

13
New cards

________ is the practice of concealing information in an image or object (hint. rawr)

steganography

14
New cards

symmetric encryption is typically used to store data at _______

rest

15
New cards

the most common asymmetric encryption algorithm is _______ (hint. ends in a, asymmetric)

RSA

16
New cards

asymmetric encryption is typically used to store data in ________

transit

17
New cards

how does asymmetric encryption work

the sender creates and encrypts a message using the recipient’s public key and then the recipient decrypts the message using the recipients private key

18
New cards

a _____, also known as a checksum, is a ________ function

hash, one-way

19
New cards

the avalanche effect is best described as a ___________________________-

a change to the data that drastically changes the output of the hash

20
New cards

why do i want a fingerprint of data

to validate files and identities

21
New cards

the most common hashing algorithm is ________ (ends in ha, hashing)

SHA-256

22
New cards

how are passwords stored and checked in a database

they compare the users password to date stored in their database and they never keep their password in plain text

23
New cards

random data added to a password prior to hashing is known as a ______

salt

24
New cards

what are the three cryptographic attacks?

dictionary attack, rainbow table attack, and collision attack

25
New cards

what is a dictionary attack

an attack where a common wordlist of passwords are used to guess passwords

26
New cards

what is a rainbow table attack

where it uses a precomputed list of common passwords that’ve been run through a hashing algorithm, it then compares password hashes against that table

27
New cards

what is a collision attack

when you manipulate a file to make it have the same hash as another file