CompTIA Security+ Chapter 4 Notes

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/47

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

48 Terms

1
New cards

Public Key Infrastructure (PKI)

  • Bind public keys with user indentities through certificates

  • Creates, distributes, and manages digital certificates

  • Method of accomplishing public key encryption

  • Asymmetric key pair has public key and private key

    • Private keys can be stored in key escrow

2
New cards

Centralized vs decentralized keys

  • Centralized are generated at a server

  • Decentralized are generated at a local computer

3
New cards

Encryption

  • Converting information into code unreadable to unauthorized individual

4
New cards

Level

  • Refers to the extent data is tranformed in the encryption process

5
New cards

Full-disk

  • Cryptographic method that involves encrypting an entire hard drive

  • Provided “blanket” protection for sensitive data

  • Supported by all major OSs

6
New cards

Partitions

  • Portion of a disk the OS treats as seperate units

  • Must be encrypted seperately

7
New cards

Files

  • Containers that hold data

  • Can be encrypted to protect data in shared environments

8
New cards

Volume

  • Sinle accessible storage area with physical drives

  • Encryption maintains confidentiality of a large amount of data

9
New cards

Database

  • Securing and encryption a database includes:

    • Seperating the database from web servers

    • Encrypting data, files, and backups

    • Use of a web application firewall (WAF)

    • Ensuring physical security

    • Enable alerts, audit procedures, and active monitoring

10
New cards

Record

  • Collection of related data items that are treated as a unit

  • Securing these individual units of data

11
New cards

3 states data should be encrypted

  • At rest

  • In transit

  • In use

12
New cards

Symmetric encryption

  • Uses a single key for both encryption and decryption

  • Easier use

  • Less secure

  • Examples include:

    • Advanced Encryption Standard (AES)

    • RC4

13
New cards

Asymmetric encryption

  • Uses a public key for encryption and private for decryption

  • More complex

  • More secure

  • Examples include:

    • EIGamal

    • RSA

    • DSA

    • Elliptic-curve tehniques

    • PKCS

14
New cards

Key exchange

  • Method by which cryptographic keys are exchanged allowing use of a cryptographic algorithm

  • In asymmetric encryption both parties need each other’s public keys

15
New cards

Algorithms

  • Mathmatical formula used in cryptographic processes

16
New cards

Cipher suite

  • Set of algorithms

  • Secures network connections using Transport Layer Security (TLS)

  • Algortihms tyically include:

    • Key exchange

    • Bulk encryption

    • Message authentication code (MAC) - Provides data integrity checks

  • Structure defined in TLS standard document

17
New cards

Stream cipher

  • Symmetric key state cipher

  • Combined plaintext digits with a pseudorandom digit stream, or keystream

  • Plaintext digits are individually encrypted with corresponding keystream digits

  • High speeds

  • Low complexity

18
New cards

Block cipher

  • Encryption method that assign an algorithm and key to a block of text rather than individual digits

19
New cards

Key length

  • Number of bits in an encryption algorithm

  • Determines maximum number of combinations to break algorithm

  • Shorter key length are less secure

  • Different ciphers require longer lengths to achieve similiar security

20
New cards

Tools

  • Specialized technologies and protocols that secure and manage data

21
New cards

Trusted Platform Module (TPM)

  • Safeguard information on computer systems

  • Chips are tamper-resistant, secure cryptoprocessors that carry out cryptographic operations

  • Advantages include:

    • Managing and limiting the use of cryptographic keys

    • Executing platform device authentication using RSA

    • Ensuring platform integrity by holding security measurements

22
New cards

Hardware Security Module (HSM)

  • Physical devices that act as secure cryptoprocessors

  • Used for encryption during various security processes

  • Faster than software encryption

  • Tamper-resistant

  • High availability due to independence from other computer systems

  • Involved in generation, storage, and archival of encryption key pairs

23
New cards

Key Management System (KMS)

  • Backbone of managing cryptograhic keys

  • Central functions include:

    • Generation of cryptographic keys

    • Secure storage of keys

    • Key exchange

    • Key access control

    • Key replacement and rotation

24
New cards

Secure enclave

  • Hardware-based feature that handles encryption and decryption

  • Microprocessor within a larger chip

  • Tamper-resistant

  • Prevents data from being accessed against security protocol

25
New cards

Obfuscation

  • Altering original data to prevent it being understood

  • Additional measure to encryption

  • Not a translation but a distortion

26
New cards

Steganography

  • Practice of hiding a secret message inside public information

  • Form of data hiding rather than cryptography

  • Intended to conceal and decieve

27
New cards

Audio Steganography

  • Transmits hidden information by modifying an audio signal

  • Cover file combines with the message to form a stego-file

  • Tools include Deepsound

28
New cards

Video Steganography

  • Tranmits hidden file in a cover video file

  • Typically more secure due to size and complexity

  • Individual frames are analyzed and altered

  • Tools include OpenCv and DDmpeg

29
New cards

Image Steganography

  • Technique to hide a message inside an image

  • Methods include:

    • Least signigicant bit (LSB) substitution

    • Blocking

    • Pallette modification

30
New cards

Least significant bit (LSB) substitution

  • Form of image steganography

  • Extracts pixels’ alpha, red, green, and blue (ARPB)

  • Finds LSB and sets it to corresponding binary value of the message’s characters

31
New cards

Blocking

  • Form of image steganography

  • Breaks up an image using Discrete Cosine Transform (DCT)

  • Modifies luminance and color coefficients as a hidden message

32
New cards

Palette modification

  • Replaced image’s colors with new ones to represent the hidden message

33
New cards

Tokenization

  • Process of randomely generating a token value for plaintext data and storing the mapping in a token vault

  • Difficult to scale

  • Typically used for data at rest due to inaccessibility

34
New cards

Data masking

  • Hiding sensitive data such as personally indentifiable information (PII) with specific characters

  • Can be done through substitution or censoring

35
New cards

Hashing

  • One-way function in which data is mapped to a fixed-length value

  • Verifies that a file or piece of data hasn’t been altered

  • Compares original hash value with the current to detect changes

36
New cards

Salting

  • Addition of random data to a password before hashing

  • Makes messages more secure from hash attacks

37
New cards

Digital signatures

  • Mathematical scheme for verifying a digital message’s authenticity

  • Implement asymmetric cryptography

  • Proovide authentication, integrity, and non-repudiation

  • Consists of 3 algorithms:

    • Key generation

    • Signing

    • Signature verifying

  • Requires private key and authenticity verification using public key

38
New cards

Key Stretching

  • Lengthens and randomizes passwords for better security

  • Uses a key derivation function that may use a salt or pepper

39
New cards

Pepper

  • Universal data to further increase complexity to passwords

  • Added before hashing

40
New cards

Certificates

  • Verifies identity of holder and provides legitamacy

  • Digitally signed electronic documents that binds a public key with a user identity

  • Obtained using a certificate signing request (CSR)

  • May be verified by registration authority (RA)

  • Only valid during a certain time period

41
New cards

Certificate authorities (CAs)

  • Entity, typically a server, that issues certificates to users

42
New cards

Certificate revocation list (CRL)

  • Comprised of certificates that are invalid or revoked by the CA

43
New cards

Online Certificate Status Protocol (OCSP)

  • Constrain less information and are less complex than CRLs

44
New cards

Certificate Attributes

  • Common name (CN)

  • Organization (O)

  • Locality (L)

  • Organizational unit (OU)

  • Country (C)

  • Serial number

  • Issuer

  • Validity dates

  • Public key

  • Thumbprint algorithm

  • Certificate-signing request (CSR)

45
New cards

Self-signed certificates

  • Create and endorse their own identity

  • Uses private key as signature

  • Lacks as much trust as public CAs

46
New cards

Contexts in which certificates can be used

  • Local encryption in an Encryption File System (EFS)

  • Domain validation (DV)

  • Organization validation (OV)

  • Extended validation (EV)

47
New cards

Types of Certificates

  • Wildcard

  • Code signing

  • Machine/computer

  • Email

  • User

  • Root

48
New cards
  • Certificate formats

  • Basic Encoding Rules (BER)

  • Canonical Encoding Rules (CER) - Restricted

  • Distinguished Encoding Rules (DER) - Restricted