Unit 2 CyberSecurity
Data Security & Privacy Study Guide
Cryptography Basics
Cryptography is the art and science of hiding information using mathematical & computational means.
Who uses cryptography, and for what purpose?
Any person or organization who wants to keep something confidential
A cipher is one of the simplest and easiest forms of cryptography, and is a code that’s used to transform language.
Using logic and analysis techniques to break codes is known as cryptanalysis.
Encryption
Transforming information such that it is hidden, but can still be decoded, is referred to as encryption.
Cryptography protects us against confidentiality & integrity threats in the CIA triad.
Data exists in three states:
Data at rest
Data in transit
Data in use
What’s an example of each?
Data at rest - information sitting in a database
Data in transit - sending emails to your teacher
Data in use - powerpoints
Types of encryption:
Symmetric encryption, which uses a single key.
Asymmetric encryption, which uses two keys.
The most common symmetric encryption algorithm is AES.(ends in s, symmetric)
Steganography is the practice of concealing information in an image or object.
Symmetric encryption is typically used to store data at rest.
The most common asymmetric encryption algorithm is RSA. (ends in a, asymmetric)
Asymmetric encryption is typically used to store data in transit.
How does asymmetric encryption work?
The sender creates and encrypts a ciphertext using the recipient’s public key and then the recipient decrypts the ciphertext using the recipients private key
Hashing
A hash, also known as a checksum, is a one-way function.
The avalanche effect is best described as a change to the data that drastically changes the output of the hash.
Why do I want a fingerprint of data?
To validate files and identities
The most common hashing algorithm is SHA-256. (ends in ha, hashing)
How are passwords stored and checked in a database?
They compare the users password to date stored in their database. They never keep their password in plain text
Random data added to a password prior to hashing is known as a salt.
Cryptographic attacks:
A dictionary attack, or an attack where a common wordlist of passwords are used to guess passwords
A rainbow table attack, or where it uses a precomputed list of common passwords that’ve been run through a hashing algorithm, it then compares password hashes against that table..
A collision attack, or when you manipulate a file to make it have the same hash as another file