Home
Explore
Exams
Search for anything
Login
Get started
Home
All modules
All modules
0.0
(0)
Rate it
Learn
Practice Test
Spaced Repetition
Match
Flashcards
Card Sorting
1/75
There's no tags or description
Looks like no tags are added yet.
Study Analytics
All
Learn
Practice Test
Matching
Spaced Repetition
Name
Mastery
Learn
Test
Matching
Spaced
No study sessions yet.
76 Terms
View all (76)
Star these 76
1
New cards
Cryptography
The science of securing information by transforming it into an unreadable format.
2
New cards
Substitution Cipher
A cipher where plaintext characters are replaced with other characters.
3
New cards
Transposition Cipher
A cipher that changes the positioning of characters in the plaintext.
4
New cards
Confidentiality
Keeping information secret from unauthorized users.
5
New cards
Integrity
Ensuring that data remains unaltered during transmission or storage.
6
New cards
Authenticity
Verifying the source or origin of information.
7
New cards
Non-Repudiation
Preventing denial of actions taken.
8
New cards
Trust
Confidence in the security of a system.
9
New cards
Eavesdropping
Unauthorized parties intercepting messages.
10
New cards
Message Alteration
Tampering with data during transmission.
11
New cards
Impersonation
Pretending to be someone else to gain trust.
12
New cards
Man-in-the-Middle (MitM) Attacks
A situation where the attacker secretly relays and possibly alters the communication between two parties.
13
New cards
Replay attacks
An attack where a valid data transmission is maliciously or fraudulently repeated.
14
New cards
Password attacks
Attacks aimed at uncovering passwords.
15
New cards
CIA Triad
The three fundamental principles of information security: Confidentiality, Integrity, and Availability.
16
New cards
Confusion
Making the relationship between the ciphertext and the encryption key as complex as possible.
17
New cards
Diffusion
Spreading out the influence of the plaintext over the ciphertext to obscure patterns.
18
New cards
Frequency Analysis
The process of analyzing the frequency of letters or symbols in a cipher to uncover the plaintext.
19
New cards
Caesar Cipher
A simple substitution cipher where each letter is shifted by a fixed number.
20
New cards
Vigenère Cipher
A method that uses a keyword-based substitution where each letter is shifted based on the corresponding keyword letter.
21
New cards
One Time Pad
A cipher that is unbreakable when used correctly; requires a truly random key that is as long as the message.
22
New cards
Rail Fence Cipher
A transposition cipher that arranges the plaintext in a zigzag pattern, then reads it off row-wise.
23
New cards
Digital Certificates
Digital documents that verify the identity of entities in a network.
24
New cards
Cryptography Applications
Applications include HTTPS for secure web traffic, messaging apps with end-to-end encryption, and digital signatures.
25
New cards
Key Management
Techniques and procedures for managing cryptographic keys to support secure communication.
26
New cards
Hash Functions
Mathematical functions that transform data into a fixed-size string of characters, which appears random.
27
New cards
Message Authentication Code (MAC)
A short piece of information used to ensure that a message has not been altered.
28
New cards
HMAC
A type of MAC that uses a cryptographic hash function along with a secret key.
29
New cards
Asymmetric Cryptography
Cryptographic methods that employ pairs of keys (public and private).
30
New cards
Diffie-Hellman Key Exchange
An asymmetric algorithm to allow two parties to generate a shared secret over a public channel.
31
New cards
RSA Algorithm
A widely used encryption method based on factoring large integers.
32
New cards
Public Key Infrastructure (PKI)
Framework for managing digital certificates and public-key encryption.
33
New cards
Digital Signatures
A mathematical technique used to provide authenticity and integrity to a message.
34
New cards
SSL/TLS
Protocols for securing communications over a computer network.
35
New cards
Quantum Cryptography
Cryptographic methods that use the principles of quantum mechanics to secure data transmission.
36
New cards
Homomorphic Encryption
Allows computations to be performed on encrypted data without decryption.
37
New cards
Elliptic Curve Cryptography (ECC)
A form of public key cryptography based on the algebraic structure of elliptic curves.
38
New cards
Visual Cryptography
Technique that allows a secret to be divided into shares, which can be distributed to multiple parties.
39
New cards
Steganography
The practice of hiding messages within other non-secret data.
40
New cards
MFA (Multi-Factor Authentication)
A security system that verifies a user's identity by requiring multiple forms of verification.
41
New cards
OAuth 2.0
An open standard for access delegation, often used for token-based authentication.
42
New cards
SAML (Security Assertion Markup Language)
An XML-based framework for exchanging authentication and authorization data between parties.
43
New cards
LDAP (Lightweight Directory Access Protocol)
A protocol used to access and manage directory information.
44
New cards
Kerberos
A network authentication protocol that uses tickets to allow nodes to prove their identity.
45
New cards
Symmetric Key Cryptography
Cryptography using the same key for both encryption and decryption.
46
New cards
Block Cipher
A cipher that encrypts data in fixed-size blocks.
47
New cards
Stream Cipher
A cipher that encrypts data one bit or byte at a time.
48
New cards
Key Derivation Functions (KDF)
Algorithms that derive one or more secret keys from a secret value.
49
New cards
Padding
Adding data to a plaintext message to ensure it conforms to required block sizes.
50
New cards
Cryptanalysis
The study of analyzing information systems in order to understand hidden aspects of the systems.
51
New cards
Entropy
Measure of unpredictability or randomness in a cryptographic system.
52
New cards
Digital Proof-of-Work
A system used to verify transactions through computational effort.
53
New cards
Quantum Key Distribution (QKD)
Method for secure communication based on quantum mechanics principles.
54
New cards
Certificate Authority (CA)
A trusted entity that issues digital certificates.
55
New cards
Certificate Revocation List (CRL)
A list of digital certificates that have been revoked before their expiration.
56
New cards
Cryptographic Algorithms
Mathematical procedures for encrypting or decrypting data.
57
New cards
Public Key
A key that can be shared publicly, used to encrypt data.
58
New cards
Private Key
A key that is kept secret and used to decrypt data.
59
New cards
Nonce
A number used once in cryptographic communication to prevent replay attacks.
60
New cards
Salting
Adding random data to passwords before hashing to protect against attacks.
61
New cards
Cryptographic Strength
The resistance of cryptographic algorithms against unauthorized access.
62
New cards
Brute-Force Attack
An attempt to gain access to a system by trying all possible combinations of passwords.
63
New cards
Zero Trust Architecture
A security model that requires strict identity verification for every person and device trying to access resources.
64
New cards
Insider Threats
Risks posed by individuals within the organization.
65
New cards
Phishing
A type of cyber attack that tricks users into providing sensitive information.
66
New cards
Social Engineering
Manipulating individuals into divulging confidential information.
67
New cards
Data Breach
An incident where unauthorized access to data occurs.
68
New cards
Compliance
Adherence to laws, regulations, and policies to ensure data security.
69
New cards
Risk Management
The process of identifying, assessing, and controlling risks to an organization's capital and earnings.
70
New cards
Vulnerability Assessment
The process of identifying and quantifying vulnerabilities in a system.
71
New cards
Incident Response
The approach of an organization to prepare for, detect, contain, and recover from security incidents.
72
New cards
Digital Forensics
The process of uncovering and interpreting electronic data.
73
New cards
Web Application Firewall (WAF)
A security device that filters and monitors HTTP traffic to and from a web application.
74
New cards
End-to-End Encryption
A method of data transmission where only the communicating users can read the messages.
75
New cards
Secure Remote Access
Methods used to securely access a network or device over the Internet.
76
New cards
Data Loss Prevention (DLP)
Strategies to ensure that sensitive data is not lost, misused, or accessed by unauthorized users.